VAR-201406-0146
Vulnerability from variot - Updated: 2023-12-18 13:24COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow physically proximate attackers to cause a denial of service (infinite loop and process crash) via crafted input over a serial line. The COPA-DATA zenon DNP3 NG driver (DNP3 master) and the zenon DNP3 Process Gateway (DNP3 outstation) are products of the zenon industrial automation software belonging to the HMI/SCADA class. Multiple COPA-DATA Zenon product local denial of service vulnerabilities. Local attackers can exploit this issue to crash the affected application, denying service to legitimate users
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201406-0146",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "zenon dnp3 ng driver",
"scope": "eq",
"trust": 1.6,
"vendor": "copadata",
"version": "7.11"
},
{
"model": "zenon dnp3 process gateway",
"scope": "eq",
"trust": 1.6,
"vendor": "copadata",
"version": "7.11"
},
{
"model": "zenon dnp3 ng driver",
"scope": "eq",
"trust": 1.6,
"vendor": "copadata",
"version": "7.10"
},
{
"model": null,
"scope": "eq",
"trust": 1.2,
"vendor": "zenon dnp3 ng driver",
"version": "7.11"
},
{
"model": "zenon dnp3 ng driver",
"scope": "eq",
"trust": 0.8,
"vendor": "ing punzenberger copa data",
"version": "7.10"
},
{
"model": "zenon dnp3 ng driver",
"scope": "eq",
"trust": 0.8,
"vendor": "ing punzenberger copa data",
"version": "7.11 to 7.11 sp0 build 10238"
},
{
"model": "zenon dnp3 process gateway",
"scope": "lte",
"trust": 0.8,
"vendor": "ing punzenberger copa data",
"version": "7.11 sp0 build 10238"
},
{
"model": null,
"scope": "eq",
"trust": 0.6,
"vendor": "zenon dnp3 ng driver",
"version": "7.10"
},
{
"model": null,
"scope": "eq",
"trust": 0.6,
"vendor": "zenon dnp3 process gateway",
"version": "7.11"
},
{
"model": "zenon dnp3 process gateway sp0 build",
"scope": "eq",
"trust": 0.6,
"vendor": "ing punzenberger copa data",
"version": "7.1110238"
},
{
"model": "zenon dnp3 ng driver sp0",
"scope": "eq",
"trust": 0.6,
"vendor": "ing punzenberger copa data",
"version": "7.10"
},
{
"model": "zenon dnp3 ng driver sp0 build",
"scope": "eq",
"trust": 0.6,
"vendor": "ing punzenberger copa data",
"version": "7.1110238"
}
],
"sources": [
{
"db": "IVD",
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1"
},
{
"db": "IVD",
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03596"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002760"
},
{
"db": "NVD",
"id": "CVE-2014-2346"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-061"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:copadata:zenon_dnp3_ng_driver:7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:copadata:zenon_dnp3_ng_driver:7.11:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:copadata:zenon_dnp3_ng_driver:7.11:sp0_build_10238:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:copadata:zenon_dnp3_process_gateway:7.11:sp0_build_10238:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2346"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "GmbH",
"sources": [
{
"db": "BID",
"id": "67806"
}
],
"trust": 0.3
},
"cve": "CVE-2014-2346",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.9,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 4.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-2346",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.9,
"id": "CNVD-2014-03596",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.9,
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.9,
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.9,
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.9,
"id": "VHN-70285",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:H/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-2346",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2014-03596",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201406-061",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-70285",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1"
},
{
"db": "IVD",
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03596"
},
{
"db": "VULHUB",
"id": "VHN-70285"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002760"
},
{
"db": "NVD",
"id": "CVE-2014-2346"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-061"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow physically proximate attackers to cause a denial of service (infinite loop and process crash) via crafted input over a serial line. The COPA-DATA zenon DNP3 NG driver (DNP3 master) and the zenon DNP3 Process Gateway (DNP3 outstation) are products of the zenon industrial automation software belonging to the HMI/SCADA class. Multiple COPA-DATA Zenon product local denial of service vulnerabilities. \nLocal attackers can exploit this issue to crash the affected application, denying service to legitimate users",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2346"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002760"
},
{
"db": "CNVD",
"id": "CNVD-2014-03596"
},
{
"db": "BID",
"id": "67806"
},
{
"db": "IVD",
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1"
},
{
"db": "IVD",
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-70285"
}
],
"trust": 3.06
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-2346",
"trust": 4.0
},
{
"db": "ICS CERT",
"id": "ICSA-14-154-01",
"trust": 3.4
},
{
"db": "CNNVD",
"id": "CNNVD-201406-061",
"trust": 1.3
},
{
"db": "CNVD",
"id": "CNVD-2014-03596",
"trust": 1.2
},
{
"db": "BID",
"id": "67806",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002760",
"trust": 0.8
},
{
"db": "OSVDB",
"id": "107668",
"trust": 0.6
},
{
"db": "IVD",
"id": "F257E7EE-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "IVD",
"id": "7D79D090-463F-11E9-AC5A-000C29342CB1",
"trust": 0.2
},
{
"db": "IVD",
"id": "5E825B90-1ED2-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-70285",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1"
},
{
"db": "IVD",
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03596"
},
{
"db": "VULHUB",
"id": "VHN-70285"
},
{
"db": "BID",
"id": "67806"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002760"
},
{
"db": "NVD",
"id": "CVE-2014-2346"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-061"
}
]
},
"id": "VAR-201406-0146",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1"
},
{
"db": "IVD",
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03596"
},
{
"db": "VULHUB",
"id": "VHN-70285"
}
],
"trust": 2.05
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.2
}
],
"sources": [
{
"db": "IVD",
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1"
},
{
"db": "IVD",
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03596"
}
]
},
"last_update_date": "2023-12-18T13:24:54.773000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Article ID: 178001",
"trust": 0.8,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=814\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
},
{
"title": "Article ID: 179444",
"trust": 0.8,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=813\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
},
{
"title": "Patch for multiple COPA-DATA Zenon product local denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/46389"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03596"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002760"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-70285"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002760"
},
{
"db": "NVD",
"id": "CVE-2014-2346"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "http://ics-cert.us-cert.gov/advisories/icsa-14-154-01"
},
{
"trust": 1.6,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=813\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
},
{
"trust": 1.6,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=814\u0026tx_hrfaq_pi1%5baction%5d=show\u0026tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2346"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2346"
},
{
"trust": 0.6,
"url": "http://osvdb.com/show/osvdb/107668"
},
{
"trust": 0.3,
"url": "http://www.copadata.com/en/home.html"
},
{
"trust": 0.1,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=813\u0026amp;tx_hrfaq_pi1%5baction%5d=show\u0026amp;tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
},
{
"trust": 0.1,
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5bknowledgebase%5d=814\u0026amp;tx_hrfaq_pi1%5baction%5d=show\u0026amp;tx_hrfaq_pi1%5bcontroller%5d=knowledgebase"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03596"
},
{
"db": "VULHUB",
"id": "VHN-70285"
},
{
"db": "BID",
"id": "67806"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002760"
},
{
"db": "NVD",
"id": "CVE-2014-2346"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-061"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1"
},
{
"db": "IVD",
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2014-03596"
},
{
"db": "VULHUB",
"id": "VHN-70285"
},
{
"db": "BID",
"id": "67806"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002760"
},
{
"db": "NVD",
"id": "CVE-2014-2346"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-061"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-06-13T00:00:00",
"db": "IVD",
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2014-06-13T00:00:00",
"db": "IVD",
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1"
},
{
"date": "2014-06-13T00:00:00",
"db": "IVD",
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d"
},
{
"date": "2014-06-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03596"
},
{
"date": "2014-06-05T00:00:00",
"db": "VULHUB",
"id": "VHN-70285"
},
{
"date": "2014-06-03T00:00:00",
"db": "BID",
"id": "67806"
},
{
"date": "2014-06-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002760"
},
{
"date": "2014-06-05T17:55:06.027000",
"db": "NVD",
"id": "CVE-2014-2346"
},
{
"date": "2014-06-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201406-061"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-06-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03596"
},
{
"date": "2014-06-05T00:00:00",
"db": "VULHUB",
"id": "VHN-70285"
},
{
"date": "2014-06-03T00:00:00",
"db": "BID",
"id": "67806"
},
{
"date": "2014-06-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002760"
},
{
"date": "2014-06-05T18:40:36.957000",
"db": "NVD",
"id": "CVE-2014-2346"
},
{
"date": "2014-06-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201406-061"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "67806"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-061"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "COPA-DATA zenon DNP3 NG Drivers and zenon DNP3 Process Gateway Service disruption in (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002760"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation",
"sources": [
{
"db": "IVD",
"id": "f257e7ee-2351-11e6-abef-000c29c66e3d"
},
{
"db": "IVD",
"id": "7d79d090-463f-11e9-ac5a-000c29342cb1"
},
{
"db": "IVD",
"id": "5e825b90-1ed2-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-061"
}
],
"trust": 1.2
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…