var-202003-0430
Vulnerability from variot
CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow. CODESYS Control runtime An out-of-bounds write vulnerability exists in the system.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The vulnerability stems from the fact that when a network system or product performs an operation on memory, the data boundary is not correctly verified, resulting in an incorrect read and write operation to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-0430", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": "eq", "trust": 1.2, "vendor": "control rte", "version": "*" }, { "model": "embedded target visu toolkit", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "control for linux", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "remote target visu toolkit", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "control for empc-a\\/imx6", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "hmi", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "control for raspberry pi", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "control for pfc100", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "control runtime system toolkit", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.0" }, { "model": "control win", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.9.80" }, { "model": "hmi", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.10.0" }, { "model": "control win", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "embedded target visu toolkit", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.0" }, { "model": "control runtime system toolkit", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "control for iot2000", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "control for beaglebone", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "remote target visu toolkit", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.0" }, { "model": "control for pfc200", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "control rte", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.8.60" }, { "model": "control rte", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "control for plcnext", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.40" }, { "model": "codesys control for beaglebone", "scope": null, "trust": 0.8, "vendor": "3s smart", "version": null }, { "model": "codesys control for empc-a/imx6", "scope": null, "trust": 0.8, "vendor": "3s smart", "version": null }, { "model": "codesys control for iot2000", "scope": null, "trust": 0.8, "vendor": "3s smart", "version": null }, { "model": "codesys control for linux", "scope": null, "trust": 0.8, "vendor": "3s smart", "version": null }, { "model": "codesys control for pfc100", "scope": null, "trust": 0.8, "vendor": "3s smart", "version": null }, { "model": "codesys control for pfc200", "scope": null, "trust": 0.8, "vendor": "3s smart", "version": null }, { "model": "codesys control for plcnext", "scope": null, "trust": 0.8, "vendor": "3s smart", "version": null }, { "model": "codesys control for raspberry pi", "scope": null, "trust": 0.8, "vendor": "3s smart", "version": null }, { "model": "codesys control rte v3", "scope": null, "trust": 0.8, "vendor": "3s smart", "version": null }, { "model": "codesys control runtime system toolkit", "scope": null, "trust": 0.8, "vendor": "3s smart", "version": null }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "control for beaglebone", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "control for empc a imx6", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "control for iot2000", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "control for linux", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "control for pfc100", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "control for pfc200", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "control for plcnext", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "control for raspberry pi", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "control runtime system toolkit", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "control win", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "embedded target visu toolkit", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "hmi", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "remote target visu toolkit", "version": "*" }, { "model": "software solutions codesys web server", "scope": "eq", "trust": 0.6, "vendor": "3s smart", "version": "v3\u003c3.5.15.40" } ], "sources": [ { "db": "IVD", "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac" }, { "db": "IVD", "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74" }, { "db": "IVD", "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3" }, { "db": "CNVD", "id": "CNVD-2020-20436" }, { "db": "JVNDB", "id": "JVNDB-2020-003551" }, { "db": "NVD", "id": "CVE-2020-10245" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:codesys:control_for_beaglebone_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_empc-a%2fimx6_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_iot2000_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_linux_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_pfc100_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_pfc200_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_plcnext", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_raspberry_pi_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_rte_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:runtime_system_toolkit", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003551" } ] }, "cve": "CVE-2020-10245", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2020-10245", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2020-003551", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-20436", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-10245", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-003551", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-10245", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-003551", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-20436", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202003-1628", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac" }, { "db": "IVD", "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74" }, { "db": "IVD", "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3" }, { "db": "CNVD", "id": "CNVD-2020-20436" }, { "db": "JVNDB", "id": "JVNDB-2020-003551" }, { "db": "CNNVD", "id": "CNNVD-202003-1628" }, { "db": "NVD", "id": "CVE-2020-10245" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow. CODESYS Control runtime An out-of-bounds write vulnerability exists in the system.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The vulnerability stems from the fact that when a network system or product performs an operation on memory, the data boundary is not correctly verified, resulting in an incorrect read and write operation to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow", "sources": [ { "db": "NVD", "id": "CVE-2020-10245" }, { "db": "JVNDB", "id": "JVNDB-2020-003551" }, { "db": "CNVD", "id": "CNVD-2020-20436" }, { "db": "IVD", "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac" }, { "db": "IVD", "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74" }, { "db": "IVD", "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-10245", "trust": 3.6 }, { "db": "TENABLE", "id": "TRA-2020-16", "trust": 1.6 }, { "db": "CNVD", "id": "CNVD-2020-20436", "trust": 1.2 }, { "db": "CNNVD", "id": "CNNVD-202003-1628", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2020-003551", "trust": 0.8 }, { "db": "IVD", "id": "74DCAC01-AA60-41E2-8AA0-8EFB7CD113AC", "trust": 0.2 }, { "db": "IVD", "id": "FBB246FE-927C-4F97-9AC5-DA6A2AA9AA74", "trust": 0.2 }, { "db": "IVD", "id": "9D9A683C-8679-4E40-B76E-9DE9CCED9FC3", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac" }, { "db": "IVD", "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74" }, { "db": "IVD", "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3" }, { "db": "CNVD", "id": "CNVD-2020-20436" }, { "db": "JVNDB", "id": "JVNDB-2020-003551" }, { "db": "CNNVD", "id": "CNNVD-202003-1628" }, { "db": "NVD", "id": "CVE-2020-10245" } ] }, "id": "VAR-202003-0430", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac" }, { "db": "IVD", "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74" }, { "db": "IVD", "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3" }, { "db": "CNVD", "id": "CNVD-2020-20436" } ], "trust": 2.2 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "IVD", "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac" }, { "db": "IVD", "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74" }, { "db": "IVD", "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3" }, { "db": "CNVD", "id": "CNVD-2020-20436" } ] }, "last_update_date": "2024-11-23T22:48:07.759000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Advisory 2020-03", "trust": 0.8, "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=13078\u0026token=de344ca65252463cc581ef144e0c53bd97b8f211\u0026download=" }, { "title": "Patch for 3S-Smart Software Solutions CODESYS V3 web server buffer overflow vulnerability (CNVD-2020-20436)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/211803" }, { "title": "3S-Smart Software Solutions CODESYS V3 web server Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=115312" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20436" }, { "db": "JVNDB", "id": "JVNDB-2020-003551" }, { "db": "CNNVD", "id": "CNNVD-202003-1628" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003551" }, { "db": "NVD", "id": "CVE-2020-10245" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.tenable.com/security/research/tra-2020-16" }, { "trust": 1.6, "url": "https://customers.codesys.com/index.php?eid=dumpfile\u0026t=f\u0026f=13078\u0026token=de344ca65252463cc581ef144e0c53bd97b8f211\u0026download=" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10245" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10245" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003551" }, { "db": "CNNVD", "id": "CNNVD-202003-1628" }, { "db": "NVD", "id": "CVE-2020-10245" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac" }, { "db": "IVD", "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74" }, { "db": "IVD", "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3" }, { "db": "CNVD", "id": "CNVD-2020-20436" }, { "db": "JVNDB", "id": "JVNDB-2020-003551" }, { "db": "CNNVD", "id": "CNNVD-202003-1628" }, { "db": "NVD", "id": "CVE-2020-10245" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-26T00:00:00", "db": "IVD", "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac" }, { "date": "2020-03-26T00:00:00", "db": "IVD", "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74" }, { "date": "2020-03-26T00:00:00", "db": "IVD", "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3" }, { "date": "2020-03-31T00:00:00", "db": "CNVD", "id": "CNVD-2020-20436" }, { "date": "2020-04-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003551" }, { "date": "2020-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-1628" }, { "date": "2020-03-26T04:15:11.533000", "db": "NVD", "id": "CVE-2020-10245" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-31T00:00:00", "db": "CNVD", "id": "CNVD-2020-20436" }, { "date": "2020-04-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-003551" }, { "date": "2020-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-1628" }, { "date": "2024-11-21T04:55:03.253000", "db": "NVD", "id": "CVE-2020-10245" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-1628" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CODESYS Control runtime Out-of-bounds write vulnerabilities in the system", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-003551" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "74dcac01-aa60-41e2-8aa0-8efb7cd113ac" }, { "db": "IVD", "id": "fbb246fe-927c-4f97-9ac5-da6a2aa9aa74" }, { "db": "IVD", "id": "9d9a683c-8679-4e40-b76e-9de9cced9fc3" }, { "db": "CNNVD", "id": "CNNVD-202003-1628" } ], "trust": 1.2 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…