{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
affected_products: {
"@id": "https://www.variotdbs.pl/ref/affected_products",
},
configurations: {
"@id": "https://www.variotdbs.pl/ref/configurations",
},
credits: {
"@id": "https://www.variotdbs.pl/ref/credits",
},
cvss: {
"@id": "https://www.variotdbs.pl/ref/cvss/",
},
description: {
"@id": "https://www.variotdbs.pl/ref/description/",
},
exploit_availability: {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/",
},
external_ids: {
"@id": "https://www.variotdbs.pl/ref/external_ids/",
},
iot: {
"@id": "https://www.variotdbs.pl/ref/iot/",
},
iot_taxonomy: {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
},
patch: {
"@id": "https://www.variotdbs.pl/ref/patch/",
},
problemtype_data: {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/",
},
references: {
"@id": "https://www.variotdbs.pl/ref/references/",
},
sources: {
"@id": "https://www.variotdbs.pl/ref/sources/",
},
sources_release_date: {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/",
},
sources_update_date: {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/",
},
threat_type: {
"@id": "https://www.variotdbs.pl/ref/threat_type/",
},
title: {
"@id": "https://www.variotdbs.pl/ref/title/",
},
type: {
"@id": "https://www.variotdbs.pl/ref/type/",
},
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201809-1040",
affected_products: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
"@id": "https://www.variotdbs.pl/ref/sources",
},
},
data: [
{
model: ".net core",
scope: "eq",
trust: 2.3,
vendor: "microsoft",
version: "2.1",
},
{
model: "asp.net core",
scope: "eq",
trust: 2.3,
vendor: "microsoft",
version: "2.1",
},
{
model: "system.io.pipelines",
scope: null,
trust: 1.4,
vendor: "microsoft",
version: null,
},
{
model: ".net core",
scope: "lt",
trust: 1,
vendor: "microsoft",
version: "2.1.4",
},
{
model: "system.io.pipelines",
scope: "eq",
trust: 1,
vendor: "microsoft",
version: "4.5.0",
},
{
model: "asp.net core",
scope: "gte",
trust: 1,
vendor: "microsoft",
version: "2.1",
},
{
model: "asp.net core",
scope: "lt",
trust: 1,
vendor: "microsoft",
version: "2.1.4",
},
{
model: ".net core",
scope: "gte",
trust: 1,
vendor: "microsoft",
version: "2.1",
},
{
model: "system.io.pipelines",
scope: "eq",
trust: 0.6,
vendor: "microsoft",
version: null,
},
{
model: "system.io.pipelines",
scope: "eq",
trust: 0.3,
vendor: "microsoft",
version: "0",
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2019-00352",
},
{
db: "BID",
id: "105223",
},
{
db: "JVNDB",
id: "JVNDB-2018-009516",
},
{
db: "NVD",
id: "CVE-2018-8409",
},
{
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
},
configurations: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
children: {
"@container": "@list",
},
cpe_match: {
"@container": "@list",
},
data: {
"@container": "@list",
},
nodes: {
"@container": "@list",
},
},
data: [
{
CVE_data_version: "4.0",
nodes: [
{
children: [],
cpe_match: [
{
cpe23Uri: "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
cpe_name: [],
versionEndExcluding: "2.1.4",
versionStartIncluding: "2.1",
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
cpe_name: [],
versionEndExcluding: "2.1.4",
versionStartIncluding: "2.1",
vulnerable: true,
},
{
cpe23Uri: "cpe:2.3:a:microsoft:system.io.pipelines:4.5.0:*:*:*:*:*:*:*",
cpe_name: [],
vulnerable: true,
},
],
operator: "OR",
},
],
},
],
sources: [
{
db: "NVD",
id: "CVE-2018-8409",
},
],
},
credits: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "Microsoft",
sources: [
{
db: "BID",
id: "105223",
},
{
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
trust: 0.9,
},
cve: "CVE-2018-8409",
cvss: {
"@context": {
cvssV2: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
},
cvssV3: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
},
severity: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#",
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
"@id": "https://www.variotdbs.pl/ref/sources",
},
},
data: [
{
cvssV2: [
{
acInsufInfo: false,
accessComplexity: "LOW",
accessVector: "NETWORK",
authentication: "NONE",
author: "NVD",
availabilityImpact: "PARTIAL",
baseScore: 5,
confidentialityImpact: "NONE",
exploitabilityScore: 10,
impactScore: 2.9,
integrityImpact: "NONE",
obtainAllPrivilege: false,
obtainOtherPrivilege: false,
obtainUserPrivilege: false,
severity: "MEDIUM",
trust: 1,
userInteractionRequired: false,
vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
version: "2.0",
},
{
acInsufInfo: null,
accessComplexity: "Low",
accessVector: "Network",
authentication: "None",
author: "NVD",
availabilityImpact: "Partial",
baseScore: 5,
confidentialityImpact: "None",
exploitabilityScore: null,
id: "CVE-2018-8409",
impactScore: null,
integrityImpact: "None",
obtainAllPrivilege: null,
obtainOtherPrivilege: null,
obtainUserPrivilege: null,
severity: "Medium",
trust: 0.8,
userInteractionRequired: null,
vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
version: "2.0",
},
{
accessComplexity: "LOW",
accessVector: "NETWORK",
authentication: "NONE",
author: "CNVD",
availabilityImpact: "PARTIAL",
baseScore: 5,
confidentialityImpact: "NONE",
exploitabilityScore: 10,
id: "CNVD-2019-00352",
impactScore: 2.9,
integrityImpact: "NONE",
severity: "MEDIUM",
trust: 0.6,
vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
version: "2.0",
},
],
cvssV3: [
{
attackComplexity: "LOW",
attackVector: "NETWORK",
author: "NVD",
availabilityImpact: "HIGH",
baseScore: 7.5,
baseSeverity: "HIGH",
confidentialityImpact: "NONE",
exploitabilityScore: 3.9,
impactScore: 3.6,
integrityImpact: "NONE",
privilegesRequired: "NONE",
scope: "UNCHANGED",
trust: 1,
userInteraction: "NONE",
vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
version: "3.1",
},
{
attackComplexity: "Low",
attackVector: "Network",
author: "NVD",
availabilityImpact: "High",
baseScore: 7.5,
baseSeverity: "High",
confidentialityImpact: "None",
exploitabilityScore: null,
id: "CVE-2018-8409",
impactScore: null,
integrityImpact: "None",
privilegesRequired: "None",
scope: "Unchanged",
trust: 0.8,
userInteraction: "None",
vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
version: "3.0",
},
],
severity: [
{
author: "NVD",
id: "CVE-2018-8409",
trust: 1.8,
value: "HIGH",
},
{
author: "CNVD",
id: "CNVD-2019-00352",
trust: 0.6,
value: "MEDIUM",
},
{
author: "CNNVD",
id: "CNNVD-201809-539",
trust: 0.6,
value: "HIGH",
},
],
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2019-00352",
},
{
db: "JVNDB",
id: "JVNDB-2018-009516",
},
{
db: "NVD",
id: "CVE-2018-8409",
},
{
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
},
description: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "A denial of service vulnerability exists when System.IO.Pipelines improperly handles requests, aka \"System.IO.Pipelines Denial of Service.\" This affects .NET Core 2.1, System.IO.Pipelines, ASP.NET Core 2.1. The vendor System.IO.Pipelines As a \"denial of service\".Service operation interruption (DoS) There is a possibility of being put into a state. Microsoft .NET Core is a free and open source development platform. The platform has features such as multi-language support and cross-platform. ASP.NET Core is a cross-platform open source framework. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends. System.IO.Pipelines is a library for performing high-performance IO in .NET. A remote attacker can use this vulnerability to cause a denial of service by submitting a specially crafted request to the application",
sources: [
{
db: "NVD",
id: "CVE-2018-8409",
},
{
db: "JVNDB",
id: "JVNDB-2018-009516",
},
{
db: "CNVD",
id: "CNVD-2019-00352",
},
{
db: "CNNVD",
id: "CNNVD-201809-539",
},
{
db: "BID",
id: "105223",
},
],
trust: 2.97,
},
external_ids: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
db: "NVD",
id: "CVE-2018-8409",
trust: 3.3,
},
{
db: "BID",
id: "105223",
trust: 2.5,
},
{
db: "JVNDB",
id: "JVNDB-2018-009516",
trust: 0.8,
},
{
db: "CNVD",
id: "CNVD-2019-00352",
trust: 0.6,
},
{
db: "CNNVD",
id: "CNNVD-201809-539",
trust: 0.6,
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2019-00352",
},
{
db: "BID",
id: "105223",
},
{
db: "JVNDB",
id: "JVNDB-2018-009516",
},
{
db: "NVD",
id: "CVE-2018-8409",
},
{
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
},
id: "VAR-201809-1040",
iot: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: true,
sources: [
{
db: "CNVD",
id: "CNVD-2019-00352",
},
],
trust: 1.00589441,
},
iot_taxonomy: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
category: [
"IoT",
],
sub_category: null,
trust: 0.6,
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2019-00352",
},
],
},
last_update_date: "2023-12-18T12:56:48.612000Z",
patch: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
title: "CVE-2018-8409 | System.IO.Pipelines Denial of Service",
trust: 0.8,
url: "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8409",
},
{
title: "CVE-2018-8409 | System.IO.Pipelines のサービス拒否",
trust: 0.8,
url: "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/cve-2018-8409",
},
{
title: "Patch for Microsoft .NET Core, ASP.NET Core, and System.IO.Pipelines Denial of Service Vulnerability",
trust: 0.6,
url: "https://www.cnvd.org.cn/patchinfo/show/148781",
},
{
title: "Microsoft .NET Core , ASP.NET Core and System.IO.Pipelines Security vulnerabilities",
trust: 0.6,
url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=84810",
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2019-00352",
},
{
db: "JVNDB",
id: "JVNDB-2018-009516",
},
{
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
},
problemtype_data: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
problemtype: "NVD-CWE-noinfo",
trust: 1,
},
{
problemtype: "CWE-20",
trust: 0.8,
},
],
sources: [
{
db: "JVNDB",
id: "JVNDB-2018-009516",
},
{
db: "NVD",
id: "CVE-2018-8409",
},
],
},
references: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
data: {
"@container": "@list",
},
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: [
{
trust: 2.2,
url: "http://www.securityfocus.com/bid/105223",
},
{
trust: 1.9,
url: "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8409",
},
{
trust: 1.4,
url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8409",
},
{
trust: 0.8,
url: "https://www.ipa.go.jp/security/ciadr/vul/20180912-ms.html",
},
{
trust: 0.8,
url: "http://www.jpcert.or.jp/at/2018/at180038.html",
},
{
trust: 0.8,
url: "https://nvd.nist.gov/vuln/detail/cve-2018-8409",
},
{
trust: 0.3,
url: "http://www.microsoft.com",
},
],
sources: [
{
db: "CNVD",
id: "CNVD-2019-00352",
},
{
db: "BID",
id: "105223",
},
{
db: "JVNDB",
id: "JVNDB-2018-009516",
},
{
db: "NVD",
id: "CVE-2018-8409",
},
{
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
},
sources: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
data: {
"@container": "@list",
},
},
data: [
{
db: "CNVD",
id: "CNVD-2019-00352",
},
{
db: "BID",
id: "105223",
},
{
db: "JVNDB",
id: "JVNDB-2018-009516",
},
{
db: "NVD",
id: "CVE-2018-8409",
},
{
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
},
sources_release_date: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
data: {
"@container": "@list",
},
},
data: [
{
date: "2019-01-04T00:00:00",
db: "CNVD",
id: "CNVD-2019-00352",
},
{
date: "2018-09-11T00:00:00",
db: "BID",
id: "105223",
},
{
date: "2018-11-20T00:00:00",
db: "JVNDB",
id: "JVNDB-2018-009516",
},
{
date: "2018-09-13T00:29:02.037000",
db: "NVD",
id: "CVE-2018-8409",
},
{
date: "2018-09-12T00:00:00",
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
},
sources_update_date: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
data: {
"@container": "@list",
},
},
data: [
{
date: "2019-01-04T00:00:00",
db: "CNVD",
id: "CNVD-2019-00352",
},
{
date: "2018-09-11T00:00:00",
db: "BID",
id: "105223",
},
{
date: "2018-11-20T00:00:00",
db: "JVNDB",
id: "JVNDB-2018-009516",
},
{
date: "2022-10-04T17:54:42.887000",
db: "NVD",
id: "CVE-2018-8409",
},
{
date: "2020-10-22T00:00:00",
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
},
threat_type: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "remote",
sources: [
{
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
trust: 0.6,
},
title: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "plural Microsoft Service disruption in products (DoS) Vulnerabilities",
sources: [
{
db: "JVNDB",
id: "JVNDB-2018-009516",
},
],
trust: 0.8,
},
type: {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
sources: {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
},
},
},
data: "input validation error",
sources: [
{
db: "CNNVD",
id: "CNNVD-201809-539",
},
],
trust: 0.6,
},
}