VAR-201406-0145
Vulnerability from variot - Updated: 2023-12-18 13:24COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP. The COPA-DATA zenon DNP3 NG driver (DNP3 master) and the zenon DNP3 Process Gateway (DNP3 outstation) are products of the zenon industrial automation software belonging to the HMI/SCADA class. A denial of service vulnerability exists in multiple CCOPA-DATA Zenon products. Attackers can exploit this issue to crash the affected application, denying service to legitimate users
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201406-0145",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "zenon dnp3 ng driver",
"scope": "eq",
"trust": 1.6,
"vendor": "copadata",
"version": "7.11"
},
{
"model": "zenon dnp3 process gateway",
"scope": "eq",
"trust": 1.6,
"vendor": "copadata",
"version": "7.11"
},
{
"model": "zenon dnp3 ng driver",
"scope": "eq",
"trust": 1.6,
"vendor": "copadata",
"version": "7.10"
},
{
"model": null,
"scope": "eq",
"trust": 1.2,
"vendor": "zenon dnp3 ng driver",
"version": "7.11"
},
{
"model": "zenon dnp3 ng driver",
"scope": "eq",
"trust": 0.8,
"vendor": "ing punzenberger copa data",
"version": "7.10"
},
{
"model": "zenon dnp3 ng driver",
"scope": "eq",
"trust": 0.8,
"vendor": "ing punzenberger copa data",
"version": "7.11 to 7.11 sp0 build 10238"
},
{
"model": "zenon dnp3 process gateway",
"scope": "lte",
"trust": 0.8,
"vendor": "ing punzenberger copa data",
"version": "7.11 sp0 build 10238"
},
{
"model": null,
"scope": "eq",
"trust": 0.6,
"vendor": "zenon dnp3 ng driver",
"version": "7.10"
},
{
"model": null,
"scope": "eq",
"trust": 0.6,
"vendor": "zenon dnp3 process gateway",
"version": "7.11"
},
{
"model": "zenon dnp3 process gateway sp0 build",
"scope": "eq",
"trust": 0.6,
"vendor": "ing punzenberger copa data",
"version": "7.1110238"
},
{
"model": "zenon dnp3 ng driver sp0",
"scope": "eq",
"trust": 0.6,
"vendor": "ing punzenberger copa data",
"version": "7.10"
},
{
"model": "zenon dnp3 ng driver sp0 build",
"scope": "eq",
"trust": 0.6,
"vendor": "ing punzenberger copa data",
"version": "7.1110238"
}
],
"sources": [
{
"db": "IVD",
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1"
},
{
"db": "IVD",
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03595"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002759"
},
{
"db": "NVD",
"id": "CVE-2014-2345"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-060"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:copadata:zenon_dnp3_ng_driver:7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:copadata:zenon_dnp3_ng_driver:7.11:sp0_build_10238:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:copadata:zenon_dnp3_ng_driver:7.11:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:copadata:zenon_dnp3_process_gateway:7.11:sp0_build_10238:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2345"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "GmbH",
"sources": [
{
"db": "BID",
"id": "67805"
}
],
"trust": 0.3
},
"cve": "CVE-2014-2345",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.1,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-2345",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2014-03595",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-70284",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-2345",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2014-03595",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201406-060",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-70284",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1"
},
{
"db": "IVD",
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03595"
},
{
"db": "VULHUB",
"id": "VHN-70284"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002759"
},
{
"db": "NVD",
"id": "CVE-2014-2345"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-060"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP. The COPA-DATA zenon DNP3 NG driver (DNP3 master) and the zenon DNP3 Process Gateway (DNP3 outstation) are products of the zenon industrial automation software belonging to the HMI/SCADA class. A denial of service vulnerability exists in multiple CCOPA-DATA Zenon products. \nAttackers can exploit this issue to crash the affected application, denying service to legitimate users",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2345"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002759"
},
{
"db": "CNVD",
"id": "CNVD-2014-03595"
},
{
"db": "BID",
"id": "67805"
},
{
"db": "IVD",
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1"
},
{
"db": "IVD",
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-70284"
}
],
"trust": 3.06
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-2345",
"trust": 4.0
},
{
"db": "ICS CERT",
"id": "ICSA-14-154-01",
"trust": 3.4
},
{
"db": "CNNVD",
"id": "CNNVD-201406-060",
"trust": 1.3
},
{
"db": "CNVD",
"id": "CNVD-2014-03595",
"trust": 1.2
},
{
"db": "BID",
"id": "67805",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002759",
"trust": 0.8
},
{
"db": "OSVDB",
"id": "107667",
"trust": 0.6
},
{
"db": "IVD",
"id": "F2615C3E-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "7D79D08F-463F-11E9-ABBB-000C29342CB1",
"trust": 0.2
},
{
"db": "IVD",
"id": "598D9D0C-1ED2-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-70284",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1"
},
{
"db": "IVD",
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03595"
},
{
"db": "VULHUB",
"id": "VHN-70284"
},
{
"db": "BID",
"id": "67805"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002759"
},
{
"db": "NVD",
"id": "CVE-2014-2345"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-060"
}
]
},
"id": "VAR-201406-0145",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1"
},
{
"db": "IVD",
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03595"
},
{
"db": "VULHUB",
"id": "VHN-70284"
}
],
"trust": 2.05
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.2
}
],
"sources": [
{
"db": "IVD",
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1"
},
{
"db": "IVD",
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03595"
}
]
},
"last_update_date": "2023-12-18T13:24:54.817000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Article ID: 178001",
"trust": 0.8,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=814\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
},
{
"title": "Article ID: 179444",
"trust": 0.8,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=813\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
},
{
"title": "Patch for multiple CCOPA-DATA Zenon product denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/46388"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03595"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002759"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-70284"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002759"
},
{
"db": "NVD",
"id": "CVE-2014-2345"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-14-154-01"
},
{
"trust": 1.6,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=813\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
},
{
"trust": 1.6,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=814\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2345"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2345"
},
{
"trust": 0.6,
"url": "http://osvdb.com/show/osvdb/107667"
},
{
"trust": 0.3,
"url": "http://www.copadata.com/en/home.html"
},
{
"trust": 0.1,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=813\u0026amp;tx_hrfaq_pi1%5baction%5d=show\u0026amp;tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
},
{
"trust": 0.1,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=814\u0026amp;tx_hrfaq_pi1%5baction%5d=show\u0026amp;tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03595"
},
{
"db": "VULHUB",
"id": "VHN-70284"
},
{
"db": "BID",
"id": "67805"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002759"
},
{
"db": "NVD",
"id": "CVE-2014-2345"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-060"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1"
},
{
"db": "IVD",
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03595"
},
{
"db": "VULHUB",
"id": "VHN-70284"
},
{
"db": "BID",
"id": "67805"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002759"
},
{
"db": "NVD",
"id": "CVE-2014-2345"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-060"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-06-13T00:00:00",
"db": "IVD",
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2014-06-13T00:00:00",
"db": "IVD",
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1"
},
{
"date": "2014-06-13T00:00:00",
"db": "IVD",
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d"
},
{
"date": "2014-06-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03595"
},
{
"date": "2014-06-05T00:00:00",
"db": "VULHUB",
"id": "VHN-70284"
},
{
"date": "2014-06-03T00:00:00",
"db": "BID",
"id": "67805"
},
{
"date": "2014-06-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002759"
},
{
"date": "2014-06-05T17:55:05.950000",
"db": "NVD",
"id": "CVE-2014-2345"
},
{
"date": "2014-06-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201406-060"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-06-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03595"
},
{
"date": "2014-06-05T00:00:00",
"db": "VULHUB",
"id": "VHN-70284"
},
{
"date": "2014-06-03T00:00:00",
"db": "BID",
"id": "67805"
},
{
"date": "2014-06-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002759"
},
{
"date": "2014-06-05T18:34:44.610000",
"db": "NVD",
"id": "CVE-2014-2345"
},
{
"date": "2014-06-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201406-060"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201406-060"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "COPA-DATA zenon DNP3 NG driver and zenon DNP3 Process Gateway Service disruption in (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002759"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation",
"sources": [
{
"db": "IVD",
"id": "f2615c3e-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d08f-463f-11e9-abbb-000c29342cb1"
},
{
"db": "IVD",
"id": "598d9d0c-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-060"
}
],
"trust": 1.2
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…