var-201603-0067
Vulnerability from variot

Schneider Electric Telvent Sage 2300 RTUs with firmware before C3413-500-S01, and LANDAC II-2, Sage 1410, Sage 1430, Sage 1450, Sage 2400, and Sage 3030M RTUs with firmware before C3414-500-S02J2, allow remote attackers to obtain sensitive information from device memory by reading a padding field of an Ethernet packet. SchneiderElectricTelventSage3030M is an industrial data communication device used by Schneider Electric in France for the energy sector. The SchneiderElectricTelventSage3030M failed to properly populate the data fields in the Ethernet packet, allowing remote attackers to exploit the vulnerability to submit special requests for sensitive information. Schneider Electric Telvent Sage 3030M, etc

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201603-0067",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sage 2300",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "telvent rtu",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "schneider electric",
        "version": "c3414-500-s02j1"
      },
      {
        "model": "telvent rtu",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "c3413-500-001d3"
      },
      {
        "model": "telvent rtu",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "c3414-500-s02j1"
      },
      {
        "model": "landac ii-2",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "firmware  c3414-500-s02j2"
      },
      {
        "model": "sage 1410 rtu",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "firmware  c3414-500-s02j2"
      },
      {
        "model": "sage 1430 rtu",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "firmware  c3414-500-s02j2"
      },
      {
        "model": "sage 1450 rtu",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "firmware  c3414-500-s02j2"
      },
      {
        "model": "sage 2300",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "firmware  c3413-500-s01"
      },
      {
        "model": "sage 2400 rtu",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "firmware  c3414-500-s02j2"
      },
      {
        "model": "sage 3030m",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "firmware  c3414-500-s02j2"
      },
      {
        "model": "electric telvent sage 3030m c3414-500-s02j2",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric telvent sage c3414-500-s02j2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "1410\u003c"
      },
      {
        "model": "electric telvent sage c3414-500-s02j2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "1430\u003c"
      },
      {
        "model": "electric telvent sage c3414-500-s02j2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "1450\u003c"
      },
      {
        "model": "electric telvent sage c3413-500-s01",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "2300\u003c"
      },
      {
        "model": "electric telvent sage c3414-500-s02j2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "2400\u003c"
      },
      {
        "model": "electric landac ii-2 c3414-500-s02j2",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "telvent rtu",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5dc11a24-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-171"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6485"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:schneider_electric:sage_landac_ii-2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:schneider_electric:sage_1410_rtu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:schneider_electric:sage_1430_rtu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:schneider_electric:sage_1450_rtu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:schneider_electric:sage_2300",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:schneider_electric:sage_2400_rtu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:schneider_electric:sage_3030m",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      }
    ]
  },
  "cve": "CVE-2015-6485",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2015-6485",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-01662",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "5dc11a24-2351-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-84446",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 3.9,
            "id": "CVE-2015-6485",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-6485",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-6485",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-01662",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201603-171",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "5dc11a24-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-84446",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5dc11a24-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-171"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6485"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Schneider Electric Telvent Sage 2300 RTUs with firmware before C3413-500-S01, and LANDAC II-2, Sage 1410, Sage 1430, Sage 1450, Sage 2400, and Sage 3030M RTUs with firmware before C3414-500-S02J2, allow remote attackers to obtain sensitive information from device memory by reading a padding field of an Ethernet packet. SchneiderElectricTelventSage3030M is an industrial data communication device used by Schneider Electric in France for the energy sector. The SchneiderElectricTelventSage3030M failed to properly populate the data fields in the Ethernet packet, allowing remote attackers to exploit the vulnerability to submit special requests for sensitive information. Schneider Electric Telvent Sage 3030M, etc",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-6485"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      },
      {
        "db": "IVD",
        "id": "5dc11a24-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84446"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-6485",
        "trust": 3.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-070-01",
        "trust": 3.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-171",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01662",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "5DC11A24-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "BID",
        "id": "84315",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-84446",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5dc11a24-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-171"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6485"
      }
    ]
  },
  "id": "VAR-201603-0067",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "5dc11a24-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84446"
      }
    ],
    "trust": 1.8375
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "5dc11a24-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:01:33.859000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SAGE",
        "trust": 0.8,
        "url": "https://infrastructurecommunity.schneider-electric.com/community/products/infrastructure-products/sage"
      },
      {
        "title": "Patches for multiple SchneiderElectricTelvent product data breach vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/72718"
      },
      {
        "title": "Multiple Schneider Electric Telvent Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60531"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-171"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-84446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6485"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-070-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6485"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6485"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-171"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6485"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "5dc11a24-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      },
      {
        "db": "VULHUB",
        "id": "VHN-84446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-171"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-6485"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-03-16T00:00:00",
        "db": "IVD",
        "id": "5dc11a24-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2016-03-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      },
      {
        "date": "2016-03-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-84446"
      },
      {
        "date": "2016-03-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      },
      {
        "date": "2016-03-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201603-171"
      },
      {
        "date": "2016-03-12T02:59:00.113000",
        "db": "NVD",
        "id": "CVE-2015-6485"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-03-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-01662"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-84446"
      },
      {
        "date": "2016-03-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      },
      {
        "date": "2016-03-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201603-171"
      },
      {
        "date": "2024-11-21T02:35:03.790000",
        "db": "NVD",
        "id": "CVE-2015-6485"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-171"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Schneider Electric Vulnerabilities in which important information can be obtained from device memory in product firmware",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007003"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201603-171"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…