var-201406-0145
Vulnerability from variot
COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP. The COPA-DATA zenon DNP3 NG driver (DNP3 master) and the zenon DNP3 Process Gateway (DNP3 outstation) are products of the zenon industrial automation software belonging to the HMI/SCADA class. A denial of service vulnerability exists in multiple CCOPA-DATA Zenon products. Attackers can exploit this issue to crash the affected application, denying service to legitimate users
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0145", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "zenon dnp3 ng driver", "scope": "eq", "trust": 1.6, "vendor": "copadata", "version": "7.10" }, { "model": "zenon dnp3 ng driver", "scope": "eq", "trust": 1.6, "vendor": "copadata", "version": "7.11" }, { "model": "zenon dnp3 process gateway", "scope": "eq", "trust": 1.6, "vendor": "copadata", "version": "7.11" }, { "model": null, "scope": "eq", "trust": 1.2, "vendor": "zenon dnp3 ng driver", "version": "7.11" }, { "model": "zenon dnp3 ng driver", "scope": "eq", "trust": 0.8, "vendor": "ing punzenberger copa data", "version": "7.10" }, { "model": "zenon dnp3 ng driver", "scope": "eq", "trust": 0.8, "vendor": "ing punzenberger copa data", "version": "7.11 to 7.11 sp0 build 10238" }, { "model": "zenon dnp3 process gateway", "scope": "lte", "trust": 0.8, "vendor": "ing punzenberger copa data", "version": "7.11 sp0 build 10238" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "zenon dnp3 ng driver", "version": "7.10" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "zenon dnp3 process gateway", "version": "7.11" }, { "model": "zenon dnp3 process gateway sp0 build", "scope": "eq", "trust": 0.6, "vendor": "ing punzenberger copa data", "version": "7.1110238" }, { "model": "zenon dnp3 ng driver sp0", "scope": "eq", "trust": 0.6, "vendor": "ing punzenberger copa data", "version": "7.10" }, { "model": "zenon dnp3 ng driver sp0 build", "scope": "eq", "trust": 0.6, "vendor": "ing punzenberger copa data", "version": "7.1110238" } ], "sources": [ { "db": "IVD", "id": "f2615c3e-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d08f-463f-11e9-abbb-000c29342cb1" }, { "db": "IVD", "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03595" }, { "db": "JVNDB", "id": "JVNDB-2014-002759" }, { "db": "CNNVD", "id": "CNNVD-201406-060" }, { "db": "NVD", "id": "CVE-2014-2345" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:copadata:zenon_dnp3_ng_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:copadata:zenon_dnp3_process_gateway", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002759" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GmbH", "sources": [ { "db": "BID", "id": "67805" } ], "trust": 0.3 }, "cve": "CVE-2014-2345", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2014-2345", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2014-03595", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "f2615c3e-2351-11e6-abef-000c29c66e3d", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "7d79d08f-463f-11e9-abbb-000c29342cb1", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-70284", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-2345", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-2345", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2014-03595", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201406-060", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "f2615c3e-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "7d79d08f-463f-11e9-abbb-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-70284", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "f2615c3e-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d08f-463f-11e9-abbb-000c29342cb1" }, { "db": "IVD", "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03595" }, { "db": "VULHUB", "id": "VHN-70284" }, { "db": "JVNDB", "id": "JVNDB-2014-002759" }, { "db": "CNNVD", "id": "CNNVD-201406-060" }, { "db": "NVD", "id": "CVE-2014-2345" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP. The COPA-DATA zenon DNP3 NG driver (DNP3 master) and the zenon DNP3 Process Gateway (DNP3 outstation) are products of the zenon industrial automation software belonging to the HMI/SCADA class. A denial of service vulnerability exists in multiple CCOPA-DATA Zenon products. \nAttackers can exploit this issue to crash the affected application, denying service to legitimate users", "sources": [ { "db": "NVD", "id": "CVE-2014-2345" }, { "db": "JVNDB", "id": "JVNDB-2014-002759" }, { "db": "CNVD", "id": "CNVD-2014-03595" }, { "db": "BID", "id": "67805" }, { "db": "IVD", "id": "f2615c3e-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d08f-463f-11e9-abbb-000c29342cb1" }, { "db": "IVD", "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-70284" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2345", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-14-154-01", "trust": 3.4 }, { "db": "CNNVD", "id": "CNNVD-201406-060", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2014-03595", "trust": 1.2 }, { "db": "BID", "id": "67805", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2014-002759", "trust": 0.8 }, { "db": "OSVDB", "id": "107667", "trust": 0.6 }, { "db": "IVD", "id": "F2615C3E-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "7D79D08F-463F-11E9-ABBB-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "598D9D0C-1ED2-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-70284", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "f2615c3e-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d08f-463f-11e9-abbb-000c29342cb1" }, { "db": "IVD", "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03595" }, { "db": "VULHUB", "id": "VHN-70284" }, { "db": "BID", "id": "67805" }, { "db": "JVNDB", "id": "JVNDB-2014-002759" }, { "db": "CNNVD", "id": "CNNVD-201406-060" }, { "db": "NVD", "id": "CVE-2014-2345" } ] }, "id": "VAR-201406-0145", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "f2615c3e-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d08f-463f-11e9-abbb-000c29342cb1" }, { "db": "IVD", "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03595" }, { "db": "VULHUB", "id": "VHN-70284" } ], "trust": 2.05 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "IVD", "id": "f2615c3e-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d08f-463f-11e9-abbb-000c29342cb1" }, { "db": "IVD", "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03595" } ] }, "last_update_date": "2024-11-23T22:31:19.380000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Article ID: 178001", "trust": 0.8, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase" }, { "title": "Article ID: 179444", "trust": 0.8, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase" }, { "title": "Patch for multiple CCOPA-DATA Zenon product denial of service vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/46388" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03595" }, { "db": "JVNDB", "id": "JVNDB-2014-002759" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-70284" }, { "db": "JVNDB", "id": "JVNDB-2014-002759" }, { "db": "NVD", "id": "CVE-2014-2345" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-154-01" }, { "trust": 1.6, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=813\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase" }, { "trust": 1.6, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=814\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2345" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2345" }, { "trust": 0.6, "url": "http://osvdb.com/show/osvdb/107667" }, { "trust": 0.3, "url": "http://www.copadata.com/en/home.html" }, { "trust": 0.1, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=813\u0026amp;tx_hrfaq_pi1%5baction%5d=show\u0026amp;tx_hrfaq_pi1%5bcontroller%5d=knowledgebase" }, { "trust": 0.1, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=814\u0026amp;tx_hrfaq_pi1%5baction%5d=show\u0026amp;tx_hrfaq_pi1%5bcontroller%5d=knowledgebase" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03595" }, { "db": "VULHUB", "id": "VHN-70284" }, { "db": "BID", "id": "67805" }, { "db": "JVNDB", "id": "JVNDB-2014-002759" }, { "db": "CNNVD", "id": "CNNVD-201406-060" }, { "db": "NVD", "id": "CVE-2014-2345" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "f2615c3e-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d08f-463f-11e9-abbb-000c29342cb1" }, { "db": "IVD", "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03595" }, { "db": "VULHUB", "id": "VHN-70284" }, { "db": "BID", "id": "67805" }, { "db": "JVNDB", "id": "JVNDB-2014-002759" }, { "db": "CNNVD", "id": "CNNVD-201406-060" }, { "db": "NVD", "id": "CVE-2014-2345" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-13T00:00:00", "db": "IVD", "id": "f2615c3e-2351-11e6-abef-000c29c66e3d" }, { "date": "2014-06-13T00:00:00", "db": "IVD", "id": "7d79d08f-463f-11e9-abbb-000c29342cb1" }, { "date": "2014-06-13T00:00:00", "db": "IVD", "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d" }, { "date": "2014-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2014-03595" }, { "date": "2014-06-05T00:00:00", "db": "VULHUB", "id": "VHN-70284" }, { "date": "2014-06-03T00:00:00", "db": "BID", "id": "67805" }, { "date": "2014-06-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002759" }, { "date": "2014-06-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-060" }, { "date": "2014-06-05T17:55:05.950000", "db": "NVD", "id": "CVE-2014-2345" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2014-03595" }, { "date": "2014-06-05T00:00:00", "db": "VULHUB", "id": "VHN-70284" }, { "date": "2014-06-03T00:00:00", "db": "BID", "id": "67805" }, { "date": "2014-06-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002759" }, { "date": "2014-06-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-060" }, { "date": "2024-11-21T02:06:07.407000", "db": "NVD", "id": "CVE-2014-2345" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201406-060" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "COPA-DATA zenon DNP3 NG driver and zenon DNP3 Process Gateway Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002759" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation", "sources": [ { "db": "IVD", "id": "f2615c3e-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d08f-463f-11e9-abbb-000c29342cb1" }, { "db": "IVD", "id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201406-060" } ], "trust": 1.2 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…