VAR-201405-0534
Vulnerability from variot - Updated: 2023-12-18 13:09Heap-based buffer overflow in the Web Server in Cogent Real-Time Systems Cogent DataHub before 7.3.5 allows remote attackers to execute arbitrary code via a negative value in the Content-Length field in a request. Authentication is not required to exploit this vulnerability. The specific flaw exists within the included Web Server. By providing a request with a crafted Content-Length field, an attacker is able to overflow a heap buffer. An attacker could leverage this to execute arbitrary code in the context of the DataHub process. Cogent DataHub is software for SCADA and automation. Failed exploit attempts will likely result in denial-of-service conditions. Versions prior to Cogent DataHub 7.3.5 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201405-0534",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.9,
"vendor": "cogentdatahub",
"version": "7.3.3"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.9,
"vendor": "cogentdatahub",
"version": "7.3.2"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.1.0"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.0"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.1.2"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.1.1.63"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.3.0"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.0.2"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.2.2"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.6,
"vendor": "cogentdatahub",
"version": "7.1.1"
},
{
"model": "cogent datahub",
"scope": "lte",
"trust": 1.0,
"vendor": "cogentdatahub",
"version": "7.3.4"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 1.0,
"vendor": "cogentdatahub",
"version": "7.3.1"
},
{
"model": "datahub",
"scope": "lt",
"trust": 0.8,
"vendor": "cogent real time",
"version": "7.3.5"
},
{
"model": "datahub",
"scope": null,
"trust": 0.7,
"vendor": "cogent real time",
"version": null
},
{
"model": "real-time systems cogent datahub",
"scope": "lt",
"trust": 0.6,
"vendor": "cogent",
"version": "7.3.5"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.0.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.1.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.1.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.1.1.63"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.1.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.2.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.3.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.3.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.3.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "7.3.3"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "cogent datahub",
"version": "*"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 0.3,
"vendor": "cogentdatahub",
"version": "7.3.4"
},
{
"model": "cogent datahub",
"scope": "eq",
"trust": 0.3,
"vendor": "cogentdatahub",
"version": "7.3"
},
{
"model": "cogent datahub",
"scope": "ne",
"trust": 0.3,
"vendor": "cogentdatahub",
"version": "7.3.5"
}
],
"sources": [
{
"db": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1"
},
{
"db": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-14-135"
},
{
"db": "CNVD",
"id": "CNVD-2014-03282"
},
{
"db": "BID",
"id": "67485"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002620"
},
{
"db": "NVD",
"id": "CVE-2014-3788"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-458"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.3.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cogentdatahub:cogent_datahub:7.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-3788"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Pawel Wylecial",
"sources": [
{
"db": "ZDI",
"id": "ZDI-14-135"
},
{
"db": "BID",
"id": "67485"
}
],
"trust": 1.0
},
"cve": "CVE-2014-3788",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2014-3788",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 1.5,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-03282",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-3788",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "ZDI",
"id": "CVE-2014-3788",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2014-03282",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201405-458",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1"
},
{
"db": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-14-135"
},
{
"db": "CNVD",
"id": "CNVD-2014-03282"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002620"
},
{
"db": "NVD",
"id": "CVE-2014-3788"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-458"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Heap-based buffer overflow in the Web Server in Cogent Real-Time Systems Cogent DataHub before 7.3.5 allows remote attackers to execute arbitrary code via a negative value in the Content-Length field in a request. Authentication is not required to exploit this vulnerability. The specific flaw exists within the included Web Server. By providing a request with a crafted Content-Length field, an attacker is able to overflow a heap buffer. An attacker could leverage this to execute arbitrary code in the context of the DataHub process. Cogent DataHub is software for SCADA and automation. Failed exploit attempts will likely result in denial-of-service conditions. \nVersions prior to Cogent DataHub 7.3.5 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-3788"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002620"
},
{
"db": "ZDI",
"id": "ZDI-14-135"
},
{
"db": "CNVD",
"id": "CNVD-2014-03282"
},
{
"db": "BID",
"id": "67485"
},
{
"db": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1"
},
{
"db": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d"
}
],
"trust": 3.42
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-3788",
"trust": 4.4
},
{
"db": "ZDI",
"id": "ZDI-14-135",
"trust": 4.0
},
{
"db": "CNVD",
"id": "CNVD-2014-03282",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201405-458",
"trust": 1.0
},
{
"db": "BID",
"id": "67485",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002620",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-2192",
"trust": 0.7
},
{
"db": "IVD",
"id": "7D7C418F-463F-11E9-81DD-000C29342CB1",
"trust": 0.2
},
{
"db": "IVD",
"id": "F6FE402C-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1"
},
{
"db": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-14-135"
},
{
"db": "CNVD",
"id": "CNVD-2014-03282"
},
{
"db": "BID",
"id": "67485"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002620"
},
{
"db": "NVD",
"id": "CVE-2014-3788"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-458"
}
]
},
"id": "VAR-201405-0534",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1"
},
{
"db": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03282"
}
],
"trust": 1.74354838
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1"
},
{
"db": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03282"
}
]
},
"last_update_date": "2023-12-18T13:09:21.376000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Release Notes",
"trust": 1.5,
"url": "http://cogentdatahub.com/releasenotes.html"
},
{
"title": "Cogent Real-Time Systems Cogent DataHub Patch Buffer Overflow Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/45912"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-14-135"
},
{
"db": "CNVD",
"id": "CNVD-2014-03282"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002620"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002620"
},
{
"db": "NVD",
"id": "CVE-2014-3788"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-14-135/"
},
{
"trust": 2.6,
"url": "http://cogentdatahub.com/releasenotes.html"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3788"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3788"
},
{
"trust": 0.3,
"url": "http://www.cogentdatahub.com/index.html"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-14-135"
},
{
"db": "CNVD",
"id": "CNVD-2014-03282"
},
{
"db": "BID",
"id": "67485"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002620"
},
{
"db": "NVD",
"id": "CVE-2014-3788"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-458"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1"
},
{
"db": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-14-135"
},
{
"db": "CNVD",
"id": "CNVD-2014-03282"
},
{
"db": "BID",
"id": "67485"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002620"
},
{
"db": "NVD",
"id": "CVE-2014-3788"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-458"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-05-28T00:00:00",
"db": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1"
},
{
"date": "2014-05-28T00:00:00",
"db": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2014-05-19T00:00:00",
"db": "ZDI",
"id": "ZDI-14-135"
},
{
"date": "2014-05-28T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03282"
},
{
"date": "2014-04-29T00:00:00",
"db": "BID",
"id": "67485"
},
{
"date": "2014-05-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002620"
},
{
"date": "2014-05-22T23:55:03.410000",
"db": "NVD",
"id": "CVE-2014-3788"
},
{
"date": "2014-05-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201405-458"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-05-19T00:00:00",
"db": "ZDI",
"id": "ZDI-14-135"
},
{
"date": "2014-05-28T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03282"
},
{
"date": "2015-03-19T08:27:00",
"db": "BID",
"id": "67485"
},
{
"date": "2014-05-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002620"
},
{
"date": "2014-06-27T16:48:59.110000",
"db": "NVD",
"id": "CVE-2014-3788"
},
{
"date": "2014-05-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201405-458"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201405-458"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cogent Real-Time Systems Cogent DataHub Heap Buffer Overflow Vulnerability",
"sources": [
{
"db": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1"
},
{
"db": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03282"
}
],
"trust": 1.0
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "7d7c418f-463f-11e9-81dd-000c29342cb1"
},
{
"db": "IVD",
"id": "f6fe402c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-458"
}
],
"trust": 1.0
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…