var-201305-0089
Vulnerability from variot

Invensys Wonderware Information Server (WIS) 4.0 SP1SP1, 4.5- Portal, and 5.0- Portal does not restrict unspecified size and amount values, which allows remote attackers to execute arbitrary code or cause a denial of service (resource consumption) via unknown vectors. Invensys Wonderware Information Server is a graphical visualization, reporting and analysis of real-time network-based plant operations data that helps drive productivity across the enterprise. Invensys Wonderware Information Server is prone to a denial-of-service vulnerability. Successful exploits may allow an attacker to trigger high CPU consumption and make the application unresponsive. Note that this issue could be exploited to execute arbitrary code, however, Symantec has not been confirmed. The following versions are vulnerable: Wonderware Information Server 4.0 SP1 Wonderware Information Server 4.5 Portal Wonderware Information Server 5.0 Portal. Through the network solution, this product can conveniently display the factory performance indicators and production data to the operation, operation and maintenance and engineering personnel, and is widely used in petroleum, natural gas, chemical and other industries

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201305-0089",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "4.5"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "4.0"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "invensys",
        "version": "5.0"
      },
      {
        "model": "wonderware information server sp1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "invensys",
        "version": "4.0"
      },
      {
        "model": "wonderware information server portal",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "invensys",
        "version": "4.5"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "4.0 sp1sp1"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "4.5- portal"
      },
      {
        "model": "wonderware information server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "invensys",
        "version": "5.0- portal"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware information server",
        "version": "4.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware information server",
        "version": "4.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "wonderware information server",
        "version": "5.0"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "db": "BID",
        "id": "59709"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0685"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:invensys:wonderware_information_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Timur Yunusov, Alexey Osipov, and Ilya Karpov of the Positive Technologies Research Team",
    "sources": [
      {
        "db": "BID",
        "id": "59709"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-0685",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2013-0685",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-05052",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "f4b1e066-2352-11e6-abef-000c29c66e3d",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-60687",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-0685",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-0685",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-05052",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201305-137",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "f4b1e066-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-60687",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60687"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0685"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Invensys Wonderware Information Server (WIS) 4.0 SP1SP1, 4.5- Portal, and 5.0- Portal does not restrict unspecified size and amount values, which allows remote attackers to execute arbitrary code or cause a denial of service (resource consumption) via unknown vectors. Invensys Wonderware Information Server is a graphical visualization, reporting and analysis of real-time network-based plant operations data that helps drive productivity across the enterprise. Invensys Wonderware Information Server is prone to a denial-of-service vulnerability. \nSuccessful exploits may allow an attacker to trigger high CPU consumption and  make the application unresponsive. Note that this issue could be exploited to execute arbitrary code, however, Symantec has not been confirmed. \nThe following versions are vulnerable:\nWonderware Information Server 4.0 SP1\nWonderware Information Server 4.5 Portal\nWonderware Information Server 5.0 Portal. Through the network solution, this product can conveniently display the factory performance indicators and production data to the operation, operation and maintenance and engineering personnel, and is widely used in petroleum, natural gas, chemical and other industries",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-0685"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "db": "BID",
        "id": "59709"
      },
      {
        "db": "IVD",
        "id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60687"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-0685",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-113-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "59709",
        "trust": 1.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-137",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002604",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "53308",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "F4B1E066-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-60687",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60687"
      },
      {
        "db": "BID",
        "id": "59709"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0685"
      }
    ]
  },
  "id": "VAR-201305-0089",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60687"
      }
    ],
    "trust": 1.6211111
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:45:42.172000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://global.wonderware.com/EN/Pages/default.aspx"
      },
      {
        "title": "Wonderware \u65e5\u672c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://global.wonderware.com/JP/Pages/JpPartnersSI.aspx"
      },
      {
        "title": "\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u30fb\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://iom.invensys.com/JP/Pages/IOM_HardwarePartners.aspx"
      },
      {
        "title": "\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30d1\u30fc\u30c8\u30ca\u30fc",
        "trust": 0.8,
        "url": "http://iom.invensys.com/JP/Pages/IOM_SoftwarePartners.aspx"
      },
      {
        "title": "Wonderware Top Page",
        "trust": 0.8,
        "url": "http://iom.invensys.com/JP/Pages/home.aspx"
      },
      {
        "title": "Patch for Invensys Wonderware Information Server Denial of Service Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/33856"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-60687"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0685"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-113-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0685"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0685"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/53308"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/59709"
      },
      {
        "trust": 0.3,
        "url": "http://global.wonderware.com/en/pages/wonderwareinformationserver.aspx"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60687"
      },
      {
        "db": "BID",
        "id": "59709"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0685"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "db": "VULHUB",
        "id": "VHN-60687"
      },
      {
        "db": "BID",
        "id": "59709"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0685"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-05-10T00:00:00",
        "db": "IVD",
        "id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2013-05-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "date": "2013-05-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-60687"
      },
      {
        "date": "2013-05-07T00:00:00",
        "db": "BID",
        "id": "59709"
      },
      {
        "date": "2013-05-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      },
      {
        "date": "2013-05-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      },
      {
        "date": "2013-05-09T12:31:18.970000",
        "db": "NVD",
        "id": "CVE-2013-0685"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-05-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "date": "2013-05-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-60687"
      },
      {
        "date": "2013-05-07T00:00:00",
        "db": "BID",
        "id": "59709"
      },
      {
        "date": "2013-05-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-002604"
      },
      {
        "date": "2013-05-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      },
      {
        "date": "2024-11-21T01:48:00.443000",
        "db": "NVD",
        "id": "CVE-2013-0685"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Invensys Wonderware Information Server Denial of service vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "f4b1e066-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-05052"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201305-137"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…