VAR-201102-0174

Vulnerability from variot - Updated: 2023-12-18 13:25

WebSCADA WS100 and WS200, Easy Connect EC150, Modbus RTU - TCP Gateway MB100, and Serial Ethernet Server SS100 on the IntelliCom NetBiter NB100 and NB200 platforms have a default username and password, which makes it easier for remote attackers to obtain superadmin access via the web interface, a different vulnerability than CVE-2009-4463. IntelliCom NetBiter NB100 and NB200 There are multiple vulnerabilities in products that run on the platform, including directory traversal. Other NB100 and NB200 Products that run on the platform may also be affected.By a third party with access to the product, superadmin Authority (Netbiter Top-level permissions ) By acquiring, system files and configuration files may be browsed. In addition, an arbitrary command may be executed by uploading malicious code. A remote attacker can gain access to the super administrator through the web interface

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201102-0174",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netbiter webscada ws100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter easyconnect ec150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter nb200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter webscada ws200",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter serial ethernet server ss100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter modbus rtu-tcp gateway mb100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": "netbiter nb100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intellicom",
        "version": "*"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "netbiter easy connect ec150",
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "netbiter modbus rtu - tcp gateway mb100",
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "netbiter serial ethernet server ss100",
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "netbiter webscada ws100",
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "netbiter webscada ws200",
        "scope": null,
        "trust": 0.8,
        "vendor": "intellicom innovation ab",
        "version": null
      },
      {
        "model": "ws200",
        "scope": null,
        "trust": 0.6,
        "vendor": "webscada",
        "version": null
      },
      {
        "model": "ws100",
        "scope": null,
        "trust": 0.6,
        "vendor": "webscada",
        "version": null
      },
      {
        "model": "netbiter webscada ws200",
        "scope": null,
        "trust": 0.6,
        "vendor": "intellicom",
        "version": null
      },
      {
        "model": "netbiter easyconnect ec150",
        "scope": null,
        "trust": 0.6,
        "vendor": "intellicom",
        "version": null
      },
      {
        "model": "netbiter serial ethernet server ss100",
        "scope": null,
        "trust": 0.6,
        "vendor": "intellicom",
        "version": null
      },
      {
        "model": "netbiter modbus rtu-tcp gateway mb100",
        "scope": null,
        "trust": 0.6,
        "vendor": "intellicom",
        "version": null
      },
      {
        "model": "netbiter webscada ws100",
        "scope": null,
        "trust": 0.6,
        "vendor": "intellicom",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter easyconnect ec150",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter modbus rtu tcp gateway mb100",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter serial ethernet server ss100",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter webscada ws100",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter webscada ws200",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter nb100",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "netbiter nb200",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intellicom:netbiter_modbus_rtu-tcp_gateway_mb100:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intellicom:netbiter_serial_ethernet_server_ss100:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_ws100:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intellicom:netbiter_easyconnect_ec150:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intellicom:netbiter_webscada_ws200:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intellicom:netbiter_nb100:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:intellicom:netbiter_nb200:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      }
    ]
  },
  "cve": "CVE-2010-4733",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2010-4733",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2011-6676",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "4869abe2-2355-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "7d7b301e-463f-11e9-bb33-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-47338",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2010-4733",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#114560",
            "trust": 0.8,
            "value": "1.68"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2011-6676",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201102-228",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "4869abe2-2355-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "7d7b301e-463f-11e9-bb33-000c29342cb1",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-47338",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WebSCADA WS100 and WS200, Easy Connect EC150, Modbus RTU - TCP Gateway MB100, and Serial Ethernet Server SS100 on the IntelliCom NetBiter NB100 and NB200 platforms have a default username and password, which makes it easier for remote attackers to obtain superadmin access via the web interface, a different vulnerability than CVE-2009-4463. IntelliCom NetBiter NB100 and NB200 There are multiple vulnerabilities in products that run on the platform, including directory traversal. Other NB100 and NB200 Products that run on the platform may also be affected.By a third party with access to the product, superadmin Authority (Netbiter Top-level permissions ) By acquiring, system files and configuration files may be browsed. In addition, an arbitrary command may be executed by uploading malicious code. A remote attacker can gain access to the super administrator through the web interface",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2010-4733",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-10-316-01A",
        "trust": 3.3
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560",
        "trust": 1.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155",
        "trust": 0.8
      },
      {
        "db": "BUGTRAQ",
        "id": "20101001 [STANKOINFORMZASCHITA-10-01] NETBITER, WEBSCADA MULTIPLE VULNERABILITIES",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "4869ABE2-2355-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "7D7B301E-463F-11E9-BB33-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ]
  },
  "id": "VAR-201102-0174",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      }
    ],
    "trust": 1.926388886666667
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:25:14.375000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Netbiter webSCADA WS100 - Support",
        "trust": 0.8,
        "url": "http://support.intellicom.se/dynpage.cfm?fpid=85\u0026catid=93\u0026subcatid=297"
      },
      {
        "title": "Intellicom Innovation AB - SUPPORT",
        "trust": 0.8,
        "url": "http://support.intellicom.se"
      },
      {
        "title": "WebSCADA patch for multiple product weak password vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/37313"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-10-316-01a.pdf"
      },
      {
        "trust": 2.5,
        "url": "http://archives.neohapsis.com/archives/bugtraq/2010-10/0002.html"
      },
      {
        "trust": 1.4,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4733"
      },
      {
        "trust": 0.8,
        "url": "http://support.intellicom.se"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4733"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu114560"
      },
      {
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/114560"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-4733"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-02-16T00:00:00",
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2011-02-16T00:00:00",
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "date": "2011-02-03T00:00:00",
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "date": "2011-02-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "date": "2011-02-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "date": "2011-03-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "date": "2011-02-15T01:00:01.853000",
        "db": "NVD",
        "id": "CVE-2010-4733"
      },
      {
        "date": "2011-02-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-02-23T00:00:00",
        "db": "CERT/CC",
        "id": "VU#114560"
      },
      {
        "date": "2011-02-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "date": "2011-02-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-47338"
      },
      {
        "date": "2011-03-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-001155"
      },
      {
        "date": "2011-02-15T05:00:00",
        "db": "NVD",
        "id": "CVE-2010-4733"
      },
      {
        "date": "2011-02-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WebSCADA Multiple Product Weak Password Vulnerabilities",
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-6676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ],
    "trust": 1.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Trust management",
    "sources": [
      {
        "db": "IVD",
        "id": "4869abe2-2355-11e6-abef-000c29c66e3d"
      },
      {
        "db": "IVD",
        "id": "7d7b301e-463f-11e9-bb33-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201102-228"
      }
    ],
    "trust": 1.0
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…