VAR-201405-0284
Vulnerability from variot - Updated: 2023-12-18 13:19Cross-site scripting (XSS) vulnerability in Cogent DataHub before 7.3.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Cogent DataHub is software for SCADA and automation. Cogent DataHub has a reflective cross-site scripting vulnerability that allows an attacker to exploit a vulnerability to build a malicious URI, entice a user to resolve, obtain sensitive cookies, hijack a session, or perform malicious operations on the client. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Cogent DataHub 7.3.5 is vulnerable; other versions may also be affected
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201405-0284",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cogent datahub",
"scope": "eq",
"trust": 2.2,
"vendor": "cogentdatahub",
"version": "7.2.2"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 2.2,
"vendor": "cogentdatahub",
"version": "7.1.1.63"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 2.2,
"vendor": "cogentdatahub",
"version": "7.1.1"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 2.2,
"vendor": "cogentdatahub",
"version": "7.1.0"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 2.2,
"vendor": "cogentdatahub",
"version": "7.0.2"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 2.2,
"vendor": "cogentdatahub",
"version": "7.0"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 2.2,
"vendor": "cogentdatahub",
"version": "7.3.1"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 2.2,
"vendor": "cogentdatahub",
"version": "7.3.2"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 2.2,
"vendor": "cogentdatahub",
"version": "7.3.3"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.3.0"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.1.2"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.2,
"vendor": "cogentdatahub",
"version": "7.3.4"
},
{
"model": "cogent datahub",
"scope": "lte",
"trust": 1.0,
"vendor": "cogentdatahub",
"version": "7.3.4"
},
{
"model": "datahub",
"scope": "lt",
"trust": 0.8,
"vendor": "cogent real time",
"version": "7.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.0.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.1.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.1.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.1.1.63"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.1.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.2.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.3.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.3.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.3.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.3.3"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "*"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 0.3,
"vendor": "cogentdatahub",
"version": "7.3.5"
}
],
"sources": [
{
"db": "IVD",
"id": "7d725681-463f-11e9-8854-000c29342cb1"
},
{
"db": "IVD",
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03446"
},
{
"db": "BID",
"id": "67770"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002713"
},
{
"db": "NVD",
"id": "CVE-2014-2353"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-583"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.3.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2353"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Alain Homewood",
"sources": [
{
"db": "BID",
"id": "67770"
}
],
"trust": 0.3
},
"cve": "CVE-2014-2353",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-2353",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CNVD-2014-03446",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "7d725681-463f-11e9-8854-000c29342cb1",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:P/A:P",
"version": "2.9 [IVD]"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-2353",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2014-03446",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201405-583",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "7d725681-463f-11e9-8854-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d725681-463f-11e9-8854-000c29342cb1"
},
{
"db": "IVD",
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03446"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002713"
},
{
"db": "NVD",
"id": "CVE-2014-2353"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-583"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cross-site scripting (XSS) vulnerability in Cogent DataHub before 7.3.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Cogent DataHub is software for SCADA and automation. Cogent DataHub has a reflective cross-site scripting vulnerability that allows an attacker to exploit a vulnerability to build a malicious URI, entice a user to resolve, obtain sensitive cookies, hijack a session, or perform malicious operations on the client. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. \nCogent DataHub 7.3.5 is vulnerable; other versions may also be affected",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2353"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002713"
},
{
"db": "CNVD",
"id": "CNVD-2014-03446"
},
{
"db": "BID",
"id": "67770"
},
{
"db": "IVD",
"id": "7d725681-463f-11e9-8854-000c29342cb1"
},
{
"db": "IVD",
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-2353",
"trust": 3.7
},
{
"db": "ICS CERT",
"id": "ICSA-14-149-02",
"trust": 3.3
},
{
"db": "CNVD",
"id": "CNVD-2014-03446",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201405-583",
"trust": 1.0
},
{
"db": "BID",
"id": "67770",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002713",
"trust": 0.8
},
{
"db": "IVD",
"id": "7D725681-463F-11E9-8854-000C29342CB1",
"trust": 0.2
},
{
"db": "IVD",
"id": "F3CB65C4-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "7d725681-463f-11e9-8854-000c29342cb1"
},
{
"db": "IVD",
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03446"
},
{
"db": "BID",
"id": "67770"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002713"
},
{
"db": "NVD",
"id": "CVE-2014-2353"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-583"
}
]
},
"id": "VAR-201405-0284",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d725681-463f-11e9-8854-000c29342cb1"
},
{
"db": "IVD",
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03446"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "7d725681-463f-11e9-8854-000c29342cb1"
},
{
"db": "IVD",
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03446"
}
]
},
"last_update_date": "2023-12-18T13:19:58.717000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Release Notes",
"trust": 0.8,
"url": "http://cogentdatahub.com/releasenotes.html"
},
{
"title": "Patch for Cogent Real-Time Systems DataHub Reflective Cross-Site Scripting Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/46102"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03446"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002713"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002713"
},
{
"db": "NVD",
"id": "CVE-2014-2353"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-14-149-02"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2353"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2353"
},
{
"trust": 0.3,
"url": "http://cogentdatahub.com/index.html"
},
{
"trust": 0.3,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-14-149-02#footnotee_x5ie90t"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03446"
},
{
"db": "BID",
"id": "67770"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002713"
},
{
"db": "NVD",
"id": "CVE-2014-2353"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-583"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d725681-463f-11e9-8854-000c29342cb1"
},
{
"db": "IVD",
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03446"
},
{
"db": "BID",
"id": "67770"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002713"
},
{
"db": "NVD",
"id": "CVE-2014-2353"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-583"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-06-06T00:00:00",
"db": "IVD",
"id": "7d725681-463f-11e9-8854-000c29342cb1"
},
{
"date": "2014-06-06T00:00:00",
"db": "IVD",
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2014-06-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03446"
},
{
"date": "2014-05-29T00:00:00",
"db": "BID",
"id": "67770"
},
{
"date": "2014-06-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002713"
},
{
"date": "2014-05-30T23:55:02.910000",
"db": "NVD",
"id": "CVE-2014-2353"
},
{
"date": "2014-05-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201405-583"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-06-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03446"
},
{
"date": "2015-03-19T08:26:00",
"db": "BID",
"id": "67770"
},
{
"date": "2014-06-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002713"
},
{
"date": "2014-06-05T12:36:32.270000",
"db": "NVD",
"id": "CVE-2014-2353"
},
{
"date": "2014-06-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201405-583"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201405-583"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cogent Real-Time Systems DataHub Reflective Cross-Site Scripting Vulnerability",
"sources": [
{
"db": "IVD",
"id": "7d725681-463f-11e9-8854-000c29342cb1"
},
{
"db": "IVD",
"id": "f3cb65c4-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03446"
}
],
"trust": 1.0
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201405-583"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.