var-201911-0880
Vulnerability from variot

A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server. Andover Continuum Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Schneider Electric Andover Continuum is a set of building automation solutions from Schneider Electric of France. The product includes functions such as heating ventilation and air conditioning and access control. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201911-0880",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "andover continuum 5740",
        "scope": "eq",
        "trust": 2.2,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9680",
        "scope": "eq",
        "trust": 2.2,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 5720",
        "scope": "eq",
        "trust": 2.2,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9200",
        "scope": "eq",
        "trust": 2.2,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9702",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum bcx4040",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum bcx9640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9900",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9941",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9924",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9940",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 5720",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 5740",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9680",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9702",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9900",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9924",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9940",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum 9941",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum bcx4040",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "andover continuum bcx9640",
        "scope": null,
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "electric andover continuum",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "9924"
      },
      {
        "model": "electric andover continuum",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "9702"
      },
      {
        "model": "electric andover continuum",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "9680"
      },
      {
        "model": "electric andover continuum",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "5740"
      },
      {
        "model": "electric andover continuum bcx4040",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric andover continuum bcx9640",
        "scope": null,
        "trust": 0.6,
        "vendor": "schneider",
        "version": null
      },
      {
        "model": "electric andover continuum",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "9900"
      },
      {
        "model": "electric andover continuum",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "9940"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum 9680",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum 9702",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum 9200",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum 5740",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum 5720",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum bcx4040",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum bcx9640",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum 9900",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum 9940",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum 9941",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "andover continuum 9924",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b797c169-264e-46d5-b55d-7367808e66c8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1208"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6853"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:schneider_electric:andover_continuum_5720_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:andover_continuum_5740_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:andover_continuum_9680_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:andover_continuum_9702_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:andover_continuum_9900_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:andover_continuum_9924_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:andover_continuum_9940_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:andover_continuum_9941_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:andover_continuum_bcx4040_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:schneider_electric:andover_continuum_bcx9640_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      }
    ]
  },
  "cve": "CVE-2019-6853",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2019-6853",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2019-45006",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "b797c169-264e-46d5-b55d-7367808e66c8",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-6853",
            "impactScore": 2.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.1,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2019-6853",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-6853",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-6853",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-45006",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201911-1208",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "b797c169-264e-46d5-b55d-7367808e66c8",
            "trust": 0.2,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b797c169-264e-46d5-b55d-7367808e66c8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1208"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6853"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server. Andover Continuum Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Schneider Electric Andover Continuum is a set of building automation solutions from Schneider Electric of France. The product includes functions such as heating ventilation and air conditioning and access control. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-6853"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      },
      {
        "db": "IVD",
        "id": "b797c169-264e-46d5-b55d-7367808e66c8"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-6853",
        "trust": 3.2
      },
      {
        "db": "SCHNEIDER",
        "id": "SEVD-2019-316-01",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45006",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1208",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012543",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "B797C169-264E-46D5-B55D-7367808E66C8",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b797c169-264e-46d5-b55d-7367808e66c8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1208"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6853"
      }
    ]
  },
  "id": "VAR-201911-0880",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "b797c169-264e-46d5-b55d-7367808e66c8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      }
    ],
    "trust": 1.390277775
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "b797c169-264e-46d5-b55d-7367808e66c8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:29:50.567000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SEVD-2019-316-01",
        "trust": 0.8,
        "url": "https://www.se.com/ww/en/download/document/SEVD-2019-316-01/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6853"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6853"
      },
      {
        "trust": 1.6,
        "url": "https://www.se.com/ww/en/download/document/sevd-2019-316-01/"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6853"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1208"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6853"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "b797c169-264e-46d5-b55d-7367808e66c8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1208"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-6853"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-12-12T00:00:00",
        "db": "IVD",
        "id": "b797c169-264e-46d5-b55d-7367808e66c8"
      },
      {
        "date": "2019-11-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      },
      {
        "date": "2019-12-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      },
      {
        "date": "2019-11-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201911-1208"
      },
      {
        "date": "2019-11-20T22:15:12.107000",
        "db": "NVD",
        "id": "CVE-2019-6853"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-12-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      },
      {
        "date": "2019-12-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012543"
      },
      {
        "date": "2019-12-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201911-1208"
      },
      {
        "date": "2024-11-21T04:47:17.047000",
        "db": "NVD",
        "id": "CVE-2019-6853"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1208"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Schneider Electric Andover Continuum Cross-Site Scripting Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "b797c169-264e-46d5-b55d-7367808e66c8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-45006"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1208"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-1208"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…