var-202112-0209
Vulnerability from variot
Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02CPU, MELSEC iQ-R Series R04/08/16/32/120(EN)CPU, MELSEC iQ-R Series R08/16/32/120SFCPU, MELSEC iQ-R Series R08/16/32/120PCPU, MELSEC iQ-R Series R08/16/32/120PSFCPU, MELSEC iQ-R Series R16/32/64MTCPU, MELSEC iQ-R Series R12CCPU-V, MELSEC Q Series Q03UDECPU, MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU, MELSEC Q Series Q03/04/06/13/26UDVCPU, MELSEC Q Series Q04/06/13/26UDPVCPU, MELSEC Q Series Q12DCCPU-V, MELSEC Q Series Q24DHCCPU-V(G), MELSEC Q Series Q24/26DHCCPU-LS, MELSEC Q Series MR-MQ100, MELSEC Q Series Q172/173DCPU-S1, MELSEC Q Series Q172/173DSCPU, MELSEC Q Series Q170MCPU, MELSEC Q Series Q170MSCPU(-S1), MELSEC L Series L02/06/26CPU(-P), MELSEC L Series L26CPU-(P)BT and MELIPC Series MI5122-VW allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery. MELSEC and MELIPC There are unspecified vulnerabilities in the series.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0209", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "melsec q26udecpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q100udecpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q13udpvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melipc mi5122-vw", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q24dhccpu-v\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r32 sfcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r16 cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q50udecpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q12dccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r32 pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "29" }, { "model": "melsec iq-r r04 pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "29" }, { "model": "melsec q03udvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melsec mr-mq100", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q06udvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melsec q172dscpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r08 cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "57" }, { "model": "melsec iq-r r16 cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "57" }, { "model": "melsec l26cpu-\\ bt", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r64 mtcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q04udecpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q173dscpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melsec iq-r r16 sfcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r32 mtcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r02 cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "24" }, { "model": "melsec q26udpvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melsec q04udpvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melsec l02cpu\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r08 cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r120 cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q170mscpu\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q173dcpu-s1", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r120 cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "57" }, { "model": "melsec q26dhccpu-ls", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melsec q10udecpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r120 sfcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec l26cpu\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q20udecpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r16 mtcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec l06cpu\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r08 sfcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r08 pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "29" }, { "model": "melsec q06udecpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r01 cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "24" }, { "model": "melsec iq-r r32 cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r04 cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "57" }, { "model": "melsec iq-r r12 ccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q04udvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melsec q06udpvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melsec iq-r r32 cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "57" }, { "model": "melsec q13udvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melsec iq-r r16 pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "29" }, { "model": "melsec q03udecpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q170mcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r120 pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "29" }, { "model": "melsec q26udvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": null }, { "model": "melsec iq-r r00 cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishi", "version": "24" }, { "model": "melsec q172dcpu-s1", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q24dhccpu-ls", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec q13udecpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "*" }, { "model": "melsec iq-r r02cpu", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r r32cpu", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r r00cpu", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r r01cpu", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r r120cpu", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r r04cpu", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r r16pcpu", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r r16cpu", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r r08pcpu", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r r08cpu", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-005273" }, { "db": "NVD", "id": "CVE-2021-20610" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mitsubishi Electric reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2338" } ], "trust": 0.6 }, "cve": "CVE-2021-20610", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-20610", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-20610", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-20610", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-20610", "trust": 1.0, "value": "HIGH" }, { "author": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "id": "CVE-2021-20610", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-20610", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-2338", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-005273" }, { "db": "CNNVD", "id": "CNNVD-202111-2338" }, { "db": "NVD", "id": "CVE-2021-20610" }, { "db": "NVD", "id": "CVE-2021-20610" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02CPU, MELSEC iQ-R Series R04/08/16/32/120(EN)CPU, MELSEC iQ-R Series R08/16/32/120SFCPU, MELSEC iQ-R Series R08/16/32/120PCPU, MELSEC iQ-R Series R08/16/32/120PSFCPU, MELSEC iQ-R Series R16/32/64MTCPU, MELSEC iQ-R Series R12CCPU-V, MELSEC Q Series Q03UDECPU, MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU, MELSEC Q Series Q03/04/06/13/26UDVCPU, MELSEC Q Series Q04/06/13/26UDPVCPU, MELSEC Q Series Q12DCCPU-V, MELSEC Q Series Q24DHCCPU-V(G), MELSEC Q Series Q24/26DHCCPU-LS, MELSEC Q Series MR-MQ100, MELSEC Q Series Q172/173DCPU-S1, MELSEC Q Series Q172/173DSCPU, MELSEC Q Series Q170MCPU, MELSEC Q Series Q170MSCPU(-S1), MELSEC L Series L02/06/26CPU(-P), MELSEC L Series L26CPU-(P)BT and MELIPC Series MI5122-VW allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery. MELSEC and MELIPC There are unspecified vulnerabilities in the series.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-20610" }, { "db": "JVNDB", "id": "JVNDB-2021-005273" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-20610", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-21-334-02", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU94434051", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2021-005273", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2021.4034", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021120105", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-2338", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-005273" }, { "db": "CNNVD", "id": "CNNVD-202111-2338" }, { "db": "NVD", "id": "CVE-2021-20610" } ] }, "id": "VAR-202112-0209", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5 }, "last_update_date": "2024-08-14T13:53:44.788000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Multiple\u00a0Denial-of-Service\u00a0Vulnerabilities\u00a0in\u00a0Ethernet\u00a0port\u00a0of\u00a0MELSEC\u00a0and\u00a0MELIPC\u00a0Series Mitsubishi Electric Corporation", "trust": 0.8, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-019_en.pdf" }, { "title": "Mitsubishi Electric MELSEC Q series Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=173808" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-005273" }, { "db": "CNNVD", "id": "CNNVD-202111-2338" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-130", "trust": 1.0 }, { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Other (CWE-Other) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-005273" }, { "db": "NVD", "id": "CVE-2021-20610" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://jvn.jp/vu/jvnvu94434051/index.html" }, { "trust": 2.2, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-334-02" }, { "trust": 1.6, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-019_en.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20610" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-334-02" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.4034" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021120105" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-005273" }, { "db": "CNNVD", "id": "CNNVD-202111-2338" }, { "db": "NVD", "id": "CVE-2021-20610" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2021-005273" }, { "db": "CNNVD", "id": "CNNVD-202111-2338" }, { "db": "NVD", "id": "CVE-2021-20610" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-005273" }, { "date": "2021-11-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2338" }, { "date": "2021-12-01T16:15:07.510000", "db": "NVD", "id": "CVE-2021-20610" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-10T04:49:00", "db": "JVNDB", "id": "JVNDB-2021-005273" }, { "date": "2022-11-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2338" }, { "date": "2023-11-09T09:15:07.737000", "db": "NVD", "id": "CVE-2021-20610" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2338" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "MELSEC\u00a0 and \u00a0MELIPC\u00a0 Vulnerabilities in the series", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-005273" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2338" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.