var-202004-0525
Vulnerability from variot
Nanometrics Centaur through 4.3.23 and TitanSMA through 4.2.20 mishandle access control for the syslog log. Nanometrics Centaur and TitanSMA Is vulnerable to a lack of resource release after a valid lifetime.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Nanometrics Centaur and Nanometrics TitanSMA are both data loggers from Nanometrics, Canada.
There are security vulnerabilities in Nanometrics Centaur 4.3.23 and earlier versions and TitanSMA 4.2.20 and earlier versions. No detailed vulnerability details are currently provided. The Centaur digital recorder is a portable geophysical sensing acquisition system that consists of a high-resolution 24-bit ADC, a precision GNSS-based clock, and removable storage capabilities. Its ease of use simplifies high performance geophysical sensing deployments in both remote and networked environments. Optimized for seismicity monitoring, the Centaur is also well-suited for infrasound and similar geophysical sensor recording applications requiring sample rates up to 5000 sps.
The TitanSMA is a strong motion accelerograph designed for high precision observational and structural engineering applications, where scientists and engineers require exceptional dynamic range over a wide frequency band.An information disclosure vulnerability exists when Centaur and TitanSMA fail to properly protectcritical system logs such as 'syslog'. Additionally, the implemented Jetty version (9.4.z-SNAPSHOT)suffers from a memory leak of shared buffers that was (supposedly) patched in Jetty version 9.2.9.v20150224.As seen in the aforementioned products, the 'patched' version is still vulnerable to the buffer leakage.Chaining these vulnerabilities allows an unauthenticated adversary to remotely send malicious HTTPpackets, and cause the shared buffer to 'bleed' contents of shared memory and store these in systemlogs. Accessing these unprotected logfiles reveal parts of the leaked buffer (up to 17 bytes per sentpacket) which can be combined to leak sensitive data which can be used to perform session hijackingand authentication bypass scenarios.Tested on: Jetty 9.4.z-SNAPSHOT. Ignition is a powerful industrial application platform withfully integrated development tools for building SCADA, MES, and IIoTsolutions.Remote unauthenticated atackers are able to read arbitrary datafrom other HTTP sessions because Ignition uses a vulnerable Jetty server.When the Jetty web server receives a HTTP request, the below code is usedto parse through the HTTP headers and their associated values. The serverbegins by looping through each character for a given header value and checksthe following:
- On Line 1164, the server checks if the character is printable ASCII ornot a valid ASCII character.
- On Line 1172, the server checks if the character is a space or tab.
- On Line 1175, the server checks if the character is a line feed.
- If the character is non-printable ASCII (or less than 0x20), then allof the checks above are skipped over and the code throws an 'IllegalCharacter'exception on line 1186, passing in the illegal character and a shared buffer.
--------------------------------------------------------------------------------File: jetty-http\src\main\java\org\eclipse\jetty\http\HttpParser.java
---------------------------------------------------------------------------
920: protected boolean parseHeaders(ByteBuffer buffer)
921: {
[..snip..]
1163: case HEADER_VALUE:
1164: if (ch>HttpTokens.SPACE || ch<0)
1165: {
1166: _string.append((char)(0xff&ch));
1167: _length=_string.length();
1168: setState(State.HEADER_IN_VALUE);
1169: break;
1170: }
1171:
1172: if (ch==HttpTokens.SPACE || ch==HttpTokens.TAB)
1173: break;
1174:
1175: if (ch==HttpTokens.LINE_FEED)
1176: {
1177: if (_length > 0)
1178: {
1179: _value=null;
1180: _valueString=(_valueString==null)?takeString():(_valueString+" "+takeString());
1181: }
1182: setState(State.HEADER);
1183: break;
1184: }
1185:
1186: throw new IllegalCharacter(ch,buffer);
--------------------------------------------------------------------------------
Tested on: Microsoft Windows 7 Professional SP1 (EN)Microsoft Windows 7 Ultimate SP1 (EN)Ubuntu Linux 14.04Mac OS XHP-UX ItaniumJetty(9.2.z-SNAPSHOT)Java/1.8.0_73Java/1.8.0_66
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-0525", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "titansma", "scope": "eq", "trust": 1.5, "vendor": "nanometrics", "version": "4.2.20" }, { "model": "titansma", "scope": "lte", "trust": 1.0, "vendor": "nanometrics", "version": "4.2.20" }, { "model": "centaur", "scope": "lte", "trust": 1.0, "vendor": "nanometrics", "version": "4.3.23" }, { "model": "centaur", "scope": "eq", "trust": 0.9, "vendor": "nanometrics", "version": "4.3.23" }, { "model": "nanometrics", "scope": "eq", "trust": 0.6, "vendor": "nanometrics", "version": "4.3.23" }, { "model": "centaur / titansma unauthenticated remote memory leak exploit", "scope": "lt", "trust": 0.1, "vendor": "nanometrics", "version": "centaur \u0026lt;= 4.3.23" }, { "model": "centaur / titansma unauthenticated remote memory leak exploit", "scope": "lt", "trust": 0.1, "vendor": "nanometrics", "version": "titansma \u0026lt;= 4.2.20" }, { "model": "ignition", "scope": "eq", "trust": 0.1, "vendor": "inductive automation", "version": "7.8.1 (b2016012216) and 7.8.0 (b2015101414)" } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5562" }, { "db": "ZSL", "id": "ZSL-2016-5306" }, { "db": "CNVD", "id": "CNVD-2021-28723" }, { "db": "VULMON", "id": "CVE-2020-12134" }, { "db": "JVNDB", "id": "JVNDB-2020-004932" }, { "db": "NVD", "id": "CVE-2020-12134" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:nanometrics:centaur", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nanometrics:titansma", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-004932" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability discovered by byteGoblin", "sources": [ { "db": "ZSL", "id": "ZSL-2020-5562" } ], "trust": 0.1 }, "cve": "CVE-2020-12134", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-12134", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-004932", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2021-28723", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12134", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-004932", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12134", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-004932", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2021-28723", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202004-2084", "trust": 0.6, "value": "MEDIUM" }, { "author": "ZSL", "id": "ZSL-2020-5562", "trust": 0.1, "value": "(5/5)" }, { "author": "ZSL", "id": "ZSL-2016-5306", "trust": 0.1, "value": "(3/5)" }, { "author": "VULMON", "id": "CVE-2020-12134", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5562" }, { "db": "ZSL", "id": "ZSL-2016-5306" }, { "db": "CNVD", "id": "CNVD-2021-28723" }, { "db": "VULMON", "id": "CVE-2020-12134" }, { "db": "JVNDB", "id": "JVNDB-2020-004932" }, { "db": "CNNVD", "id": "CNNVD-202004-2084" }, { "db": "NVD", "id": "CVE-2020-12134" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nanometrics Centaur through 4.3.23 and TitanSMA through 4.2.20 mishandle access control for the syslog log. Nanometrics Centaur and TitanSMA Is vulnerable to a lack of resource release after a valid lifetime.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Nanometrics Centaur and Nanometrics TitanSMA are both data loggers from Nanometrics, Canada. \n\r\n\r\nThere are security vulnerabilities in Nanometrics Centaur 4.3.23 and earlier versions and TitanSMA 4.2.20 and earlier versions. No detailed vulnerability details are currently provided. The Centaur digital recorder is a portable geophysical sensing acquisition system that consists of a high-resolution 24-bit ADC, a precision GNSS-based clock, and removable storage capabilities. Its ease of use simplifies high performance geophysical sensing deployments in both remote and networked environments. Optimized for seismicity monitoring, the Centaur is also well-suited for infrasound and similar geophysical sensor recording applications requiring sample rates up to 5000 sps.\u003cbr/\u003e\u003cbr/\u003e The TitanSMA is a strong motion accelerograph designed for high precision observational and structural engineering applications, where scientists and engineers require exceptional dynamic range over a wide frequency band.An information disclosure vulnerability exists when Centaur and TitanSMA fail to properly protectcritical system logs such as \u0027syslog\u0027. Additionally, the implemented Jetty version (9.4.z-SNAPSHOT)suffers from a memory leak of shared buffers that was (supposedly) patched in Jetty version 9.2.9.v20150224.As seen in the aforementioned products, the \u0027patched\u0027 version is still vulnerable to the buffer leakage.Chaining these vulnerabilities allows an unauthenticated adversary to remotely send malicious HTTPpackets, and cause the shared buffer to \u0027bleed\u0027 contents of shared memory and store these in systemlogs. Accessing these unprotected logfiles reveal parts of the leaked buffer (up to 17 bytes per sentpacket) which can be combined to leak sensitive data which can be used to perform session hijackingand authentication bypass scenarios.Tested on: Jetty 9.4.z-SNAPSHOT. Ignition is a powerful industrial application platform withfully integrated development tools for building SCADA, MES, and IIoTsolutions.Remote unauthenticated atackers are able to read arbitrary datafrom other HTTP sessions because Ignition uses a vulnerable Jetty server.When the Jetty web server receives a HTTP request, the below code is usedto parse through the HTTP headers and their associated values. The serverbegins by looping through each character for a given header value and checksthe following:\u003cbr/\u003e\u003cbr/\u003e- On Line 1164, the server checks if the character is printable ASCII ornot a valid ASCII character.\u003cbr/\u003e- On Line 1172, the server checks if the character is a space or tab.\u003cbr/\u003e- On Line 1175, the server checks if the character is a line feed.\u003cbr/\u003e- If the character is non-printable ASCII (or less than 0x20), then allof the checks above are skipped over and the code throws an \u0027IllegalCharacter\u0027exception on line 1186, passing in the illegal character and a shared buffer.\u003cbr/\u003e\u003cbr/\u003e\t--------------------------------------------------------------------------------\u003cbr/\u003e\u003cbr/\u003e\u003ccode\u003eFile: jetty-http\\src\\main\\java\\org\\eclipse\\jetty\\http\\HttpParser.java\u003cbr/\u003e---------------------------------------------------------------------------\u003cbr/\u003e920: protected boolean parseHeaders(ByteBuffer buffer)\u003cbr/\u003e921: {\u003cbr/\u003e[..snip..]\u003cbr/\u003e1163: case HEADER_VALUE:\u003cbr/\u003e1164: if (ch\u0026gt;HttpTokens.SPACE || ch\u0026lt;0)\u003cbr/\u003e1165: {\u003cbr/\u003e1166: _string.append((char)(0xff\u0026amp;ch));\u003cbr/\u003e1167: _length=_string.length();\u003cbr/\u003e1168: setState(State.HEADER_IN_VALUE);\u003cbr/\u003e1169: break;\u003cbr/\u003e1170: }\u003cbr/\u003e1171:\u003cbr/\u003e1172: if (ch==HttpTokens.SPACE || ch==HttpTokens.TAB)\u003cbr/\u003e1173: break;\u003cbr/\u003e1174:\u003cbr/\u003e1175: if (ch==HttpTokens.LINE_FEED)\u003cbr/\u003e1176: {\u003cbr/\u003e1177: if (_length \u0026gt; 0)\u003cbr/\u003e1178: {\u003cbr/\u003e1179: _value=null;\u003cbr/\u003e1180: _valueString=(_valueString==null)?takeString():(_valueString+\" \"+takeString());\u003cbr/\u003e1181: }\u003cbr/\u003e1182: setState(State.HEADER);\u003cbr/\u003e1183: break;\u003cbr/\u003e1184: }\u003cbr/\u003e1185:\u003cbr/\u003e1186: throw new IllegalCharacter(ch,buffer);\u003cbr/\u003e\u003c/code\u003e\u003cbr/\u003e\t--------------------------------------------------------------------------------\u003cbr/\u003e\u003cbr/\u003eTested on: Microsoft Windows 7 Professional SP1 (EN)Microsoft Windows 7 Ultimate SP1 (EN)Ubuntu Linux 14.04Mac OS XHP-UX ItaniumJetty(9.2.z-SNAPSHOT)Java/1.8.0_73Java/1.8.0_66", "sources": [ { "db": "NVD", "id": "CVE-2020-12134" }, { "db": "JVNDB", "id": "JVNDB-2020-004932" }, { "db": "CNVD", "id": "CNVD-2021-28723" }, { "db": "ZSL", "id": "ZSL-2020-5562" }, { "db": "ZSL", "id": "ZSL-2016-5306" }, { "db": "VULMON", "id": "CVE-2020-12134" } ], "trust": 2.43 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.zeroscience.mk/codes/centaur3.txt", "trust": 0.1, "type": "poc" }, { "reference": "https://www.zeroscience.mk/codes/ignition_bufferbleed.txt", "trust": 0.1, "type": "poc" } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5562" }, { "db": "ZSL", "id": "ZSL-2016-5306" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-12134", "trust": 3.2 }, { "db": "ZSL", "id": "ZSL-2020-5562", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-004932", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-28723", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-2084", "trust": 0.6 }, { "db": "ZSL", "id": "ZSL-2016-5306", "trust": 0.2 }, { "db": "CXSECURITY", "id": "WLB-2020020091", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "156387", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "48098", "trust": 0.1 }, { "db": "NVD", "id": "CVE-2015-2080", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "39455", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135804", "trust": 0.1 }, { "db": "CXSECURITY", "id": "WLB-2016020156", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-12134", "trust": 0.1 } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5562" }, { "db": "ZSL", "id": "ZSL-2016-5306" }, { "db": "CNVD", "id": "CNVD-2021-28723" }, { "db": "VULMON", "id": "CVE-2020-12134" }, { "db": "JVNDB", "id": "JVNDB-2020-004932" }, { "db": "CNNVD", "id": "CNNVD-202004-2084" }, { "db": "NVD", "id": "CVE-2020-12134" } ] }, "id": "VAR-202004-0525", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-28723" } ], "trust": 1.4333333499999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-28723" } ] }, "last_update_date": "2024-11-23T22:07:43.059000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.nanometrics.ca/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-004932" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-772", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-004932" }, { "db": "NVD", "id": "CVE-2020-12134" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.zeroscience.mk/en/vulnerabilities/zsl-2020-5562.php" }, { "trust": 2.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12134" }, { "trust": 0.9, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12134" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2080" }, { "trust": 0.1, "url": "https://www.zeroscience.mk/en/vulnerabilities/zsl-2016-5306.php" }, { "trust": 0.1, "url": "https://packetstormsecurity.com/files/156387" }, { "trust": 0.1, "url": "https://cxsecurity.com/issue/wlb-2020020091" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/176352" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/48098" }, { "trust": 0.1, "url": "http://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html" }, { "trust": 0.1, "url": "https://github.com/gdssecurity/jetleak-testing-script/blob/master/jetleak_tester.py" }, { "trust": 0.1, "url": "http://git.eclipse.org/c/jetty/org.eclipse.jetty.project.git/plain/advisories/2015-02-24-httpparser-error-buffer-bleed.md" }, { "trust": 0.1, "url": "https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2080" }, { "trust": 0.1, "url": "https://cxsecurity.com/issue/wlb-2016020156" }, { "trust": 0.1, "url": "https://packetstormsecurity.com/files/135804" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/39455/" }, { "trust": 0.1, "url": "http://www.vfocus.net/art/20160222/12576.html" }, { "trust": 0.1, "url": "https://www.incibe.es/securityadvice/cert_en/early_warning/ics_advisories/fuga_datos_inductive_automation_ignition" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/772.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5562" }, { "db": "ZSL", "id": "ZSL-2016-5306" }, { "db": "CNVD", "id": "CNVD-2021-28723" }, { "db": "VULMON", "id": "CVE-2020-12134" }, { "db": "JVNDB", "id": "JVNDB-2020-004932" }, { "db": "CNNVD", "id": "CNNVD-202004-2084" }, { "db": "NVD", "id": "CVE-2020-12134" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZSL", "id": "ZSL-2020-5562" }, { "db": "ZSL", "id": "ZSL-2016-5306" }, { "db": "CNVD", "id": "CNVD-2021-28723" }, { "db": "VULMON", "id": "CVE-2020-12134" }, { "db": "JVNDB", "id": "JVNDB-2020-004932" }, { "db": "CNNVD", "id": "CNNVD-202004-2084" }, { "db": "NVD", "id": "CVE-2020-12134" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-15T00:00:00", "db": "ZSL", "id": "ZSL-2020-5562" }, { "date": "2016-02-16T00:00:00", "db": "ZSL", "id": "ZSL-2016-5306" }, { "date": "2021-04-16T00:00:00", "db": "CNVD", "id": "CNVD-2021-28723" }, { "date": "2020-04-24T00:00:00", "db": "VULMON", "id": "CVE-2020-12134" }, { "date": "2020-06-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-004932" }, { "date": "2020-04-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2084" }, { "date": "2020-04-24T01:15:11.367000", "db": "NVD", "id": "CVE-2020-12134" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-26T00:00:00", "db": "ZSL", "id": "ZSL-2020-5562" }, { "date": "2016-02-22T00:00:00", "db": "ZSL", "id": "ZSL-2016-5306" }, { "date": "2021-04-16T00:00:00", "db": "CNVD", "id": "CNVD-2021-28723" }, { "date": "2020-05-06T00:00:00", "db": "VULMON", "id": "CVE-2020-12134" }, { "date": "2020-06-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-004932" }, { "date": "2020-05-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2084" }, { "date": "2024-11-21T04:59:19.137000", "db": "NVD", "id": "CVE-2020-12134" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2084" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nanometrics Centaur and TitanSMA Vulnerability regarding lack of resource release after valid lifetime in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-004932" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2084" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.