var-201406-0146
Vulnerability from variot
COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow physically proximate attackers to cause a denial of service (infinite loop and process crash) via crafted input over a serial line. The COPA-DATA zenon DNP3 NG driver (DNP3 master) and the zenon DNP3 Process Gateway (DNP3 outstation) are products of the zenon industrial automation software belonging to the HMI/SCADA class. Multiple COPA-DATA Zenon product local denial of service vulnerabilities. Local attackers can exploit this issue to crash the affected application, denying service to legitimate users
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0146", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "zenon dnp3 ng driver", "scope": "eq", "trust": 1.6, "vendor": "copadata", "version": "7.10" }, { "model": "zenon dnp3 ng driver", "scope": "eq", "trust": 1.6, "vendor": "copadata", "version": "7.11" }, { "model": "zenon dnp3 process gateway", "scope": "eq", "trust": 1.6, "vendor": "copadata", "version": "7.11" }, { "model": null, "scope": "eq", "trust": 1.2, "vendor": "zenon dnp3 ng driver", "version": "7.11" }, { "model": "zenon dnp3 ng driver", "scope": "eq", "trust": 0.8, "vendor": "ing punzenberger copa data", "version": "7.10" }, { "model": "zenon dnp3 ng driver", "scope": "eq", "trust": 0.8, "vendor": "ing punzenberger copa data", "version": "7.11 to 7.11 sp0 build 10238" }, { "model": "zenon dnp3 process gateway", "scope": "lte", "trust": 0.8, "vendor": "ing punzenberger copa data", "version": "7.11 sp0 build 10238" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "zenon dnp3 ng driver", "version": "7.10" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "zenon dnp3 process gateway", "version": "7.11" }, { "model": "zenon dnp3 process gateway sp0 build", "scope": "eq", "trust": 0.6, "vendor": "ing punzenberger copa data", "version": "7.1110238" }, { "model": "zenon dnp3 ng driver sp0", "scope": "eq", "trust": 0.6, "vendor": "ing punzenberger copa data", "version": "7.10" }, { "model": "zenon dnp3 ng driver sp0 build", "scope": "eq", "trust": 0.6, "vendor": "ing punzenberger copa data", "version": "7.1110238" } ], "sources": [ { "db": "IVD", "id": "f257e7ee-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d090-463f-11e9-ac5a-000c29342cb1" }, { "db": "IVD", "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03596" }, { "db": "JVNDB", "id": "JVNDB-2014-002760" }, { "db": "CNNVD", "id": "CNNVD-201406-061" }, { "db": "NVD", "id": "CVE-2014-2346" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:copadata:zenon_dnp3_ng_driver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:copadata:zenon_dnp3_process_gateway", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002760" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GmbH", "sources": [ { "db": "BID", "id": "67806" } ], "trust": 0.3 }, "cve": "CVE-2014-2346", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 1.9, "id": "CVE-2014-2346", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 1.9, "id": "CNVD-2014-03596", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 1.9, "id": "f257e7ee-2351-11e6-abef-000c29c66e3d", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 1.9, "id": "7d79d090-463f-11e9-ac5a-000c29342cb1", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 1.9, "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 1.9, "id": "VHN-70285", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:H/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-2346", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2014-2346", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2014-03596", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201406-061", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "f257e7ee-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "7d79d090-463f-11e9-ac5a-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-70285", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "f257e7ee-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d090-463f-11e9-ac5a-000c29342cb1" }, { "db": "IVD", "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03596" }, { "db": "VULHUB", "id": "VHN-70285" }, { "db": "JVNDB", "id": "JVNDB-2014-002760" }, { "db": "CNNVD", "id": "CNNVD-201406-061" }, { "db": "NVD", "id": "CVE-2014-2346" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow physically proximate attackers to cause a denial of service (infinite loop and process crash) via crafted input over a serial line. The COPA-DATA zenon DNP3 NG driver (DNP3 master) and the zenon DNP3 Process Gateway (DNP3 outstation) are products of the zenon industrial automation software belonging to the HMI/SCADA class. Multiple COPA-DATA Zenon product local denial of service vulnerabilities. \nLocal attackers can exploit this issue to crash the affected application, denying service to legitimate users", "sources": [ { "db": "NVD", "id": "CVE-2014-2346" }, { "db": "JVNDB", "id": "JVNDB-2014-002760" }, { "db": "CNVD", "id": "CNVD-2014-03596" }, { "db": "BID", "id": "67806" }, { "db": "IVD", "id": "f257e7ee-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d090-463f-11e9-ac5a-000c29342cb1" }, { "db": "IVD", "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-70285" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2346", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-14-154-01", "trust": 3.4 }, { "db": "CNNVD", "id": "CNNVD-201406-061", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2014-03596", "trust": 1.2 }, { "db": "BID", "id": "67806", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2014-002760", "trust": 0.8 }, { "db": "OSVDB", "id": "107668", "trust": 0.6 }, { "db": "IVD", "id": "F257E7EE-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "7D79D090-463F-11E9-AC5A-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "5E825B90-1ED2-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-70285", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "f257e7ee-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d090-463f-11e9-ac5a-000c29342cb1" }, { "db": "IVD", "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03596" }, { "db": "VULHUB", "id": "VHN-70285" }, { "db": "BID", "id": "67806" }, { "db": "JVNDB", "id": "JVNDB-2014-002760" }, { "db": "CNNVD", "id": "CNNVD-201406-061" }, { "db": "NVD", "id": "CVE-2014-2346" } ] }, "id": "VAR-201406-0146", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "f257e7ee-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d090-463f-11e9-ac5a-000c29342cb1" }, { "db": "IVD", "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03596" }, { "db": "VULHUB", "id": "VHN-70285" } ], "trust": 2.05 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "IVD", "id": "f257e7ee-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d090-463f-11e9-ac5a-000c29342cb1" }, { "db": "IVD", "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03596" } ] }, "last_update_date": "2024-11-23T22:31:19.333000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Article ID: 178001", "trust": 0.8, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase" }, { "title": "Article ID: 179444", "trust": 0.8, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase" }, { "title": "Patch for multiple COPA-DATA Zenon product local denial of service vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/46389" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03596" }, { "db": "JVNDB", "id": "JVNDB-2014-002760" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-70285" }, { "db": "JVNDB", "id": "JVNDB-2014-002760" }, { "db": "NVD", "id": "CVE-2014-2346" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-154-01" }, { "trust": 1.6, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=814\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase" }, { "trust": 1.6, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=813\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2346" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2346" }, { "trust": 0.6, "url": "http://osvdb.com/show/osvdb/107668" }, { "trust": 0.3, "url": "http://www.copadata.com/en/home.html" }, { "trust": 0.1, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=813\u0026amp;tx_hrfaq_pi1%5baction%5d=show\u0026amp;tx_hrfaq_pi1%5bcontroller%5d=knowledgebase" }, { "trust": 0.1, "url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=814\u0026amp;tx_hrfaq_pi1%5baction%5d=show\u0026amp;tx_hrfaq_pi1%5bcontroller%5d=knowledgebase" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03596" }, { "db": "VULHUB", "id": "VHN-70285" }, { "db": "BID", "id": "67806" }, { "db": "JVNDB", "id": "JVNDB-2014-002760" }, { "db": "CNNVD", "id": "CNNVD-201406-061" }, { "db": "NVD", "id": "CVE-2014-2346" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "f257e7ee-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d090-463f-11e9-ac5a-000c29342cb1" }, { "db": "IVD", "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03596" }, { "db": "VULHUB", "id": "VHN-70285" }, { "db": "BID", "id": "67806" }, { "db": "JVNDB", "id": "JVNDB-2014-002760" }, { "db": "CNNVD", "id": "CNNVD-201406-061" }, { "db": "NVD", "id": "CVE-2014-2346" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-13T00:00:00", "db": "IVD", "id": "f257e7ee-2351-11e6-abef-000c29c66e3d" }, { "date": "2014-06-13T00:00:00", "db": "IVD", "id": "7d79d090-463f-11e9-ac5a-000c29342cb1" }, { "date": "2014-06-13T00:00:00", "db": "IVD", "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d" }, { "date": "2014-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2014-03596" }, { "date": "2014-06-05T00:00:00", "db": "VULHUB", "id": "VHN-70285" }, { "date": "2014-06-03T00:00:00", "db": "BID", "id": "67806" }, { "date": "2014-06-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002760" }, { "date": "2014-06-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-061" }, { "date": "2014-06-05T17:55:06.027000", "db": "NVD", "id": "CVE-2014-2346" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2014-03596" }, { "date": "2014-06-05T00:00:00", "db": "VULHUB", "id": "VHN-70285" }, { "date": "2014-06-03T00:00:00", "db": "BID", "id": "67806" }, { "date": "2014-06-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002760" }, { "date": "2014-06-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-061" }, { "date": "2024-11-21T02:06:07.513000", "db": "NVD", "id": "CVE-2014-2346" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "67806" }, { "db": "CNNVD", "id": "CNNVD-201406-061" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "COPA-DATA zenon DNP3 NG Drivers and zenon DNP3 Process Gateway Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002760" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation", "sources": [ { "db": "IVD", "id": "f257e7ee-2351-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "7d79d090-463f-11e9-ac5a-000c29342cb1" }, { "db": "IVD", "id": "5e825b90-1ed2-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201406-061" } ], "trust": 1.2 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…