var-201702-0416
Vulnerability from variot

An issue was discovered in Locus Energy LGate prior to 1.05H, LGate 50, LGate 100, LGate 101, LGate 120, and LGate 320. Locus Energy meters use a PHP script to manage the energy meter parameters for voltage monitoring and network configuration. The PHP code does not properly validate information that is sent in the POST request. Sauter is a leading provider of construction, room automation, energy management and equipment management. The Sauter NovaWeb Web HMI has a certification bypass vulnerability that an attacker can use to bypass security restrictions and perform unauthorized operations. An attacker may leverage this issue to inject and execute arbitrary commands. Sauter NovaWeb Web HMI is prone to an authentication-bypass vulnerability. Attackers can exploit this issue to gain unauthorized access and perform unauthorized actions. are the Web-based data acquisition systems of Locus Energy Corporation in the United States

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0416",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "lgate",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "locusenergy",
        "version": null
      },
      {
        "model": "lgate 100",
        "scope": null,
        "trust": 0.8,
        "vendor": "locus energy",
        "version": null
      },
      {
        "model": "lgate 101",
        "scope": null,
        "trust": 0.8,
        "vendor": "locus energy",
        "version": null
      },
      {
        "model": "lgate 120",
        "scope": null,
        "trust": 0.8,
        "vendor": "locus energy",
        "version": null
      },
      {
        "model": "lgate 320",
        "scope": null,
        "trust": 0.8,
        "vendor": "locus energy",
        "version": null
      },
      {
        "model": "lgate 50",
        "scope": null,
        "trust": 0.8,
        "vendor": "locus energy",
        "version": null
      },
      {
        "model": "lgate",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "locus energy",
        "version": "1.05h"
      },
      {
        "model": "novaweb web hmi",
        "scope": null,
        "trust": 0.6,
        "vendor": "sauter",
        "version": null
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "500"
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "3200"
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "1200"
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "1010"
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "1000"
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "0"
      },
      {
        "model": "energy lgate 1.05h",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "locus",
        "version": null
      },
      {
        "model": "novaweb web hmi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sauter",
        "version": "0"
      },
      {
        "model": "novaweb web hmi",
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sauter",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:locusenergy:lgate_100",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:locusenergy:lgate_101",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:locusenergy:lgate_120",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:locusenergy:lgate_320",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:locusenergy:lgate_50",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:locusenergy:lgate_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Maxim Rupp,Daniel Reich",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2016-5782",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2016-5782",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-12553",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-94601",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-5782",
            "impactScore": 4.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-5782",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-5782",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-12553",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201612-182",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-94601",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in Locus Energy LGate prior to 1.05H, LGate 50, LGate 100, LGate 101, LGate 120, and LGate 320. Locus Energy meters use a PHP script to manage the energy meter parameters for voltage monitoring and network configuration. The PHP code does not properly validate information that is sent in the POST request. Sauter is a leading provider of construction, room automation, energy management and equipment management. The Sauter NovaWeb Web HMI has a certification bypass vulnerability that an attacker can use to bypass security restrictions and perform unauthorized operations. \nAn attacker may leverage this issue to inject and execute arbitrary commands. Sauter NovaWeb Web HMI is prone to an authentication-bypass vulnerability. \nAttackers can exploit this issue to gain unauthorized access and perform unauthorized actions. are the Web-based data acquisition systems of Locus Energy Corporation in the United States",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      },
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      }
    ],
    "trust": 2.97
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-5782",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "94782",
        "trust": 2.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-231-01",
        "trust": 2.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-343-02",
        "trust": 1.5
      },
      {
        "db": "BID",
        "id": "94698",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "3927BA3A-7291-4EFE-8EB4-5C278DE9FCFD",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      }
    ]
  },
  "id": "VAR-201702-0416",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:13:14.350000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://locusenergy.com/"
      },
      {
        "title": "Multiple Locus Energy LGate Product Command Injection Vulnerability Fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66223"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/94782"
      },
      {
        "trust": 2.2,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-231-01-0"
      },
      {
        "trust": 1.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-343-02"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/94698"
      },
      {
        "trust": 0.9,
        "url": "http://www.sauter-controls.com/en.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5782"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5782"
      },
      {
        "trust": 0.3,
        "url": "http://locusenergy.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-19T00:00:00",
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "date": "2016-12-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "date": "2017-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "date": "2016-12-06T00:00:00",
        "db": "BID",
        "id": "94698"
      },
      {
        "date": "2016-12-08T00:00:00",
        "db": "BID",
        "id": "94782"
      },
      {
        "date": "2017-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "date": "2016-12-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      },
      {
        "date": "2017-02-13T21:59:00.190000",
        "db": "NVD",
        "id": "CVE-2016-5782"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "date": "2017-03-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "date": "2016-12-20T01:08:00",
        "db": "BID",
        "id": "94698"
      },
      {
        "date": "2019-04-12T21:00:00",
        "db": "BID",
        "id": "94782"
      },
      {
        "date": "2017-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "date": "2019-04-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      },
      {
        "date": "2024-11-21T02:55:00.387000",
        "db": "NVD",
        "id": "CVE-2016-5782"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sauter NovaWeb Web HMI Authentication Bypass Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Input validation error",
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ],
    "trust": 1.1
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…