VAR-201304-0152
Vulnerability from variot - Updated: 2023-12-18 12:09Stack-based buffer overflow in the web server in Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long HTTP header. Cogent Real-Time Systems is a real-time data solutions vendor. An attacker can exploit this issue to execute arbitrary code within the context of the affected applications. Failed exploit attempts may crash the application, denying service to legitimate users. and prior OPC DataHub versions 6.4.21 and prior Cascade DataHub for Windows version 6.4.21 and prior Cogent DataHub DataSim and DataPid demonstration version 7.2.2 OPC DataHub DataSim and DataPid demonstration clients version 6.4.21 Cascade DataHub DataSim and DataPid demonstration clients version 6.4.21 DataHub QuickTrend version 7.2.2 and prior
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201304-0152",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "opc datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "6.4.20"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.0"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.0.2"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.1.1"
},
{
"model": "cascade datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "6.4.20"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.1.0"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.1.1.63"
},
{
"model": "opc datahub",
"scope": "lte",
"trust": 1.0,
"vendor": "cogentdatahub",
"version": "6.4.21"
},
{
"model": "cogent datahub",
"scope": "lte",
"trust": 1.0,
"vendor": "cogentdatahub",
"version": "7.2.2"
},
{
"model": "cascade datahub",
"scope": "lte",
"trust": 1.0,
"vendor": "cogentdatahub",
"version": "6.4.21"
},
{
"model": "datahub quicktrend",
"scope": "lte",
"trust": 1.0,
"vendor": "cogentdatahub",
"version": "7.2.2"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.0,
"vendor": "cogentdatahub",
"version": "7.1.2"
},
{
"model": "cascade datahub",
"scope": "lt",
"trust": 0.8,
"vendor": "cogent real time",
"version": "6.4.22"
},
{
"model": "datahub",
"scope": "lt",
"trust": 0.8,
"vendor": "cogent real time",
"version": "7.3.0"
},
{
"model": "datahub quicktrend",
"scope": "lt",
"trust": 0.8,
"vendor": "cogent real time",
"version": "7.3.0"
},
{
"model": "opc datahub",
"scope": "lt",
"trust": 0.8,
"vendor": "cogent real time",
"version": "6.4.22"
},
{
"model": "real-time systems opc datahub",
"scope": "eq",
"trust": 0.6,
"vendor": "cogent",
"version": "6.4.21"
},
{
"model": "real-time systems cascade datahub",
"scope": "eq",
"trust": 0.6,
"vendor": "cogent",
"version": "6.4.21"
},
{
"model": "real-time systems cogent datahub",
"scope": "eq",
"trust": 0.6,
"vendor": "cogent",
"version": "7.2.2"
},
{
"model": "real-time systems datahub quicktrend",
"scope": "eq",
"trust": 0.6,
"vendor": "cogent",
"version": "7.2.2"
},
{
"model": "real-time systems datapid",
"scope": "eq",
"trust": 0.6,
"vendor": "cogent",
"version": "7.2.2"
},
{
"model": "real-time systems datapid",
"scope": "eq",
"trust": 0.6,
"vendor": "cogent",
"version": "6.4.21"
},
{
"model": "real-time systems datasim",
"scope": "eq",
"trust": 0.6,
"vendor": "cogent",
"version": "7.2.2"
},
{
"model": "real-time systems datasim",
"scope": "eq",
"trust": 0.6,
"vendor": "cogent",
"version": "6.4.21"
},
{
"model": "datahub quicktrend",
"scope": "eq",
"trust": 0.6,
"vendor": "cogentdatahub",
"version": "7.2.2"
},
{
"model": "cascade datahub",
"scope": "eq",
"trust": 0.6,
"vendor": "cogentdatahub",
"version": "6.4.21"
},
{
"model": "opc datahub",
"scope": "eq",
"trust": 0.6,
"vendor": "cogentdatahub",
"version": "6.4.21"
},
{
"model": "real-time systems opc datahub",
"scope": "eq",
"trust": 0.3,
"vendor": "cogent",
"version": "6.4.20"
},
{
"model": "real-time systems opc datahub",
"scope": "eq",
"trust": 0.3,
"vendor": "cogent",
"version": "6.0.2"
},
{
"model": "real-time systems cogent datahub",
"scope": "eq",
"trust": 0.3,
"vendor": "cogent",
"version": "7.1.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cogent datahub",
"version": "7.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cogent datahub",
"version": "7.0.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cogent datahub",
"version": "7.1.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cogent datahub",
"version": "7.1.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cogent datahub",
"version": "7.1.1.63"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cogent datahub",
"version": "7.1.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cogent datahub",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "opc datahub",
"version": "6.4.20"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "opc datahub",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cascade datahub",
"version": "6.4.20"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cascade datahub",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "datahub quicktrend",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-02825"
},
{
"db": "BID",
"id": "58902"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002154"
},
{
"db": "NVD",
"id": "CVE-2013-0680"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-030"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.2.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:opc_datahub:6.4.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:opc_datahub:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.4.21",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cascade_datahub:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.4.21",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cascade_datahub:6.4.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:datahub_quicktrend:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.2.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0680"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Dillon Beresford",
"sources": [
{
"db": "BID",
"id": "58902"
}
],
"trust": 0.3
},
"cve": "CVE-2013-0680",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2013-0680",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2013-02825",
"impactScore": 7.8,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "039a082e-2353-11e6-abef-000c29c66e3d",
"impactScore": 7.8,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-0680",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2013-02825",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201304-030",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-02825"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002154"
},
{
"db": "NVD",
"id": "CVE-2013-0680"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-030"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in the web server in Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long HTTP header. Cogent Real-Time Systems is a real-time data solutions vendor. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected applications. Failed exploit attempts may crash the application, denying service to legitimate users. and prior\nOPC DataHub versions 6.4.21 and prior\nCascade DataHub for Windows version 6.4.21 and prior\nCogent DataHub DataSim and DataPid demonstration version 7.2.2\nOPC DataHub DataSim and DataPid demonstration clients version 6.4.21\nCascade DataHub DataSim and DataPid demonstration clients version 6.4.21\nDataHub QuickTrend version 7.2.2 and prior",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0680"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002154"
},
{
"db": "CNVD",
"id": "CNVD-2013-02825"
},
{
"db": "BID",
"id": "58902"
},
{
"db": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-0680",
"trust": 3.5
},
{
"db": "ICS CERT",
"id": "ICSA-13-095-01",
"trust": 3.0
},
{
"db": "BID",
"id": "58902",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2013-02825",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201304-030",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002154",
"trust": 0.8
},
{
"db": "IVD",
"id": "039A082E-2353-11E6-ABEF-000C29C66E3D",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-02825"
},
{
"db": "BID",
"id": "58902"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002154"
},
{
"db": "NVD",
"id": "CVE-2013-0680"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-030"
}
]
},
"id": "VAR-201304-0152",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-02825"
}
],
"trust": 1.67177419
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-02825"
}
]
},
"last_update_date": "2023-12-18T12:09:22.856000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "DataHub QuickTrend",
"trust": 0.8,
"url": "http://www.cogentdatahub.com/products/datahub_quicktrend.html"
},
{
"title": "Release Notes",
"trust": 0.8,
"url": "http://www.cogentdatahub.com/releasenotes.html"
},
{
"title": "Download Software",
"trust": 0.8,
"url": "http://www.cogentdatahub.com/contact_form.html"
},
{
"title": "Cogent DataHub",
"trust": 0.8,
"url": "http://www.cogentdatahub.com/products/cogent_datahub.html"
},
{
"title": "OPC DataHub",
"trust": 0.8,
"url": "http://www.cogentdatahub.com/products/opc_datahub.html"
},
{
"title": "Cascade DataHub",
"trust": 0.8,
"url": "http://www.cogentdatahub.com/products/cascade_datahub.html"
},
{
"title": "TopPage",
"trust": 0.8,
"url": "http://www.cogentdatahub.com/jp/"
},
{
"title": "Patch for Cogent Real-Time Systems DataHub Remote Stack Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/33176"
},
{
"title": "OPCDataHub-6.4.22-130302-Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=45674"
},
{
"title": "CogentDataHub-7.3.0-130328-Windows",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=45673"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-02825"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002154"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-030"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002154"
},
{
"db": "NVD",
"id": "CVE-2013-0680"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "http://ics-cert.us-cert.gov/pdf/icsa-13-095-01.pdf"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0680"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0680"
},
{
"trust": 0.3,
"url": "http://www.cogentdatahub.com/products/cogent_datahub.html"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-02825"
},
{
"db": "BID",
"id": "58902"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002154"
},
{
"db": "NVD",
"id": "CVE-2013-0680"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-030"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-02825"
},
{
"db": "BID",
"id": "58902"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002154"
},
{
"db": "NVD",
"id": "CVE-2013-0680"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-030"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-04-09T00:00:00",
"db": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d"
},
{
"date": "2013-04-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-02825"
},
{
"date": "2013-04-05T00:00:00",
"db": "BID",
"id": "58902"
},
{
"date": "2013-04-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002154"
},
{
"date": "2013-04-05T21:55:00.827000",
"db": "NVD",
"id": "CVE-2013-0680"
},
{
"date": "2013-04-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201304-030"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-05-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-02825"
},
{
"date": "2013-04-05T17:08:00",
"db": "BID",
"id": "58902"
},
{
"date": "2013-04-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002154"
},
{
"date": "2013-04-09T04:00:00",
"db": "NVD",
"id": "CVE-2013-0680"
},
{
"date": "2013-04-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201304-030"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201304-030"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cogent Real-Time Systems DataHub Remote Stack Buffer Overflow Vulnerability",
"sources": [
{
"db": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2013-02825"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "039a082e-2353-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201304-030"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.