var-201204-0174
Vulnerability from variot
The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet. Rockwell Automation is a provider of industrial automation, control and information technology solutions. Rockwell Automation FactoryTalk Activation Server RNADiagReceiver has errors in processing packets. Submitting a packet containing more than 2000 bytes to UDP port 4445 can result in no subsequent connections. An attacker can exploit these issues to crash the affected application, denying service to legitimate users
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201204-0174", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "factorytalk", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "cpr9" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "18" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "20" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "17" }, { "model": "factorytalk", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "cpr9_sr5" }, { "model": "rslogix 5000", "scope": "eq", "trust": 1.6, "vendor": "rockwellautomation", "version": "19" }, { "model": "automation rslogix", "scope": "eq", "trust": 1.5, "vendor": "rockwall", "version": "500018" }, { "model": "automation rslogix", "scope": "eq", "trust": 1.5, "vendor": "rockwall", "version": "500019" }, { "model": "automation rslogix", "scope": "eq", "trust": 1.5, "vendor": "rockwall", "version": "500017" }, { "model": "automation factorytalk activation server", "scope": "eq", "trust": 1.5, "vendor": "rockwall", "version": "3.2" }, { "model": "factorytalk", "scope": "eq", "trust": 0.8, "vendor": "rockwell automation", "version": "cpr9 to sr5" }, { "model": "rslogix 5000", "scope": "eq", "trust": 0.8, "vendor": "rockwell automation", "version": "17 to 20" }, { "model": null, "scope": null, "trust": 0.6, "vendor": "no", "version": null }, { "model": "cpr9", "scope": null, "trust": 0.4, "vendor": "factorytalk", "version": null }, { "model": "cpr9 sr5", "scope": null, "trust": 0.4, "vendor": "factorytalk", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "17" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "18" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "19" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "rslogix 5000", "version": "20" }, { "model": "automation factorytalk cpr9-sr5", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr4", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr3", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr2", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9-sr1", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk cpr9", "scope": null, "trust": 0.3, "vendor": "rockwall", "version": null }, { "model": "automation factorytalk", "scope": "eq", "trust": 0.3, "vendor": "rockwall", "version": "0" } ], "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNNVD", "id": "CNNVD-201204-004" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:rockwellautomation:factorytalk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:rockwellautomation:rslogix_5000", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001983" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma", "sources": [ { "db": "BID", "id": "51444" }, { "db": "CNNVD", "id": "CNNVD-201201-287" } ], "trust": 0.9 }, "cve": "CVE-2012-0222", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2012-0222", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2012-8874", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "7d70a8d0-463f-11e9-be91-000c29342cb1", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "f9f79006-2353-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-53503", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-0222", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-0222", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2012-8874", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201204-004", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-53503", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "VULHUB", "id": "VHN-53503" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNNVD", "id": "CNNVD-201204-004" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet. Rockwell Automation is a provider of industrial automation, control and information technology solutions. Rockwell Automation FactoryTalk Activation Server RNADiagReceiver has errors in processing packets. Submitting a packet containing more than 2000 bytes to UDP port 4445 can result in no subsequent connections. \nAn attacker can exploit these issues to crash the affected application, denying service to legitimate users", "sources": [ { "db": "NVD", "id": "CVE-2012-0222" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "BID", "id": "51444" }, { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-53503" } ], "trust": 3.96 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-0222", "trust": 3.8 }, { "db": "ICS CERT", "id": "ICSA-12-088-01", "trust": 3.4 }, { "db": "BID", "id": "51444", "trust": 2.1 }, { "db": "CNNVD", "id": "CNNVD-201204-004", "trust": 1.1 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-12-017-01", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2012-8874", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2012-001983", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-0190", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2012-0189", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201201-287", "trust": 0.6 }, { "db": "IVD", "id": "7D70A8D0-463F-11E9-BE91-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "F9F79006-2353-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-53503", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "VULHUB", "id": "VHN-53503" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-004" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "id": "VAR-201204-0174", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "VULHUB", "id": "VHN-53503" } ], "trust": 3.125 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 2.2 } ], "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" } ] }, "last_update_date": "2024-11-23T22:08:50.953000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RSLogix 5000", "trust": 0.8, "url": "http://www.rockwellautomation.com/rockwellsoftware/design/rslogix5000/" }, { "title": "FactoryTalk", "trust": 0.8, "url": "http://www.rockwellautomation.com/rockwellsoftware/factorytalk/" }, { "title": "Patch for Rockwell Automation Allen-Bradley FactoryTalk Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/36064" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-53503" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-088-01.pdf" }, { "trust": 1.7, "url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/469937" }, { "trust": 1.5, "url": "http://aluigi.altervista.org/adv/rnadiagreceiver_1-adv.txt" }, { "trust": 1.1, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-12-017-01.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0222" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0222" }, { "trust": 0.6, "url": "http://ics-cert.us-cert.gov/advisories/icsa-12-088-01" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/51444" }, { "trust": 0.3, "url": "http://www.rockwellautomation.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "VULHUB", "id": "VHN-53503" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-004" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0190" }, { "db": "CNVD", "id": "CNVD-2012-0189" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "VULHUB", "id": "VHN-53503" }, { "db": "BID", "id": "51444" }, { "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-004" }, { "db": "NVD", "id": "CVE-2012-0222" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-04-05T00:00:00", "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "date": "2012-04-05T00:00:00", "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0190" }, { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0189" }, { "date": "2012-04-05T00:00:00", "db": "CNVD", "id": "CNVD-2012-8874" }, { "date": "2012-04-02T00:00:00", "db": "VULHUB", "id": "VHN-53503" }, { "date": "2012-01-17T00:00:00", "db": "BID", "id": "51444" }, { "date": "2012-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-287" }, { "date": "2012-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-004" }, { "date": "2012-04-02T18:55:01.090000", "db": "NVD", "id": "CVE-2012-0222" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0190" }, { "date": "2012-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2012-0189" }, { "date": "2012-04-05T00:00:00", "db": "CNVD", "id": "CNVD-2012-8874" }, { "date": "2012-04-03T00:00:00", "db": "VULHUB", "id": "VHN-53503" }, { "date": "2012-03-28T22:10:00", "db": "BID", "id": "51444" }, { "date": "2012-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001983" }, { "date": "2012-01-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-287" }, { "date": "2012-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201204-004" }, { "date": "2024-11-21T01:34:36.730000", "db": "NVD", "id": "CVE-2012-0222" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-287" }, { "db": "CNNVD", "id": "CNNVD-201204-004" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rockwell Automation Allen-Bradley FactoryTalk Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-8874" }, { "db": "CNNVD", "id": "CNNVD-201204-004" } ], "trust": 1.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "7d70a8d0-463f-11e9-be91-000c29342cb1" }, { "db": "IVD", "id": "f9f79006-2353-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201204-004" } ], "trust": 1.0 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…