var-201308-0293
Vulnerability from variot
Multiple absolute path traversal vulnerabilities in National Instruments cwui.ocx, as used in National Instruments LabWindows/CVI 2012 SP1 and earlier, National Instruments LabVIEW 2012 SP1 and earlier, the Data Analysis component in ABB DataManager 1 through 6.3.6, and other products allow remote attackers to create and execute arbitrary files via a full pathname in an argument to the ExportStyle method in the (1) CWNumEdit, (2) CWGraph, (3) CWBoolean, (4) CWSlide, or (5) CWKnob ActiveX control, in conjunction with file content in the (a) Caption or (b) FormatString property value. (1) CWNumEdit (2) CWGraph (3) CWBoolean (4) CWSlide (5) CWKnob. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ABB DataManager Data Analysis. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within multiple 3rd party CWUI activex controls. CWNumEdit, CWGraph, CWBoolean, CWSlide, and CWKnob all support an ExportStyle() method that allows creation of an arbitrary file with the desired extension and inside an arbitrary location. File content can be controlled by setting a 'Caption' or 'FormatString' property. This vulnerability can be leveraged by an attacker to execute code under the context of the current process. National Instruments is a company dedicated to test measurement, automation and embedded applications. National Instruments' multiple ActiveX control CWUI has security vulnerabilities that allow an attacker to build malicious web pages, entice users to parse, and execute arbitrary code in the application context. National Instruments' multiple ActiveX Controls are prone to a remote code-execution vulnerability caused by an insecure method. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. National Instruments LabWindows/CVI and LabVIEW are products of National Instruments (National Instruments). LabWindows/CVI is a software development platform with ANSI C as the core; LabVIEW is a system design platform. ABB DataManager is a set of data analysis software developed by Swiss ABB company
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "datamanager", "scope": "eq", "trust": 1.6, "vendor": "abb", "version": "1.0.0" }, { "_id": null, "model": "datamanager", "scope": "eq", "trust": 1.6, "vendor": "abb", "version": "6.3.6" }, { "_id": null, "model": "labview", "scope": null, "trust": 1.4, "vendor": "national instruments", "version": null }, { "_id": null, "model": "labwindows/cvi", "scope": null, "trust": 1.4, "vendor": "national instruments", "version": null }, { "_id": null, "model": "labview", "scope": "lte", "trust": 1.0, "vendor": "ni", "version": "2012" }, { "_id": null, "model": "measurementstudio", "scope": "lte", "trust": 1.0, "vendor": "ni", "version": "2013" }, { "_id": null, "model": "teststand", "scope": "lte", "trust": 1.0, "vendor": "ni", "version": "2012" }, { "_id": null, "model": "labwindows", "scope": "lte", "trust": 1.0, "vendor": "ni", "version": "2012" }, { "_id": null, "model": "datamanager", "scope": "eq", "trust": 0.8, "vendor": "abb", "version": "1 to 6.3.6" }, { "_id": null, "model": "datamanager", "scope": null, "trust": 0.7, "vendor": "abb", "version": null }, { "_id": null, "model": "national instruments", "scope": null, "trust": 0.6, "vendor": "abb", "version": null }, { "_id": null, "model": "national", "scope": null, "trust": 0.6, "vendor": "national instruments", "version": null }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "labview", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "labwindows", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "measurementstudio", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "teststand", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "datamanager", "version": "1.0.0" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "datamanager", "version": "6.3.6" } ], "sources": [ { "db": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-120" }, { "db": "CNVD", "id": "CNVD-2013-07393" }, { "db": "CNVD", "id": "CNVD-2013-11806" }, { "db": "JVNDB", "id": "JVNDB-2013-003659" }, { "db": "CNNVD", "id": "CNNVD-201308-066" }, { "db": "NVD", "id": "CVE-2013-5021" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:abb:datamanager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ni:labview", "vulnerable": true }, { "cpe22Uri": "cpe:/a:ni:labwindows", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003659" } ] }, "credits": { "_id": null, "data": "Andrea Micalizzi aka rgod", "sources": [ { "db": "ZDI", "id": "ZDI-13-120" }, { "db": "BID", "id": "60493" } ], "trust": 1.0 }, "cve": "CVE-2013-5021", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2013-5021", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2013-5021", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-07393", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2013-11806", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-65023", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-5021", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-5021", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2013-5021", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-07393", "trust": 0.6, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-11806", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201308-066", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-65023", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-120" }, { "db": "CNVD", "id": "CNVD-2013-07393" }, { "db": "CNVD", "id": "CNVD-2013-11806" }, { "db": "VULHUB", "id": "VHN-65023" }, { "db": "JVNDB", "id": "JVNDB-2013-003659" }, { "db": "CNNVD", "id": "CNNVD-201308-066" }, { "db": "NVD", "id": "CVE-2013-5021" } ] }, "description": { "_id": null, "data": "Multiple absolute path traversal vulnerabilities in National Instruments cwui.ocx, as used in National Instruments LabWindows/CVI 2012 SP1 and earlier, National Instruments LabVIEW 2012 SP1 and earlier, the Data Analysis component in ABB DataManager 1 through 6.3.6, and other products allow remote attackers to create and execute arbitrary files via a full pathname in an argument to the ExportStyle method in the (1) CWNumEdit, (2) CWGraph, (3) CWBoolean, (4) CWSlide, or (5) CWKnob ActiveX control, in conjunction with file content in the (a) Caption or (b) FormatString property value. (1) CWNumEdit (2) CWGraph (3) CWBoolean (4) CWSlide (5) CWKnob. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ABB DataManager Data Analysis. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within multiple 3rd party CWUI activex controls. CWNumEdit, CWGraph, CWBoolean, CWSlide, and CWKnob all support an ExportStyle() method that allows creation of an arbitrary file with the desired extension and inside an arbitrary location. File content can be controlled by setting a \u0027Caption\u0027 or \u0027FormatString\u0027 property. This vulnerability can be leveraged by an attacker to execute code under the context of the current process. National Instruments is a company dedicated to test measurement, automation and embedded applications. National Instruments\u0027 multiple ActiveX control CWUI has security vulnerabilities that allow an attacker to build malicious web pages, entice users to parse, and execute arbitrary code in the application context. National Instruments\u0027 multiple ActiveX Controls are prone to a remote code-execution vulnerability caused by an insecure method. \nAn attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. National Instruments LabWindows/CVI and LabVIEW are products of National Instruments (National Instruments). LabWindows/CVI is a software development platform with ANSI C as the core; LabVIEW is a system design platform. ABB DataManager is a set of data analysis software developed by Swiss ABB company", "sources": [ { "db": "NVD", "id": "CVE-2013-5021" }, { "db": "JVNDB", "id": "JVNDB-2013-003659" }, { "db": "ZDI", "id": "ZDI-13-120" }, { "db": "CNVD", "id": "CNVD-2013-07393" }, { "db": "CNVD", "id": "CNVD-2013-11806" }, { "db": "BID", "id": "60493" }, { "db": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-65023" } ], "trust": 4.05 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2013-5021", "trust": 4.5 }, { "db": "ZDI", "id": "ZDI-13-120", "trust": 3.8 }, { "db": "BID", "id": "60493", "trust": 1.6 }, { "db": "CNNVD", "id": "CNNVD-201308-066", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2013-11806", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2013-07393", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-003659", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1554", "trust": 0.7 }, { "db": "IVD", "id": "CB8A22E8-2352-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "5E6A8F28-1F1E-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-65023", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-120" }, { "db": "CNVD", "id": "CNVD-2013-07393" }, { "db": "CNVD", "id": "CNVD-2013-11806" }, { "db": "VULHUB", "id": "VHN-65023" }, { "db": "BID", "id": "60493" }, { "db": "JVNDB", "id": "JVNDB-2013-003659" }, { "db": "CNNVD", "id": "CNNVD-201308-066" }, { "db": "NVD", "id": "CVE-2013-5021" } ] }, "id": "VAR-201308-0293", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-07393" }, { "db": "CNVD", "id": "CNVD-2013-11806" }, { "db": "VULHUB", "id": "VHN-65023" } ], "trust": 2.2916666699999997 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.6 } ], "sources": [ { "db": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-07393" }, { "db": "CNVD", "id": "CNVD-2013-11806" } ] }, "last_update_date": "2024-11-23T22:27:23.712000Z", "patch": { "_id": null, "data": [ { "title": "ABBVU-PACT-3BSE072617", "trust": 1.5, "url": "http://www05.abb.com/global/scot/scot203.nsf/veritydisplay/5975a8a86c82eec2c125798e00551522/$file/SECURITY_BULLETIN_-_ABBVU-PACT-3BSE072617_DataManager_Vulnerability.pdf" }, { "title": "How Do The NI Q2 2013 Security Updates Affect Me?", "trust": 0.8, "url": "http://digital.ni.com/public.nsf/websearch/507DEC9DA57A708186257B3600512623?OpenDocument" }, { "title": "NI Q2 2013\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://digital.ni.com/public.nsf/websearchj/A13EF8E8AE2CFAA886257B750076EC0B?OpenDocument" }, { "title": "Patch for National Instruments Multiple ActiveX Control CWUI Remote Code Execution Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/34614" }, { "title": "National Instruments multiple products cwui.ocx ActiveX control path traversal vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/38110" } ], "sources": [ { "db": "ZDI", "id": "ZDI-13-120" }, { "db": "CNVD", "id": "CNVD-2013-07393" }, { "db": "CNVD", "id": "CNVD-2013-11806" }, { "db": "JVNDB", "id": "JVNDB-2013-003659" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65023" }, { "db": "JVNDB", "id": "JVNDB-2013-003659" }, { "db": "NVD", "id": "CVE-2013-5021" } ] }, "references": { "_id": null, "data": [ { "trust": 3.1, "url": "http://zerodayinitiative.com/advisories/zdi-13-120/" }, { "trust": 1.7, "url": "http://digital.ni.com/public.nsf/websearch/507dec9da57a708186257b3600512623?opendocument" }, { "trust": 1.4, "url": "http://www05.abb.com/global/scot/scot203.nsf/veritydisplay/5975a8a86c82eec2c125798e00551522/$file/security_bulletin_-_abbvu-pact-3bse072617_datamanager_vulnerability.pdf" }, { "trust": 1.1, "url": "http://digital.ni.com/public.nsf/allkb/04b876608790082c86257bd1000cc950?opendocument" }, { "trust": 1.0, "url": "http://www05.abb.com/global/scot/scot203.nsf/veritydisplay/5975a8a86c82eec2c125798e00551522/%24file/security_bulletin_-_abbvu-pact-3bse072617_datamanager_vulnerability.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5021" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5021" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/60493/" }, { "trust": 0.6, "url": "http://www05.abb.com/global/scot/scot203.nsf/veritydisplay/5975a8a86c82eec2c125798e00551522/" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/60493" }, { "trust": 0.3, "url": "http://www.abb.com/" }, { "trust": 0.3, "url": "http://support.microsoft.com/kb/240797" } ], "sources": [ { "db": "ZDI", "id": "ZDI-13-120" }, { "db": "CNVD", "id": "CNVD-2013-07393" }, { "db": "CNVD", "id": "CNVD-2013-11806" }, { "db": "VULHUB", "id": "VHN-65023" }, { "db": "BID", "id": "60493" }, { "db": "JVNDB", "id": "JVNDB-2013-003659" }, { "db": "CNNVD", "id": "CNNVD-201308-066" }, { "db": "NVD", "id": "CVE-2013-5021" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d", "ident": null }, { "db": "IVD", "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d", "ident": null }, { "db": "ZDI", "id": "ZDI-13-120", "ident": null }, { "db": "CNVD", "id": "CNVD-2013-07393", "ident": null }, { "db": "CNVD", "id": "CNVD-2013-11806", "ident": null }, { "db": "VULHUB", "id": "VHN-65023", "ident": null }, { "db": "BID", "id": "60493", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2013-003659", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201308-066", "ident": null }, { "db": "NVD", "id": "CVE-2013-5021", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2013-08-08T00:00:00", "db": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d", "ident": null }, { "date": "2013-06-17T00:00:00", "db": "IVD", "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d", "ident": null }, { "date": "2013-06-11T00:00:00", "db": "ZDI", "id": "ZDI-13-120", "ident": null }, { "date": "2013-06-17T00:00:00", "db": "CNVD", "id": "CNVD-2013-07393", "ident": null }, { "date": "2013-08-08T00:00:00", "db": "CNVD", "id": "CNVD-2013-11806", "ident": null }, { "date": "2013-08-06T00:00:00", "db": "VULHUB", "id": "VHN-65023", "ident": null }, { "date": "2013-06-11T00:00:00", "db": "BID", "id": "60493", "ident": null }, { "date": "2013-08-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003659", "ident": null }, { "date": "2013-08-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-066", "ident": null }, { "date": "2013-08-06T20:55:05.287000", "db": "NVD", "id": "CVE-2013-5021", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2013-06-11T00:00:00", "db": "ZDI", "id": "ZDI-13-120", "ident": null }, { "date": "2013-06-19T00:00:00", "db": "CNVD", "id": "CNVD-2013-07393", "ident": null }, { "date": "2013-08-08T00:00:00", "db": "CNVD", "id": "CNVD-2013-11806", "ident": null }, { "date": "2013-09-18T00:00:00", "db": "VULHUB", "id": "VHN-65023", "ident": null }, { "date": "2015-03-19T09:32:00", "db": "BID", "id": "60493", "ident": null }, { "date": "2013-08-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003659", "ident": null }, { "date": "2013-09-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-066", "ident": null }, { "date": "2024-11-21T01:56:54.917000", "db": "NVD", "id": "CVE-2013-5021", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-066" } ], "trust": 0.6 }, "title": { "_id": null, "data": "National Instruments Multiple products cwui.ocx ActiveX Control Path Traversal Vulnerability", "sources": [ { "db": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-11806" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Path traversal", "sources": [ { "db": "IVD", "id": "cb8a22e8-2352-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "5e6a8f28-1f1e-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201308-066" } ], "trust": 1.0 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.