var-201607-0387
Vulnerability from variot

Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 does not invalidate credentials upon a logout action, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. Rockwell Automation FactoryTalk EnergyMetrix Contains a vulnerability that allows access rights to be obtained. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. http://cwe.mitre.org/data/definitions/285.htmlA third party may gain access by using an unattended workstation. Rockwell Automation FactoryTalk EnergyMetrix is a Web-based software management package for capturing, analyzing, storing, and sharing energy data from Rockwell Automation. Rockwell Automation FactoryTalk EnergyMetrix is prone to multiple security vulnerabilities. An attacker may exploit these issues to perform unauthorized actions or to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201607-0387",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "factorytalk energrymetrix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rockwellautomation",
        "version": "2.10.00"
      },
      {
        "model": "factorytalk energymetrix",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "rockwell automation",
        "version": "2.20.00"
      },
      {
        "model": "automation factorytalk energymetrix",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "rockwell",
        "version": "2.20.00"
      },
      {
        "model": "factorytalk energrymetrix",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "rockwellautomation",
        "version": "2.10.00"
      },
      {
        "model": "automation factorytalk energymetrix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "2.10"
      },
      {
        "model": "automation factorytalk energymetrix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "2.30"
      },
      {
        "model": "automation factorytalk energymetrix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "rockwell",
        "version": "2.20"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "factorytalk energrymetrix",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "BID",
        "id": "92135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:rockwellautomation:factorytalk_energrymetrix",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation",
    "sources": [
      {
        "db": "BID",
        "id": "92135"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-4531",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2016-4531",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-05947",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-93350",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-4531",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-4531",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-4531",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-05947",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201607-1015",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-93350",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 does not invalidate credentials upon a logout action, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. Rockwell Automation FactoryTalk EnergyMetrix Contains a vulnerability that allows access rights to be obtained. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. http://cwe.mitre.org/data/definitions/285.htmlA third party may gain access by using an unattended workstation. Rockwell Automation FactoryTalk EnergyMetrix is a Web-based software management package for capturing, analyzing, storing, and sharing energy data from Rockwell Automation. Rockwell Automation FactoryTalk EnergyMetrix is prone to multiple security vulnerabilities. \nAn attacker may exploit these issues to perform unauthorized actions or to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "BID",
        "id": "92135"
      },
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-4531",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-173-03",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "92135",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "FCEC3AA8-7B6B-4D5F-A5EC-8AE0369B645F",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "db": "BID",
        "id": "92135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      }
    ]
  },
  "id": "VAR-201607-0387",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      }
    ],
    "trust": 1.54285713
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:01:29.915000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "FactoryTalk EnergyMetrix",
        "trust": 0.8,
        "url": "http://www.rockwellautomation.com/rockwellsoftware/products/factorytalk-energymetrix.page"
      },
      {
        "title": "Find Downloads",
        "trust": 0.8,
        "url": "http://compatibility.rockwellautomation.com/Pages/MultiProductDownload.aspx?famID=1\u0026crumb=112"
      },
      {
        "title": "Patch for Rockwell Automation FactoryTalk EnergyMetrix Privilege Escalation Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/80038"
      },
      {
        "title": "Rockwell Automation FactoryTalk EnergyMetrix Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63344"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-285",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-173-03"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/92135"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4531"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4531"
      },
      {
        "trust": 0.3,
        "url": "http://www.rockwellautomation.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "db": "BID",
        "id": "92135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "db": "BID",
        "id": "92135"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-4531"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-03T00:00:00",
        "db": "IVD",
        "id": "fcec3aa8-7b6b-4d5f-a5ec-8ae0369b645f"
      },
      {
        "date": "2016-08-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "date": "2016-07-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "date": "2016-07-26T00:00:00",
        "db": "BID",
        "id": "92135"
      },
      {
        "date": "2016-08-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "date": "2016-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      },
      {
        "date": "2016-07-28T02:02:12.700000",
        "db": "NVD",
        "id": "CVE-2016-4531"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-08-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-05947"
      },
      {
        "date": "2016-11-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-93350"
      },
      {
        "date": "2016-07-26T00:00:00",
        "db": "BID",
        "id": "92135"
      },
      {
        "date": "2016-08-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      },
      {
        "date": "2016-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      },
      {
        "date": "2024-11-21T02:52:25.123000",
        "db": "NVD",
        "id": "CVE-2016-4531"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Rockwell Automation FactoryTalk EnergyMetrix Vulnerabilities that gain access",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-004094"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201607-1015"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…