var-201402-0242
Vulnerability from variot

The SNMP implementation in Siemens RuggedCom ROS before 3.11, ROS 3.11 for RS950G, ROS 3.12 before 3.12.4, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (device outage) via crafted packets. RuggedCom Inc is the world's leading manufacturer of high performance networking and communications equipment for industrial environments. RuggedCom Rugged Operating System is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause the management services of the devices to become unresponsive resulting in denial-of-service conditions. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany. A resource management error vulnerability exists in the SNMP implementation in Siemens RuggedCom ROS. The following versions are affected: Siemens RuggedCom ROS 3.10.1 and prior, ROS 3.11 for RS950G, ROS 3.12 prior to 3.12.4, ROS 4.0 for RSG2488

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201402-0242",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ruggedcom rugged operating system",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.12"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.12.4"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "gt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.11.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.11.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "gt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "4.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "4.1.0"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "siemens",
        "version": "3.11.5"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.12.1"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.8.5"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.7.9"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.2.5"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.9.3"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.4.9"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.5.4"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.6.6"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.3.6"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.12.4"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.11 for rs950g"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "4.0 for rsg2488"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "siemens",
        "version": "3.12"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ruggedcom",
        "version": "3.x"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "siemens",
        "version": "3.10.1"
      },
      {
        "model": "rugged operating system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ruggedcom",
        "version": "3.10.1"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.2,
        "vendor": "siemens",
        "version": "3.12"
      },
      {
        "model": "ruggedcom rugged operating system",
        "scope": "eq",
        "trust": 0.2,
        "vendor": "siemens",
        "version": "3.12.2"
      },
      {
        "model": "ros",
        "scope": "lt",
        "trust": 0.2,
        "vendor": "ruggedcom",
        "version": "3.11"
      },
      {
        "model": "ros",
        "scope": "lt",
        "trust": 0.2,
        "vendor": "ruggedcom",
        "version": "3.11.5"
      },
      {
        "model": "ros",
        "scope": "lt",
        "trust": 0.2,
        "vendor": "ruggedcom",
        "version": "3.12.4"
      },
      {
        "model": "ros",
        "scope": "lt",
        "trust": 0.2,
        "vendor": "ruggedcom",
        "version": "4.1.0"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "339f3144-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "db": "BID",
        "id": "65625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-352"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1966"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:siemens:ruggedcom_rugged_operating_system",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ling Toh Koh, Ng Yi Teng, Seyed Dawood Sajjadi Torshizi, Ryan Lee and Ho Ping\nHou from EV-Dynamic, Malaysia",
    "sources": [
      {
        "db": "BID",
        "id": "65625"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-1966",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-1966",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-01107",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "339f3144-2352-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-69905",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-1966",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-1966",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-01107",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201402-352",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "339f3144-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-69905",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "339f3144-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-352"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1966"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The SNMP implementation in Siemens RuggedCom ROS before 3.11, ROS 3.11 for RS950G, ROS 3.12 before 3.12.4, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (device outage) via crafted packets. RuggedCom Inc is the world\u0027s leading manufacturer of high performance networking and communications equipment for industrial environments. RuggedCom Rugged Operating System is prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to cause the management services of the devices to become unresponsive resulting in denial-of-service conditions. Siemens RuggedCom ROS is a set of operating system used in RuggedCom series switches by Siemens of Germany. A resource management error vulnerability exists in the SNMP implementation in Siemens RuggedCom ROS. The following versions are affected: Siemens RuggedCom ROS 3.10.1 and prior, ROS 3.11 for RS950G, ROS 3.12 prior to 3.12.4, ROS 4.0 for RSG2488",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-1966"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "db": "BID",
        "id": "65625"
      },
      {
        "db": "IVD",
        "id": "339f3144-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69905"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-1966",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-051-03",
        "trust": 2.5
      },
      {
        "db": "SIEMENS",
        "id": "SSA-892342",
        "trust": 2.3
      },
      {
        "db": "BID",
        "id": "65625",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-352",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001459",
        "trust": 0.8
      },
      {
        "db": "SECUNIA",
        "id": "56973",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "339F3144-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-61563",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-69905",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "339f3144-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69905"
      },
      {
        "db": "BID",
        "id": "65625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-352"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1966"
      }
    ]
  },
  "id": "VAR-201402-0242",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "339f3144-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69905"
      }
    ],
    "trust": 1.54874942
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "339f3144-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      }
    ]
  },
  "last_update_date": "2024-11-23T23:09:54.133000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SSA-892342",
        "trust": 0.8,
        "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-892342.pdf"
      },
      {
        "title": "RuggedCom Rugged Operating System Patch for SMTP Protocol Denial of Service Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/43753"
      },
      {
        "title": "Siemens RuggedCom ROS Remediation of resource management error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=180264"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-352"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-399",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-69905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1966"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-051-03"
      },
      {
        "trust": 2.3,
        "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-892342.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1966"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1966"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/56973/"
      },
      {
        "trust": 0.3,
        "url": "http://www.ruggedcom.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69905"
      },
      {
        "db": "BID",
        "id": "65625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-352"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1966"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "339f3144-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69905"
      },
      {
        "db": "BID",
        "id": "65625"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-352"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-1966"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-20T00:00:00",
        "db": "IVD",
        "id": "339f3144-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-02-20T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "date": "2014-02-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-69905"
      },
      {
        "date": "2014-02-18T00:00:00",
        "db": "BID",
        "id": "65625"
      },
      {
        "date": "2014-02-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      },
      {
        "date": "2014-02-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201402-352"
      },
      {
        "date": "2014-02-24T04:48:10.210000",
        "db": "NVD",
        "id": "CVE-2014-1966"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-04-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "date": "2014-02-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-69905"
      },
      {
        "date": "2014-05-29T01:16:00",
        "db": "BID",
        "id": "65625"
      },
      {
        "date": "2014-02-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001459"
      },
      {
        "date": "2022-02-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201402-352"
      },
      {
        "date": "2024-11-21T02:05:22.220000",
        "db": "NVD",
        "id": "CVE-2014-1966"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-352"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "RuggedCom Rugged Operating System SMTP Protocol Denial of Service Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01107"
      },
      {
        "db": "BID",
        "id": "65625"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "339f3144-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-352"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…