VAR-201304-0154

Vulnerability from variot - Updated: 2023-12-18 12:09

Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 do not properly handle exceptions, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via malformed data in a formatted text command, leading to out-of-bounds access to (1) heap or (2) stack memory. Cogent Real-Time Systems is a real-time data solutions vendor. The Cogent Real-Time Systems DataHub application receives formatted text commands in TCP link mode that are parsed, verified, and executed within the application. An attacker can exploit this issue to execute arbitrary code within the context of the affected applications. Failed exploit attempts may crash the application, denying service to legitimate users. The following Cogent Real-Time Systems products are vulnerable: Cogent DataHub 7.2.2 and prior versions OPC DataHub 6.4.21 and prior versions Cascade DataHub for Windows 6.4.21 and prior versions Cogent DataHub DataSim and DataPid demonstration clients 7.2.2 OPC DataHub DataSim and DataPid demonstration clients 6.4.21 Cascade DataHub DataSim and DataPid demonstration clients 6.4.21 DataHub QuickTrend 7.2.2 and prior versions

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0154",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "opc datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "6.4.20"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "7.1.1"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "7.1.2"
      },
      {
        "model": "cascade datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "6.4.20"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "7.1.0"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "7.1.1.63"
      },
      {
        "model": "opc datahub",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "6.4.21"
      },
      {
        "model": "cogent datahub",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "7.2.2"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "7.0"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "7.0.2"
      },
      {
        "model": "cascade datahub",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "6.4.21"
      },
      {
        "model": "datahub quicktrend",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "7.2.2"
      },
      {
        "model": "cascade datahub",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cogent real time",
        "version": "6.4.22"
      },
      {
        "model": "datahub",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cogent real time",
        "version": "7.3.0"
      },
      {
        "model": "datahub quicktrend",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cogent real time",
        "version": "7.3.0"
      },
      {
        "model": "opc datahub",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cogent real time",
        "version": "6.4.22"
      },
      {
        "model": "real-time systems opc datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "6.4.21"
      },
      {
        "model": "real-time systems cascade datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "6.4.21"
      },
      {
        "model": "real-time systems cogent datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "7.2.2"
      },
      {
        "model": "real-time systems datahub quicktrend",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "7.2.2"
      },
      {
        "model": "real-time systems datapid",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "7.2.2"
      },
      {
        "model": "real-time systems datapid",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "6.4.21"
      },
      {
        "model": "real-time systems datasim",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "7.2.2"
      },
      {
        "model": "real-time systems datasim",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "6.4.21"
      },
      {
        "model": "datahub quicktrend",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogentdatahub",
        "version": "7.2.2"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogentdatahub",
        "version": "7.2.2"
      },
      {
        "model": "cascade datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogentdatahub",
        "version": "6.4.21"
      },
      {
        "model": "opc datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogentdatahub",
        "version": "6.4.21"
      },
      {
        "model": "real-time systems opc datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "6.4.20"
      },
      {
        "model": "real-time systems opc datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "6.0.2"
      },
      {
        "model": "real-time systems opc datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "6"
      },
      {
        "model": "real-time systems cogent datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "7.1.2"
      },
      {
        "model": "real-time systems cogent datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "7.1.1.63"
      },
      {
        "model": "real-time systems cogent datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.0.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.1.1.63"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.1.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "opc datahub",
        "version": "6.4.20"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "opc datahub",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cascade datahub",
        "version": "6.4.20"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cascade datahub",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "datahub quicktrend",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "BID",
        "id": "58905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1.63:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.2.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cogentdatahub:opc_datahub:6.4.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cogentdatahub:opc_datahub:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "6.4.21",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:cogentdatahub:cascade_datahub:6.4.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:cogentdatahub:cascade_datahub:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "6.4.21",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cogentdatahub:datahub_quicktrend:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.2.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dillon Beresford",
    "sources": [
      {
        "db": "BID",
        "id": "58905"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-0682",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2013-0682",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-02823",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "038f53d4-2353-11e6-abef-000c29c66e3d",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-0682",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-02823",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201304-032",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "038f53d4-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 do not properly handle exceptions, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via malformed data in a formatted text command, leading to out-of-bounds access to (1) heap or (2) stack memory. Cogent Real-Time Systems is a real-time data solutions vendor. The Cogent Real-Time Systems DataHub application receives formatted text commands in TCP link mode that are parsed, verified, and executed within the application. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected applications. Failed exploit attempts may crash the application, denying service to legitimate users. \nThe following Cogent Real-Time Systems products are vulnerable:\nCogent DataHub 7.2.2 and prior versions\nOPC DataHub 6.4.21 and prior versions\nCascade DataHub for Windows 6.4.21 and prior versions\nCogent DataHub DataSim and DataPid demonstration clients 7.2.2\nOPC DataHub DataSim and DataPid demonstration clients 6.4.21\nCascade DataHub DataSim and DataPid demonstration clients 6.4.21\nDataHub QuickTrend 7.2.2 and prior versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "BID",
        "id": "58905"
      },
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-0682",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-095-01",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "58905",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "038F53D4-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "BID",
        "id": "58905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ]
  },
  "id": "VAR-201304-0154",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      }
    ],
    "trust": 1.67177419
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:09:22.891000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Cogent DataHub",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/products/cogent_datahub.html"
      },
      {
        "title": "OPC DataHub",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/products/opc_datahub.html"
      },
      {
        "title": "Cascade DataHub",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/products/cascade_datahub.html"
      },
      {
        "title": "DataHub QuickTrend",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/products/datahub_quicktrend.html"
      },
      {
        "title": "Release Notes",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/releasenotes.html"
      },
      {
        "title": "Download Software",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/contact_form.html"
      },
      {
        "title": "TopPage",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/jp/"
      },
      {
        "title": "Cogent Real-Time Systems DataHub Text Command Buffer Overflow Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/33174"
      },
      {
        "title": "OPCDataHub-6.4.22-130302-Windows",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=45674"
      },
      {
        "title": "CogentDataHub-7.3.0-130328-Windows",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=45673"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "http://ics-cert.us-cert.gov/pdf/icsa-13-095-01.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0682"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0682"
      },
      {
        "trust": 0.3,
        "url": "http://www.cogentdatahub.com/products/cogent_datahub.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "BID",
        "id": "58905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "BID",
        "id": "58905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-04-09T00:00:00",
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2013-04-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "date": "2013-04-05T00:00:00",
        "db": "BID",
        "id": "58905"
      },
      {
        "date": "2013-04-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "date": "2013-04-05T21:55:00.863000",
        "db": "NVD",
        "id": "CVE-2013-0682"
      },
      {
        "date": "2013-04-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-05-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "date": "2015-03-19T09:23:00",
        "db": "BID",
        "id": "58905"
      },
      {
        "date": "2013-04-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "date": "2013-04-09T04:00:00",
        "db": "NVD",
        "id": "CVE-2013-0682"
      },
      {
        "date": "2013-04-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cogent Real-Time Systems DataHub Text Command Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…