var-201702-0423
Vulnerability from variot
An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to2.10.10. There are multiple instances of heap-based buffer overflows that may allow malicious files to cause the execution of arbitrary code or a denial of service. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of dvp files. The process does not properly validate the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of current process. Delta Electronics WPLSoft and others are software control platforms used by Delta Electronics to edit the Delta DVP series of programmable logic controllers (PLCs). A heap buffer overflow vulnerability exists in several Delta Electronics products
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "wplsoft", "scope": null, "trust": 4.9, "vendor": "delta industrial automation", "version": null }, { "_id": null, "model": "ispsoft", "scope": null, "trust": 2.8, "vendor": "delta industrial automation", "version": null }, { "_id": null, "model": "ispsoft", "scope": "eq", "trust": 1.6, "vendor": "delta", "version": null }, { "_id": null, "model": "pmsoft", "scope": "eq", "trust": 1.6, "vendor": "delta", "version": null }, { "_id": null, "model": "wplsoft", "scope": "eq", "trust": 1.6, "vendor": "delta", "version": null }, { "_id": null, "model": "electronics inc ispsoft", "scope": "eq", "trust": 0.9, "vendor": "delta", "version": "3.0" }, { "_id": null, "model": "electronics inc pmsoft", "scope": "eq", "trust": 0.9, "vendor": "delta", "version": "2.0" }, { "_id": null, "model": "electronics inc wplsoft", "scope": "eq", "trust": 0.9, "vendor": "delta", "version": "2.0" }, { "_id": null, "model": "ispsoft", "scope": "lt", "trust": 0.8, "vendor": "delta", "version": "3.02.11" }, { "_id": null, "model": "pmsoft", "scope": "lt", "trust": 0.8, "vendor": "delta", "version": "2.10.10" }, { "_id": null, "model": "wplsoft", "scope": "lt", "trust": 0.8, "vendor": "delta", "version": "2.42.11" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "ispsoft", "version": null }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "pmsoft", "version": null }, { "_id": null, "model": null, "scope": "eq", "trust": 0.4, "vendor": "wplsoft", "version": null }, { "_id": null, "model": "electronics inc wplsoft", "scope": "ne", "trust": 0.3, "vendor": "delta", "version": "2.42.11" }, { "_id": null, "model": "electronics inc pmsoft", "scope": "ne", "trust": 0.3, "vendor": "delta", "version": "2.10.10" }, { "_id": null, "model": "electronics inc ispsoft", "scope": "ne", "trust": 0.3, "vendor": "delta", "version": "3.02.11" } ], "sources": [ { "db": "IVD", "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0" }, { "db": "IVD", "id": "e300285f-39ab-11e9-9115-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-16-661" }, { "db": "ZDI", "id": "ZDI-16-648" }, { "db": "ZDI", "id": "ZDI-16-653" }, { "db": "ZDI", "id": "ZDI-16-659" }, { "db": "ZDI", "id": "ZDI-16-649" }, { "db": "ZDI", "id": "ZDI-16-651" }, { "db": "ZDI", "id": "ZDI-16-656" }, { "db": "ZDI", "id": "ZDI-16-650" }, { "db": "ZDI", "id": "ZDI-16-658" }, { "db": "ZDI", "id": "ZDI-16-662" }, { "db": "ZDI", "id": "ZDI-16-655" }, { "db": "CNVD", "id": "CNVD-2016-12683" }, { "db": "BID", "id": "94887" }, { "db": "JVNDB", "id": "JVNDB-2016-007977" }, { "db": "CNNVD", "id": "CNNVD-201612-509" }, { "db": "NVD", "id": "CVE-2016-5805" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:delta_electronics:ispsoft", "vulnerable": true }, { "cpe22Uri": "cpe:/o:delta_electronics:pmsoft", "vulnerable": true }, { "cpe22Uri": "cpe:/o:delta_electronics:wplsoft", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007977" } ] }, "credits": { "_id": null, "data": "axt", "sources": [ { "db": "ZDI", "id": "ZDI-16-661" }, { "db": "ZDI", "id": "ZDI-16-648" }, { "db": "ZDI", "id": "ZDI-16-653" }, { "db": "ZDI", "id": "ZDI-16-659" }, { "db": "ZDI", "id": "ZDI-16-649" }, { "db": "ZDI", "id": "ZDI-16-651" }, { "db": "ZDI", "id": "ZDI-16-656" }, { "db": "ZDI", "id": "ZDI-16-650" }, { "db": "ZDI", "id": "ZDI-16-658" }, { "db": "ZDI", "id": "ZDI-16-662" }, { "db": "ZDI", "id": "ZDI-16-655" } ], "trust": 7.7 }, "cve": "CVE-2016-5805", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2016-5805", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 8.1, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-5805", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CVE-2016-5805", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2016-12683", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "e300285f-39ab-11e9-9115-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-94624", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2016-5805", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2016-5805", "trust": 7.0, "value": "MEDIUM" }, { "author": "nvd@nist.gov", "id": "CVE-2016-5805", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-5805", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2016-5805", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-12683", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201612-509", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "e300285f-39ab-11e9-9115-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-94624", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0" }, { "db": "IVD", "id": "e300285f-39ab-11e9-9115-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-16-661" }, { "db": "ZDI", "id": "ZDI-16-648" }, { "db": "ZDI", "id": "ZDI-16-653" }, { "db": "ZDI", "id": "ZDI-16-659" }, { "db": "ZDI", "id": "ZDI-16-649" }, { "db": "ZDI", "id": "ZDI-16-651" }, { "db": "ZDI", "id": "ZDI-16-656" }, { "db": "ZDI", "id": "ZDI-16-650" }, { "db": "ZDI", "id": "ZDI-16-658" }, { "db": "ZDI", "id": "ZDI-16-662" }, { "db": "ZDI", "id": "ZDI-16-655" }, { "db": "CNVD", "id": "CNVD-2016-12683" }, { "db": "VULHUB", "id": "VHN-94624" }, { "db": "JVNDB", "id": "JVNDB-2016-007977" }, { "db": "CNNVD", "id": "CNNVD-201612-509" }, { "db": "NVD", "id": "CVE-2016-5805" } ] }, "description": { "_id": null, "data": "An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to2.10.10. There are multiple instances of heap-based buffer overflows that may allow malicious files to cause the execution of arbitrary code or a denial of service. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of dvp files. The process does not properly validate the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of current process. Delta Electronics WPLSoft and others are software control platforms used by Delta Electronics to edit the Delta DVP series of programmable logic controllers (PLCs). A heap buffer overflow vulnerability exists in several Delta Electronics products", "sources": [ { "db": "NVD", "id": "CVE-2016-5805" }, { "db": "JVNDB", "id": "JVNDB-2016-007977" }, { "db": "ZDI", "id": "ZDI-16-651" }, { "db": "ZDI", "id": "ZDI-16-655" }, { "db": "ZDI", "id": "ZDI-16-662" }, { "db": "ZDI", "id": "ZDI-16-658" }, { "db": "ZDI", "id": "ZDI-16-656" }, { "db": "ZDI", "id": "ZDI-16-650" }, { "db": "ZDI", "id": "ZDI-16-649" }, { "db": "ZDI", "id": "ZDI-16-659" }, { "db": "ZDI", "id": "ZDI-16-653" }, { "db": "ZDI", "id": "ZDI-16-648" }, { "db": "ZDI", "id": "ZDI-16-661" }, { "db": "CNVD", "id": "CNVD-2016-12683" }, { "db": "BID", "id": "94887" }, { "db": "IVD", "id": "e300285f-39ab-11e9-9115-000c29342cb1" }, { "db": "IVD", "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0" }, { "db": "VULHUB", "id": "VHN-94624" } ], "trust": 9.81 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2016-5805", "trust": 11.5 }, { "db": "ICS CERT", "id": "ICSA-16-348-03", "trust": 3.4 }, { "db": "BID", "id": "94887", "trust": 2.6 }, { "db": "CNNVD", "id": "CNNVD-201612-509", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2016-12683", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2016-007977", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3915", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-661", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3865", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-648", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3930", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-653", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3916", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-659", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3859", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-649", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3909", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-651", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3911", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-656", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3860", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-650", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3913", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-658", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-4016", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-662", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3910", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-655", "trust": 0.7 }, { "db": "IVD", "id": "C1B2C178-9E7C-41AD-B334-53F292B6A7F0", "trust": 0.2 }, { "db": "IVD", "id": "E300285F-39AB-11E9-9115-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-94624", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0" }, { "db": "IVD", "id": "e300285f-39ab-11e9-9115-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-16-661" }, { "db": "ZDI", "id": "ZDI-16-648" }, { "db": "ZDI", "id": "ZDI-16-653" }, { "db": "ZDI", "id": "ZDI-16-659" }, { "db": "ZDI", "id": "ZDI-16-649" }, { "db": "ZDI", "id": "ZDI-16-651" }, { "db": "ZDI", "id": "ZDI-16-656" }, { "db": "ZDI", "id": "ZDI-16-650" }, { "db": "ZDI", "id": "ZDI-16-658" }, { "db": "ZDI", "id": "ZDI-16-662" }, { "db": "ZDI", "id": "ZDI-16-655" }, { "db": "CNVD", "id": "CNVD-2016-12683" }, { "db": "VULHUB", "id": "VHN-94624" }, { "db": "BID", "id": "94887" }, { "db": "JVNDB", "id": "JVNDB-2016-007977" }, { "db": "CNNVD", "id": "CNNVD-201612-509" }, { "db": "NVD", "id": "CVE-2016-5805" } ] }, "id": "VAR-201702-0423", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0" }, { "db": "IVD", "id": "e300285f-39ab-11e9-9115-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2016-12683" }, { "db": "VULHUB", "id": "VHN-94624" } ], "trust": 1.7167892175000001 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0" }, { "db": "IVD", "id": "e300285f-39ab-11e9-9115-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2016-12683" } ] }, "last_update_date": "2024-11-29T22:49:47.108000Z", "patch": { "_id": null, "data": [ { "title": "Delta Industrial Automation has issued an update to correct this vulnerability.", "trust": 7.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-348-03" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.deltaww.com/" }, { "title": "Patches for Multiple Delta Electronics Product Heap Buffer Overflow Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/86302" }, { "title": "Multiple Delta Electronics Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66543" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-661" }, { "db": "ZDI", "id": "ZDI-16-648" }, { "db": "ZDI", "id": "ZDI-16-653" }, { "db": "ZDI", "id": "ZDI-16-659" }, { "db": "ZDI", "id": "ZDI-16-649" }, { "db": "ZDI", "id": "ZDI-16-651" }, { "db": "ZDI", "id": "ZDI-16-656" }, { "db": "ZDI", "id": "ZDI-16-650" }, { "db": "ZDI", "id": "ZDI-16-658" }, { "db": "ZDI", "id": "ZDI-16-662" }, { "db": "ZDI", "id": "ZDI-16-655" }, { "db": "CNVD", "id": "CNVD-2016-12683" }, { "db": "JVNDB", "id": "JVNDB-2016-007977" }, { "db": "CNNVD", "id": "CNNVD-201612-509" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-94624" }, { "db": "JVNDB", "id": "JVNDB-2016-007977" }, { "db": "NVD", "id": "CVE-2016-5805" } ] }, "references": { "_id": null, "data": [ { "trust": 10.5, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-348-03" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/94887" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5805" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5805" }, { "trust": 0.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-348-03#footnotea_6tkr584" }, { "trust": 0.3, "url": "http://www.deltaww.com/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-661" }, { "db": "ZDI", "id": "ZDI-16-648" }, { "db": "ZDI", "id": "ZDI-16-653" }, { "db": "ZDI", "id": "ZDI-16-659" }, { "db": "ZDI", "id": "ZDI-16-649" }, { "db": "ZDI", "id": "ZDI-16-651" }, { "db": "ZDI", "id": "ZDI-16-656" }, { "db": "ZDI", "id": "ZDI-16-650" }, { "db": "ZDI", "id": "ZDI-16-658" }, { "db": "ZDI", "id": "ZDI-16-662" }, { "db": "ZDI", "id": "ZDI-16-655" }, { "db": "CNVD", "id": "CNVD-2016-12683" }, { "db": "VULHUB", "id": "VHN-94624" }, { "db": "BID", "id": "94887" }, { "db": "JVNDB", "id": "JVNDB-2016-007977" }, { "db": "CNNVD", "id": "CNNVD-201612-509" }, { "db": "NVD", "id": "CVE-2016-5805" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0", "ident": null }, { "db": "IVD", "id": "e300285f-39ab-11e9-9115-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-16-661", "ident": null }, { "db": "ZDI", "id": "ZDI-16-648", "ident": null }, { "db": "ZDI", "id": "ZDI-16-653", "ident": null }, { "db": "ZDI", "id": "ZDI-16-659", "ident": null }, { "db": "ZDI", "id": "ZDI-16-649", "ident": null }, { "db": "ZDI", "id": "ZDI-16-651", "ident": null }, { "db": "ZDI", "id": "ZDI-16-656", "ident": null }, { "db": "ZDI", "id": "ZDI-16-650", "ident": null }, { "db": "ZDI", "id": "ZDI-16-658", "ident": null }, { "db": "ZDI", "id": "ZDI-16-662", "ident": null }, { "db": "ZDI", "id": "ZDI-16-655", "ident": null }, { "db": "CNVD", "id": "CNVD-2016-12683", "ident": null }, { "db": "VULHUB", "id": "VHN-94624", "ident": null }, { "db": "BID", "id": "94887", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2016-007977", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201612-509", "ident": null }, { "db": "NVD", "id": "CVE-2016-5805", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2016-12-21T00:00:00", "db": "IVD", "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0", "ident": null }, { "date": "2016-12-21T00:00:00", "db": "IVD", "id": "e300285f-39ab-11e9-9115-000c29342cb1", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-661", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-648", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-653", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-659", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-649", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-651", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-656", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-650", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-658", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-662", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-655", "ident": null }, { "date": "2016-12-21T00:00:00", "db": "CNVD", "id": "CNVD-2016-12683", "ident": null }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-94624", "ident": null }, { "date": "2016-12-14T00:00:00", "db": "BID", "id": "94887", "ident": null }, { "date": "2017-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007977", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-509", "ident": null }, { "date": "2017-02-13T21:59:00.393000", "db": "NVD", "id": "CVE-2016-5805", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-661", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-648", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-653", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-659", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-649", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-651", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-656", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-650", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-658", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-662", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-655", "ident": null }, { "date": "2018-11-05T00:00:00", "db": "CNVD", "id": "CNVD-2016-12683", "ident": null }, { "date": "2017-03-14T00:00:00", "db": "VULHUB", "id": "VHN-94624", "ident": null }, { "date": "2016-12-20T01:09:00", "db": "BID", "id": "94887", "ident": null }, { "date": "2017-04-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007977", "ident": null }, { "date": "2016-12-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-509", "ident": null }, { "date": "2024-11-21T02:55:02.687000", "db": "NVD", "id": "CVE-2016-5805", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-509" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Delta Industrial Automation WPLSoft DVP File Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-16-648" }, { "db": "ZDI", "id": "ZDI-16-656" } ], "trust": 1.4 }, "type": { "_id": null, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "c1b2c178-9e7c-41ad-b334-53f292b6a7f0" }, { "db": "IVD", "id": "e300285f-39ab-11e9-9115-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201612-509" } ], "trust": 1.0 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.