var-201304-0435
Vulnerability from variot

Multiple buffer overflows in ActUWzd.dll 1.0.0.1 in Mitsubishi MX Component 3, as distributed in Citect CitectFacilities 7.10 and CitectScada 7.10r1, allow remote attackers to execute arbitrary code via a long string, as demonstrated by a long WzTitle property value to a certain ActiveX control. Mitsubishi MX Component ActiveX dynamic link library for PC software and Mitsubishi FX/A/Q series links. Mitsubishi MX is prone to remote buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. CitectFacilities is an open and comprehensive facilities management solution designed specifically for managing large built environments. CitectSCADA is software used to provide monitoring and control functions in a supervisory control and data acquisition system (SCADA). There are multiple buffer overflow vulnerabilities in the ActUWzd.dll file version 1.0.0.1 in this component

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0435",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "citectfacilities",
        "scope": "eq",
        "trust": 2.7,
        "vendor": "schneider electric",
        "version": "7.10"
      },
      {
        "model": "citectscada",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "schneider electric",
        "version": "7.10"
      },
      {
        "model": "mx component",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishi automation",
        "version": "3"
      },
      {
        "model": "citectscada",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "7.10r1"
      },
      {
        "model": "mx component",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitsubishi electric",
        "version": "3 of  actuwzd.dll 1.0.0.1"
      },
      {
        "model": "electric mitsubishi mx activex component",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "3"
      },
      {
        "model": "citectscada 7.10r1",
        "scope": null,
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": null
      },
      {
        "model": "electric mx component version",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mitsubishi",
        "version": "30"
      },
      {
        "model": "electric mx component",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "mitsubishi",
        "version": "4.03"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "mitsubishi mx component",
        "version": "3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "citectfacilities",
        "version": "7.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "citectscada",
        "version": "7.10"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fab9ddba-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      },
      {
        "db": "BID",
        "id": "58692"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002424"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3075"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-439"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:mitsubishi-automation:mitsubishi_mx_component:3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:schneider-electric:citectfacilities:7.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:schneider-electric:citectscada:7.10:r1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-3075"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dr_IDE",
    "sources": [
      {
        "db": "BID",
        "id": "58692"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-494"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-3075",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2013-3075",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-02230",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "fab9ddba-2352-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-63077",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-3075",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-02230",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201304-439",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "fab9ddba-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-63077",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fab9ddba-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63077"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002424"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3075"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-439"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple buffer overflows in ActUWzd.dll 1.0.0.1 in Mitsubishi MX Component 3, as distributed in Citect CitectFacilities 7.10 and CitectScada 7.10r1, allow remote attackers to execute arbitrary code via a long string, as demonstrated by a long WzTitle property value to a certain ActiveX control. Mitsubishi MX Component ActiveX dynamic link library for PC software and Mitsubishi FX/A/Q series links. Mitsubishi MX is prone to remote buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. CitectFacilities is an open and comprehensive facilities management solution designed specifically for managing large built environments. CitectSCADA is software used to provide monitoring and control functions in a supervisory control and data acquisition system (SCADA). There are multiple buffer overflow vulnerabilities in the ActUWzd.dll file version 1.0.0.1 in this component",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-3075"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002424"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      },
      {
        "db": "BID",
        "id": "58692"
      },
      {
        "db": "IVD",
        "id": "fab9ddba-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63077"
      }
    ],
    "trust": 2.7
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-63077",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63077"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-3075",
        "trust": 3.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "24886",
        "trust": 2.3
      },
      {
        "db": "BID",
        "id": "58692",
        "trust": 1.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-140-01",
        "trust": 1.1
      },
      {
        "db": "ICS CERT ALERT",
        "id": "ICS-ALERT-13-091-01",
        "trust": 1.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-439",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02230",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002424",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-494",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "FAB9DDBA-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-78572",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-63077",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fab9ddba-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63077"
      },
      {
        "db": "BID",
        "id": "58692"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002424"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3075"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-439"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-494"
      }
    ]
  },
  "id": "VAR-201304-0435",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "fab9ddba-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63077"
      }
    ],
    "trust": 1.9
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fab9ddba-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:03:45.333000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.schneider-electric.com/"
      },
      {
        "title": "\u30b5\u30dd\u30fc\u30c8",
        "trust": 0.8,
        "url": "http://www.schneider-electric.co.jp/sites/japan/jp/support/contact/we-care.page"
      },
      {
        "title": "MX Component",
        "trust": 0.8,
        "url": "http://www.mitsubishielectric.co.jp/fa/products/cnt/plceng/lineup/mx_component/"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.schneider-electric.com/site/home/index.cfm/jp/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002424"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63077"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002424"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3075"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.exploit-db.com/exploits/24886/"
      },
      {
        "trust": 1.1,
        "url": "http://ics-cert.us-cert.gov/pdf/ics-alert-13-091-01.pdf"
      },
      {
        "trust": 1.1,
        "url": "http://ics-cert.us-cert.gov/advisories/icsa-13-140-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3075"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3075"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/58692"
      },
      {
        "trust": 0.3,
        "url": "http://www.intelliscada.com/services_facilities.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.citect.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.mitsubishi-automation.com/products/software_mx_components_content.htm"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63077"
      },
      {
        "db": "BID",
        "id": "58692"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002424"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3075"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-439"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-494"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "fab9ddba-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63077"
      },
      {
        "db": "BID",
        "id": "58692"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002424"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3075"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-439"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-494"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-03-27T00:00:00",
        "db": "IVD",
        "id": "fab9ddba-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2013-03-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      },
      {
        "date": "2013-04-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63077"
      },
      {
        "date": "2013-03-25T00:00:00",
        "db": "BID",
        "id": "58692"
      },
      {
        "date": "2013-04-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-002424"
      },
      {
        "date": "2013-04-19T11:44:29.280000",
        "db": "NVD",
        "id": "CVE-2013-3075"
      },
      {
        "date": "2013-04-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-439"
      },
      {
        "date": "2013-03-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201303-494"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-03-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      },
      {
        "date": "2013-05-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63077"
      },
      {
        "date": "2015-03-19T08:08:00",
        "db": "BID",
        "id": "58692"
      },
      {
        "date": "2013-05-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-002424"
      },
      {
        "date": "2013-05-15T04:00:00",
        "db": "NVD",
        "id": "CVE-2013-3075"
      },
      {
        "date": "2013-04-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-439"
      },
      {
        "date": "2013-03-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201303-494"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-439"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-494"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mitsubishi MX Component ActiveX Control \u0027ActUWzd.dll\u0027 Remote Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "fab9ddba-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02230"
      },
      {
        "db": "BID",
        "id": "58692"
      }
    ],
    "trust": 1.1
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "fab9ddba-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-439"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-494"
      }
    ],
    "trust": 1.4
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.