var-201903-0187
Vulnerability from variot

Moxa IKS and EDS fails to properly validate user input, giving unauthenticated and authenticated attackers the ability to perform XSS attacks, which may be used to send a malicious script. Moxa IKS and EDS Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. MoxaIKS and EDS are Moxa's line of industrial switches. A cross-site scripting vulnerability exists in the MoxaIKS and EDS series. The vulnerability stems from a failure to properly validate user input. An attacker could exploit this vulnerability for a cross-site scripting attack. A cross-site-scripting vulnerability 2. Multiple stack-based buffer-overflow vulnerabilities 3. A security vulnerability 4. An information disclosure vulnerability 5. Multiple denial-of-service vulnerabilities 7. A security-bypass vulnerability 8. An authentication bypass vulnerability An attacker may leverage these issues to view arbitrary files within the context of the web server, execute arbitrary script code in the browser of the victim in the context of the affected site, steal cookie-based authentication credentials, gain access to sensitive information, compromise the application, access or modify data, reboot or crash of the application resulting in a denial of service condition, bypass security restrictions, or execute arbitrary code. This may lead to other vulnerabilities. The following Moxa products and versions are affected: IKS-G6824A series versions 4.5 and prior, EDS-405A series versions 3.8 and prior, EDS-408A series versions 3.8 and prior, and EDS-510A series versions 3.8 and prior. Moxa IKS-G6824A series are all products of Moxa Company in Taiwan, China. IKS-G6824A series is a series of rack-mount Ethernet switches. EDS-405A series is an EDS-405A series Ethernet switch. EDS-408A series is an EDS-408A series Ethernet switch

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201903-0187",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "iks-g6824a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "4.5"
      },
      {
        "model": "eds-510a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "3.8"
      },
      {
        "model": "eds-405a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "3.8"
      },
      {
        "model": "eds-408a",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "moxa",
        "version": "3.8"
      },
      {
        "model": "eds-405a series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "eds-408a series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "eds-510a series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iks-g6824a series",
        "scope": null,
        "trust": 0.8,
        "vendor": "moxa",
        "version": null
      },
      {
        "model": "iks-g6824a",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "\u003c=4.5"
      },
      {
        "model": "eds-405a",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "\u003c=3.8"
      },
      {
        "model": "eds-408a",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "\u003c=3.8"
      },
      {
        "model": "eds-510a",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "\u003c=3.8"
      },
      {
        "model": "iks-g6824a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "4.5"
      },
      {
        "model": "eds-510a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "3.8"
      },
      {
        "model": "eds-408a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "3.8"
      },
      {
        "model": "eds-405a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "3.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "iks g6824a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "eds 405a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "eds 408a",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "eds 510a",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "709e83c1-c0d8-464a-b6c8-07e965ae9b94"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      },
      {
        "db": "BID",
        "id": "107178"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6565"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:moxa:eds-405a_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:eds-408a_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:eds-510a_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:moxa:iks-g6824a_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ivan B, Sergey Fedonin, and Vyacheslav Moskvin of Positive Technologies Security reported these vulnerabilities to NCCIC.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-961"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-6565",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2019-6565",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-06178",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "709e83c1-c0d8-464a-b6c8-07e965ae9b94",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-158000",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-6565",
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.1,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2019-6565",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-6565",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-6565",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-06178",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201902-961",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "709e83c1-c0d8-464a-b6c8-07e965ae9b94",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-158000",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-6565",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "709e83c1-c0d8-464a-b6c8-07e965ae9b94"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158000"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-6565"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-961"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6565"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Moxa IKS and EDS fails to properly validate user input, giving unauthenticated and authenticated attackers the ability to perform XSS attacks, which may be used to send a malicious script. Moxa IKS and EDS Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. MoxaIKS and EDS are Moxa\u0027s line of industrial switches. A cross-site scripting vulnerability exists in the MoxaIKS and EDS series. The vulnerability stems from a failure to properly validate user input. An attacker could exploit this vulnerability for a cross-site scripting attack. A cross-site-scripting vulnerability\n2. Multiple stack-based buffer-overflow vulnerabilities\n3. A security vulnerability\n4. An information disclosure vulnerability\n5. Multiple denial-of-service vulnerabilities\n7.  A security-bypass vulnerability\n8. An authentication bypass vulnerability\nAn attacker may leverage these issues to view arbitrary files within the context of the web server, execute arbitrary script code in the browser of the victim in the context of the affected site, steal cookie-based authentication credentials, gain access to sensitive information, compromise the  application, access or modify data, reboot or crash of the application resulting in a denial of service condition, bypass  security restrictions, or execute arbitrary code. This may lead to other vulnerabilities. \nThe following Moxa products and versions are affected:\nIKS-G6824A series versions 4.5 and prior,\nEDS-405A series versions 3.8 and prior,\nEDS-408A series versions 3.8 and prior, and\nEDS-510A series versions 3.8 and prior. Moxa IKS-G6824A series are all products of Moxa Company in Taiwan, China. IKS-G6824A series is a series of rack-mount Ethernet switches. EDS-405A series is an EDS-405A series Ethernet switch. EDS-408A series is an EDS-408A series Ethernet switch",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-6565"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      },
      {
        "db": "BID",
        "id": "107178"
      },
      {
        "db": "IVD",
        "id": "709e83c1-c0d8-464a-b6c8-07e965ae9b94"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158000"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-6565"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-6565",
        "trust": 3.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-057-01",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "107178",
        "trust": 2.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-961",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-06178",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201",
        "trust": 0.8
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.0597",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "709E83C1-C0D8-464A-B6C8-07E965AE9B94",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-158000",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-6565",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "709e83c1-c0d8-464a-b6c8-07e965ae9b94"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158000"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-6565"
      },
      {
        "db": "BID",
        "id": "107178"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-961"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6565"
      }
    ]
  },
  "id": "VAR-201903-0187",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "709e83c1-c0d8-464a-b6c8-07e965ae9b94"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158000"
      }
    ],
    "trust": 1.61445105
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "709e83c1-c0d8-464a-b6c8-07e965ae9b94"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:52:28.310000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.moxa.com/en/"
      },
      {
        "title": "Patch for MoxaIKS and EDS Cross-Site Scripting Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/155215"
      },
      {
        "title": "Multiple Moxa Fixes for product cross-site scripting vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89676"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-961"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-158000"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6565"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.6,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-057-01"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/107178"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6565"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6565"
      },
      {
        "trust": 0.6,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-057-01"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/76138"
      },
      {
        "trust": 0.3,
        "url": "http://www.moxastore.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/79.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158000"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-6565"
      },
      {
        "db": "BID",
        "id": "107178"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-961"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6565"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "709e83c1-c0d8-464a-b6c8-07e965ae9b94"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      },
      {
        "db": "VULHUB",
        "id": "VHN-158000"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-6565"
      },
      {
        "db": "BID",
        "id": "107178"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-961"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6565"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-03-05T00:00:00",
        "db": "IVD",
        "id": "709e83c1-c0d8-464a-b6c8-07e965ae9b94"
      },
      {
        "date": "2019-03-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      },
      {
        "date": "2019-03-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-158000"
      },
      {
        "date": "2019-03-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-6565"
      },
      {
        "date": "2019-02-26T00:00:00",
        "db": "BID",
        "id": "107178"
      },
      {
        "date": "2019-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      },
      {
        "date": "2019-02-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201902-961"
      },
      {
        "date": "2019-03-05T20:29:00.577000",
        "db": "NVD",
        "id": "CVE-2019-6565"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-03-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-06178"
      },
      {
        "date": "2022-11-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-158000"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-6565"
      },
      {
        "date": "2019-02-26T00:00:00",
        "db": "BID",
        "id": "107178"
      },
      {
        "date": "2019-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      },
      {
        "date": "2019-10-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201902-961"
      },
      {
        "date": "2024-11-21T04:46:42.397000",
        "db": "NVD",
        "id": "CVE-2019-6565"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-961"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Moxa IKS and  EDS Vulnerable to cross-site scripting",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-002201"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-961"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…