var-201402-0347
Vulnerability from variot

Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors. Rockwell Automation is a provider of industrial automation, control and information technology solutions. An attacker can exploit this issue to compromise user defined passwords. This results in unauthorized access and may lead to further attacks. RSLogix 5000 versions 7.0 through 20.01 and V21.0 are vulnerable. The software provides high-performance integrated control systems for manufacturers and machine builders who need medium-sized control systems, and also provides a unified development environment for Rockwell Automation Integrated Architecture systems. A security bypass vulnerability exists in Rockwell Automation RSLogix 5000 versions 7 through 20.01 and 21.0 due to the program not properly password-protecting the '.ACD' file

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201402-0347",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "rslogix 5000 design and configuration software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": "20.01"
      },
      {
        "model": "rslogix 5000 design and configuration software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": "7.0"
      },
      {
        "model": "rslogix 5000 design and configuration software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": "21.0"
      },
      {
        "model": "rslogix 5000 design and configuration software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "rockwellautomation",
        "version": "18.0"
      },
      {
        "model": "logix5000 controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": null
      },
      {
        "model": "rslogix 5000",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "21.0"
      },
      {
        "model": "rslogix 5000",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "7.0 to  20.01"
      },
      {
        "model": "software automation rslogix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "50007-20.01"
      },
      {
        "model": "software automation rslogix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "500021.0"
      },
      {
        "model": "automation rslogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "500021.0"
      },
      {
        "model": "automation rslogix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "500020.01"
      },
      {
        "model": "automation rslogix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "500021.03"
      },
      {
        "model": "automation rslogix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "500020.03"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "rslogix 5000 design and configuration",
        "version": "7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "rslogix 5000 design and configuration",
        "version": "18.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "rslogix 5000 design and configuration",
        "version": "20.01"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "rslogix 5000 design and configuration",
        "version": "21.0"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "db": "BID",
        "id": "65337"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-036"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0755"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:rockwellautomation:logix_5000_controller",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:rslogix_5000",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Stephen Dunlap",
    "sources": [
      {
        "db": "BID",
        "id": "65337"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-0755",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "CVE-2014-0755",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "CNVD-2014-00720",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "3dbe138e-2352-11e6-abef-000c29c66e3d",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.4,
            "id": "VHN-68248",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-0755",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-0755",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-00720",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201402-036",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "3dbe138e-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-68248",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-036"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0755"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors. Rockwell Automation is a provider of industrial automation, control and information technology solutions. \nAn attacker can exploit this issue to compromise user defined passwords. This results in unauthorized access and may lead to further attacks. \nRSLogix 5000 versions 7.0 through 20.01 and V21.0 are vulnerable. The software provides high-performance integrated control systems for manufacturers and machine builders who need medium-sized control systems, and also provides a unified development environment for Rockwell Automation Integrated Architecture systems. A security bypass vulnerability exists in Rockwell Automation RSLogix 5000 versions 7 through 20.01 and 21.0 due to the program not properly password-protecting the \u0027.ACD\u0027 file",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-0755"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "db": "BID",
        "id": "65337"
      },
      {
        "db": "IVD",
        "id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68248"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-0755",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-021-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "65337",
        "trust": 2.0
      },
      {
        "db": "OSVDB",
        "id": "102858",
        "trust": 1.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-036",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001314",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "3DBE138E-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-68248",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68248"
      },
      {
        "db": "BID",
        "id": "65337"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-036"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0755"
      }
    ]
  },
  "id": "VAR-201402-0347",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68248"
      }
    ],
    "trust": 1.775
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      }
    ]
  },
  "last_update_date": "2024-11-23T23:09:54.092000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.rockwellautomation.com/"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://jp.rockwellautomation.com/"
      },
      {
        "title": "Rockwell Automation RSLogix 5000 Security Bypass Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/43439"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-68248"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0755"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-021-01"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/65337"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/102858"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90981"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0755"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0755"
      },
      {
        "trust": 0.3,
        "url": "http://www.rockwellautomation.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68248"
      },
      {
        "db": "BID",
        "id": "65337"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-036"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0755"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "db": "VULHUB",
        "id": "VHN-68248"
      },
      {
        "db": "BID",
        "id": "65337"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-036"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-0755"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-12T00:00:00",
        "db": "IVD",
        "id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-02-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "date": "2014-02-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-68248"
      },
      {
        "date": "2014-02-04T00:00:00",
        "db": "BID",
        "id": "65337"
      },
      {
        "date": "2014-02-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      },
      {
        "date": "2014-02-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201402-036"
      },
      {
        "date": "2014-02-05T05:15:29.930000",
        "db": "NVD",
        "id": "CVE-2014-0755"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "date": "2017-08-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-68248"
      },
      {
        "date": "2014-02-04T00:00:00",
        "db": "BID",
        "id": "65337"
      },
      {
        "date": "2014-02-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001314"
      },
      {
        "date": "2014-02-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201402-036"
      },
      {
        "date": "2024-11-21T02:02:45.157000",
        "db": "NVD",
        "id": "CVE-2014-0755"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "65337"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-036"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation RSLogix 5000 Security Bypass Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00720"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-036"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Trust management",
    "sources": [
      {
        "db": "IVD",
        "id": "3dbe138e-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-036"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…