var-201501-0438
Vulnerability from variot
GE Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware 4.2.1 and earlier and Multilink ML810, ML3000, and ML3100 switches with firmware 5.2.0 and earlier allow remote attackers to cause a denial of service (resource consumption or reboot) via crafted packets. The General Electric Company is the world's largest manufacturer of electrical equipment, electrical and electronic equipment. Multiple General Electric (GE) products have a denial of service vulnerability that allows an attacker to exploit a vulnerability to submit a special message to consume switch resources and restart the device. An attacker can exploit this issue to exhaust the switch resources and cause the device to reboot; causing denial-of-service condition. There are security vulnerabilities in several GE switches
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201501-0438",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "multilink ml1600",
"scope": "eq",
"trust": 1.2,
"vendor": "ge",
"version": null
},
{
"model": "multilink ml2400",
"scope": "eq",
"trust": 1.2,
"vendor": "ge",
"version": null
},
{
"model": "multilink ml800",
"scope": "eq",
"trust": 1.2,
"vendor": "ge",
"version": null
},
{
"model": "multilink ml1200",
"scope": "eq",
"trust": 1.2,
"vendor": "ge",
"version": null
},
{
"model": "multilink ml810",
"scope": "eq",
"trust": 1.2,
"vendor": "ge",
"version": null
},
{
"model": "multilink ml2400",
"scope": "lte",
"trust": 1.0,
"vendor": "ge",
"version": "4.2.1"
},
{
"model": "multilink ml3000",
"scope": "lte",
"trust": 1.0,
"vendor": "ge",
"version": "5.2.0"
},
{
"model": "multilink ml3100",
"scope": "lte",
"trust": 1.0,
"vendor": "ge",
"version": "5.2.0"
},
{
"model": "multilink ml800",
"scope": "lte",
"trust": 1.0,
"vendor": "ge",
"version": "4.2.1"
},
{
"model": "multilink ml810",
"scope": "lte",
"trust": 1.0,
"vendor": "ge",
"version": "5.2.0"
},
{
"model": "multilink ml3000",
"scope": "eq",
"trust": 1.0,
"vendor": "ge",
"version": "*"
},
{
"model": "multilink ml3100",
"scope": "eq",
"trust": 1.0,
"vendor": "ge",
"version": "*"
},
{
"model": "multilink ml1200",
"scope": "lte",
"trust": 1.0,
"vendor": "ge",
"version": "4.2.1"
},
{
"model": "multilink ml1600",
"scope": "lte",
"trust": 1.0,
"vendor": "ge",
"version": "4.2.1"
},
{
"model": "multilink ml3100",
"scope": "eq",
"trust": 0.8,
"vendor": "ge",
"version": "5.2.0"
},
{
"model": "multilink ml1200",
"scope": "eq",
"trust": 0.8,
"vendor": "ge",
"version": "4.2.1"
},
{
"model": "multilink ml1600",
"scope": "eq",
"trust": 0.8,
"vendor": "ge",
"version": "4.2.1"
},
{
"model": "multilink ml2400",
"scope": "eq",
"trust": 0.8,
"vendor": "ge",
"version": "4.2.1"
},
{
"model": "multilink ml3000",
"scope": "eq",
"trust": 0.8,
"vendor": "ge",
"version": "5.2.0"
},
{
"model": "multilink ml810",
"scope": "eq",
"trust": 0.8,
"vendor": "ge",
"version": "5.2.0"
},
{
"model": "multilink ml800",
"scope": "eq",
"trust": 0.8,
"vendor": "ge",
"version": "4.2.1"
},
{
"model": "multilink ml1200",
"scope": null,
"trust": 0.8,
"vendor": "general electric",
"version": null
},
{
"model": "multilink ml1200",
"scope": "lte",
"trust": 0.8,
"vendor": "general electric",
"version": "4.2.1"
},
{
"model": "multilink ml1600",
"scope": null,
"trust": 0.8,
"vendor": "general electric",
"version": null
},
{
"model": "multilink ml1600",
"scope": "lte",
"trust": 0.8,
"vendor": "general electric",
"version": "4.2.1"
},
{
"model": "multilink ml2400",
"scope": null,
"trust": 0.8,
"vendor": "general electric",
"version": null
},
{
"model": "multilink ml2400",
"scope": "lte",
"trust": 0.8,
"vendor": "general electric",
"version": "4.2.1"
},
{
"model": "multilink ml3000",
"scope": null,
"trust": 0.8,
"vendor": "general electric",
"version": null
},
{
"model": "multilink ml3000",
"scope": "lte",
"trust": 0.8,
"vendor": "general electric",
"version": "5.2.0"
},
{
"model": "multilink ml3100",
"scope": null,
"trust": 0.8,
"vendor": "general electric",
"version": null
},
{
"model": "multilink ml3100",
"scope": "lte",
"trust": 0.8,
"vendor": "general electric",
"version": "5.2.0"
},
{
"model": "multilink ml800",
"scope": null,
"trust": 0.8,
"vendor": "general electric",
"version": null
},
{
"model": "multilink ml800",
"scope": "lte",
"trust": 0.8,
"vendor": "general electric",
"version": "4.2.1"
},
{
"model": "multilink ml810",
"scope": null,
"trust": 0.8,
"vendor": "general electric",
"version": null
},
{
"model": "multilink ml810",
"scope": "lte",
"trust": 0.8,
"vendor": "general electric",
"version": "5.2.0"
},
{
"model": "electric ge multilink ml800",
"scope": null,
"trust": 0.6,
"vendor": "general",
"version": null
},
{
"model": "electric ge multilink ml1200",
"scope": null,
"trust": 0.6,
"vendor": "general",
"version": null
},
{
"model": "electric ge multilink ml1600",
"scope": null,
"trust": 0.6,
"vendor": "general",
"version": null
},
{
"model": "electric ge multilink ml2400 switches with",
"scope": "eq",
"trust": 0.6,
"vendor": "general",
"version": "4.2.1"
},
{
"model": "electric ge multilink ml810",
"scope": null,
"trust": 0.6,
"vendor": "general",
"version": null
},
{
"model": "electric ge multilink ml3000",
"scope": null,
"trust": 0.6,
"vendor": "general",
"version": null
},
{
"model": "electric ge multilink ml3100 switches with",
"scope": "eq",
"trust": 0.6,
"vendor": "general",
"version": "5.2.0"
},
{
"model": "electric multilink ml810",
"scope": "eq",
"trust": 0.3,
"vendor": "general",
"version": "5.1"
},
{
"model": "electric multilink ml800",
"scope": "eq",
"trust": 0.3,
"vendor": "general",
"version": "4.2"
},
{
"model": "electric multilink ml3100",
"scope": "eq",
"trust": 0.3,
"vendor": "general",
"version": "5.1"
},
{
"model": "electric multilink ml3000",
"scope": "eq",
"trust": 0.3,
"vendor": "general",
"version": "5.1"
},
{
"model": "electric multilink ml2400",
"scope": "eq",
"trust": 0.3,
"vendor": "general",
"version": "4.2"
},
{
"model": "electric multilink ml1600",
"scope": "eq",
"trust": 0.3,
"vendor": "general",
"version": "4.2"
},
{
"model": "electric multilink ml1200",
"scope": "eq",
"trust": 0.3,
"vendor": "general",
"version": "4.2"
},
{
"model": "electric multilink ml810",
"scope": "ne",
"trust": 0.3,
"vendor": "general",
"version": "5.2"
},
{
"model": "electric multilink ml800",
"scope": "ne",
"trust": 0.3,
"vendor": "general",
"version": "4.2.1"
},
{
"model": "electric multilink ml3100",
"scope": "ne",
"trust": 0.3,
"vendor": "general",
"version": "5.2"
},
{
"model": "electric multilink ml3000",
"scope": "ne",
"trust": 0.3,
"vendor": "general",
"version": "5.2"
},
{
"model": "electric multilink ml2400",
"scope": "ne",
"trust": 0.3,
"vendor": "general",
"version": "4.2.1"
},
{
"model": "electric multilink ml1600",
"scope": "ne",
"trust": 0.3,
"vendor": "general",
"version": "4.2.1"
},
{
"model": "electric multilink ml1200",
"scope": "ne",
"trust": 0.3,
"vendor": "general",
"version": "4.2.1"
},
{
"model": "multilink ml3000",
"scope": null,
"trust": 0.2,
"vendor": "ge",
"version": null
},
{
"model": "multilink ml3100",
"scope": null,
"trust": 0.2,
"vendor": "ge",
"version": null
},
{
"model": "multilink ml810/ml3000//ml3100",
"scope": "lte",
"trust": 0.2,
"vendor": "ge",
"version": "\u003c=5.2.0"
},
{
"model": "multilink ml800/ml1200/ml1600/ml2400",
"scope": "lte",
"trust": 0.2,
"vendor": "ge",
"version": "\u003c=4.2.1"
}
],
"sources": [
{
"db": "IVD",
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-00450"
},
{
"db": "BID",
"id": "72066"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007734"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-349"
},
{
"db": "NVD",
"id": "CVE-2014-5418"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:ge:multilink_ml1200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ge:multilink_ml1200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ge:multilink_ml1600",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ge:multilink_ml1600_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ge:multilink_ml2400",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ge:multilink_ml2400_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ge:multilink_ml3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ge:multilink_ml3000_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ge:multilink_ml3100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ge:multilink_ml3100_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ge:multilink_ml800",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ge:multilink_ml800_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ge:multilink_ml810",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ge:multilink_ml810_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-007734"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Eireann Leverett of IOActive",
"sources": [
{
"db": "BID",
"id": "72066"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-349"
}
],
"trust": 0.9
},
"cve": "CVE-2014-5418",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2014-5418",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-00450",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-73359",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-5418",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2014-5418",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2015-00450",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201501-349",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-73359",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-00450"
},
{
"db": "VULHUB",
"id": "VHN-73359"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007734"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-349"
},
{
"db": "NVD",
"id": "CVE-2014-5418"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "GE Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware 4.2.1 and earlier and Multilink ML810, ML3000, and ML3100 switches with firmware 5.2.0 and earlier allow remote attackers to cause a denial of service (resource consumption or reboot) via crafted packets. The General Electric Company is the world\u0027s largest manufacturer of electrical equipment, electrical and electronic equipment. Multiple General Electric (GE) products have a denial of service vulnerability that allows an attacker to exploit a vulnerability to submit a special message to consume switch resources and restart the device. \nAn attacker can exploit this issue to exhaust the switch resources and cause the device to reboot; causing denial-of-service condition. There are security vulnerabilities in several GE switches",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-5418"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007734"
},
{
"db": "CNVD",
"id": "CNVD-2015-00450"
},
{
"db": "BID",
"id": "72066"
},
{
"db": "IVD",
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-73359"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-5418",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-15-013-04",
"trust": 3.4
},
{
"db": "BID",
"id": "72066",
"trust": 1.6
},
{
"db": "CNNVD",
"id": "CNNVD-201501-349",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2015-00450",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007734",
"trust": 0.8
},
{
"db": "IVD",
"id": "A9025E9E-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-73359",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-00450"
},
{
"db": "VULHUB",
"id": "VHN-73359"
},
{
"db": "BID",
"id": "72066"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007734"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-349"
},
{
"db": "NVD",
"id": "CVE-2014-5418"
}
]
},
"id": "VAR-201501-0438",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-00450"
},
{
"db": "VULHUB",
"id": "VHN-73359"
}
],
"trust": 1.5322115600000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-00450"
}
]
},
"last_update_date": "2024-11-23T21:44:38.738000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "RSA Private Key \u0026 DoS Vulnerabilty",
"trust": 0.8,
"url": "http://www.gedigitalenergy.com/products/support/multilink/MLSB1214.pdf"
},
{
"title": "Patches for denial of service vulnerabilities in multiple General Electric (GE) products",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/54201"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00450"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007734"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-73359"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007734"
},
{
"db": "NVD",
"id": "CVE-2014-5418"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-013-04"
},
{
"trust": 1.7,
"url": "http://www.gedigitalenergy.com/products/support/multilink/mlsb1214.pdf"
},
{
"trust": 1.4,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-5418"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5418"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/72066/"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/72066"
},
{
"trust": 0.3,
"url": "http://www.ge.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-00450"
},
{
"db": "VULHUB",
"id": "VHN-73359"
},
{
"db": "BID",
"id": "72066"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007734"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-349"
},
{
"db": "NVD",
"id": "CVE-2014-5418"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-00450"
},
{
"db": "VULHUB",
"id": "VHN-73359"
},
{
"db": "BID",
"id": "72066"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007734"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-349"
},
{
"db": "NVD",
"id": "CVE-2014-5418"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-01-21T00:00:00",
"db": "IVD",
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2015-01-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-00450"
},
{
"date": "2015-01-17T00:00:00",
"db": "VULHUB",
"id": "VHN-73359"
},
{
"date": "2015-01-13T00:00:00",
"db": "BID",
"id": "72066"
},
{
"date": "2015-01-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-007734"
},
{
"date": "2015-01-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201501-349"
},
{
"date": "2015-01-17T02:59:01.223000",
"db": "NVD",
"id": "CVE-2014-5418"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-01-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-00450"
},
{
"date": "2015-01-21T00:00:00",
"db": "VULHUB",
"id": "VHN-73359"
},
{
"date": "2015-01-13T00:00:00",
"db": "BID",
"id": "72066"
},
{
"date": "2015-01-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-007734"
},
{
"date": "2015-01-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201501-349"
},
{
"date": "2024-11-21T02:12:00.657000",
"db": "NVD",
"id": "CVE-2014-5418"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201501-349"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural GE MultiLink ML Service disruption in series switch firmware (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-007734"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Resource management error",
"sources": [
{
"db": "IVD",
"id": "a9025e9e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201501-349"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.