var-201711-0135
Vulnerability from variot

An Injection issue was discovered in Moxa NPort 5110 Version 2.2, NPort 5110 Version 2.4, NPort 5110 Version 2.6, NPort 5110 Version 2.7, NPort 5130 Version 3.7 and prior, and NPort 5150 Version 3.7 and prior. An attacker may be able to inject packets that could potentially disrupt the availability of the device. plural Moxa NPort The product contains an injection vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Moxa's NPort 5110, 5130 and 5150 are all Moxa's serial communication servers for connecting industrial serial devices to the network. A number of MoxaNport products have a denial of service vulnerability, and attackers launch denial of service attacks by injecting packets that can corrupt device availability. Multiple Moxa NPort products are prone to multiple denial-of-service vulnerabilities and an information-disclosure vulnerability. An attacker can exploit these issues to obtain sensitive information or cause excessive consumption of resources or crash of application resulting in a denial of service condition. A security vulnerability exists in the Moxa NPort 5110, 5130, and 5150

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0135",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nport 5110",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "moxa",
        "version": "2.2"
      },
      {
        "model": "nport 5110",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "moxa",
        "version": "2.4"
      },
      {
        "model": "nport 5110",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "moxa",
        "version": "2.6"
      },
      {
        "model": "nport 5110",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "moxa",
        "version": "2.7"
      },
      {
        "model": "nport 5130",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "moxa",
        "version": "3.7"
      },
      {
        "model": "nport 5150",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "moxa",
        "version": "3.7"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "moxa",
        "version": "51102.2"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "moxa",
        "version": "51102.4"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "moxa",
        "version": "51102.6"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "moxa",
        "version": "51102.7"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "5150\u003c=3.7"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "5130\u003c=3.7"
      },
      {
        "model": "nport 5130",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "3.7"
      },
      {
        "model": "nport 5150",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "3.7"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51503.7"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51503.6"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51503.5"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51303.7"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51303.6"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51303.5"
      },
      {
        "model": "nport",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51102.5"
      },
      {
        "model": "nport",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51503.8"
      },
      {
        "model": "nport",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51303.8"
      },
      {
        "model": "nport",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "51102.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "nport 5110",
        "version": "2.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "nport 5110",
        "version": "2.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "nport 5110",
        "version": "2.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "nport 5110",
        "version": "2.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "nport 5130",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "nport 5150",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "366a361a-2a16-4b72-84b4-ce092628d432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      },
      {
        "db": "BID",
        "id": "101885"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-642"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16719"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5110_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5130_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:nport_5150_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Florian Adamsky",
    "sources": [
      {
        "db": "BID",
        "id": "101885"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-16719",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-16719",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-34490",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "366a361a-2a16-4b72-84b4-ce092628d432",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-107669",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-16719",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-16719",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-16719",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-34490",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201711-642",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "366a361a-2a16-4b72-84b4-ce092628d432",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-107669",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "366a361a-2a16-4b72-84b4-ce092628d432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107669"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-642"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16719"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An Injection issue was discovered in Moxa NPort 5110 Version 2.2, NPort 5110 Version 2.4, NPort 5110 Version 2.6, NPort 5110 Version 2.7, NPort 5130 Version 3.7 and prior, and NPort 5150 Version 3.7 and prior. An attacker may be able to inject packets that could potentially disrupt the availability of the device. plural Moxa NPort The product contains an injection vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Moxa\u0027s NPort 5110, 5130 and 5150 are all Moxa\u0027s serial communication servers for connecting industrial serial devices to the network. A number of MoxaNport products have a denial of service vulnerability, and attackers launch denial of service attacks by injecting packets that can corrupt device availability. Multiple Moxa NPort products are prone to multiple denial-of-service vulnerabilities and an information-disclosure vulnerability. \nAn attacker can exploit these issues to obtain sensitive information or cause excessive consumption of resources or crash of application resulting in a denial of service condition. A security vulnerability exists in the Moxa NPort 5110, 5130, and 5150",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-16719"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      },
      {
        "db": "BID",
        "id": "101885"
      },
      {
        "db": "IVD",
        "id": "366a361a-2a16-4b72-84b4-ce092628d432"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107669"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-16719",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-320-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "101885",
        "trust": 2.0
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34490",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-642",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "366A361A-2A16-4B72-84B4-CE092628D432",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-107669",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "366a361a-2a16-4b72-84b4-ce092628d432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107669"
      },
      {
        "db": "BID",
        "id": "101885"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-642"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16719"
      }
    ]
  },
  "id": "VAR-201711-0135",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "366a361a-2a16-4b72-84b4-ce092628d432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107669"
      }
    ],
    "trust": 1.775
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "366a361a-2a16-4b72-84b4-ce092628d432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:12:48.356000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
        "trust": 0.8,
        "url": "http://japan.moxa.com/index.htm"
      },
      {
        "title": "Patches for several MoxaNport Product Denial of Service Vulnerabilities (CNVD-2017-34490)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/106358"
      },
      {
        "title": "Moxa NPort 5110 , 5130  and 5150 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76477"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-642"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-74",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-107669"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16719"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-320-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/101885"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16719"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16719"
      },
      {
        "trust": 0.3,
        "url": "https://www.moxa.com/support/download.aspx?type=support\u0026id=882"
      },
      {
        "trust": 0.3,
        "url": "https://www.moxa.com/support/download.aspx?type=support\u0026id=356"
      },
      {
        "trust": 0.3,
        "url": "http://www.moxa.com/product/vport_sdk.htm"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107669"
      },
      {
        "db": "BID",
        "id": "101885"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-642"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16719"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "366a361a-2a16-4b72-84b4-ce092628d432"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107669"
      },
      {
        "db": "BID",
        "id": "101885"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-642"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16719"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-17T00:00:00",
        "db": "IVD",
        "id": "366a361a-2a16-4b72-84b4-ce092628d432"
      },
      {
        "date": "2017-11-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      },
      {
        "date": "2017-11-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-107669"
      },
      {
        "date": "2017-11-16T00:00:00",
        "db": "BID",
        "id": "101885"
      },
      {
        "date": "2017-12-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      },
      {
        "date": "2017-11-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-642"
      },
      {
        "date": "2017-11-16T21:29:00.373000",
        "db": "NVD",
        "id": "CVE-2017-16719"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-34490"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-107669"
      },
      {
        "date": "2017-12-19T22:37:00",
        "db": "BID",
        "id": "101885"
      },
      {
        "date": "2017-12-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-642"
      },
      {
        "date": "2024-11-21T03:16:50.977000",
        "db": "NVD",
        "id": "CVE-2017-16719"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-642"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Moxa NPort Product injection vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010328"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "injection",
    "sources": [
      {
        "db": "IVD",
        "id": "366a361a-2a16-4b72-84b4-ce092628d432"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-642"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…