var-201406-0213
Vulnerability from variot
The System Landscape Directory (SLD) in SAP NetWeaver allows remote attackers to modify information via vectors related to adding a system. SAP is the world's leading provider of enterprise management software solutions. SAP System Landscape Directory is prone to an unauthorized-access vulnerability. Successful exploits will allow attackers to gain unauthorized access and modify sensitive information, which may aid in further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Onapsis Security Advisory 2014-020: SAP SLD Information Tampering
1. Impact on Business
By exploiting this vulnerability, a remote unauthenticated attacker might be able to modify technical information about the SAP systems potentially leading to a full compromise of all business information.
Risk Level: High
2. Advisory Information
-
-- Public Release Date: 2014-06-06
-
-- Subscriber Notification Date: 2014-06-06
-
-- Last Revised: 2014-06-06
-
-- Security Advisory ID: ONAPSIS-2014-020
-
-- Onapsis SVS ID: ONAPSIS-SVS00081
-
-- Researchers: Jordan Santarsieri, Pablo Muller, Juan Perez-Etchegoyen
-
-- Initial Base CVSS v2: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
3. Vulnerability Information
-
-- Vendor: SAP
-
-- Affected Components:
- SAP System Landscape Directory (available in all SAP JAVA App Servers) (Check SAP Note 1939334 for detailed information on affected releases)
-
-- Vulnerability Class: Improper Handling of Insufficient Permissions or Privileges (CWE-280)
-
-- Remotely Exploitable: Yes
-
-- Locally Exploitable: No
-
-- Authentication Required: No
-
-- Original Advisory: http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-020
Technical details about this issue are not disclosed at this moment with the purpose of providing enough time to affected customers to patch their systems and protect against the exploitation of the described vulnerability.
6. Solution
SAP has released SAP Note 1939334 which provide patched versions of the affected components.
The patches can be downloaded from https://service.sap.com/sap/support/notes/1939334.
Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks.
- 2014-02-11: SAP releases security patches. 2014-05-30: Onapsis notifies availability of security advisory to security mailing lists.
About Onapsis, Inc.
Onapsis provides innovative security software solutions to protect ERP systems from cyber-attacks. Through unmatched ERP security, compliance and continuous monitoring products, Onapsis secures the business-critical infrastructure of its global customers against espionage, sabotage and financial fraud threats.
Onapsis X1, the company's flagship product, is the industry's first comprehensive solution for the automated security assessment of SAP platforms. Being the first and only SAP-certified solution of its kind, Onapsis X1 allows customers to perform automated Vulnerability Assessments, Security & Compliance Audits and Penetration Tests over their entire SAP platform.
Onapsis is backed by the Onapsis Research Labs, a world-renowned team of SAP & ERP security experts who are continuously invited to lecture at the leading IT security conferences, such as RSA and BlackHat, and featured by mainstream media such as CNN, Reuters, IDG and New York Times.
For further information about our solutions, please contact us at info@onapsis.com and visit our website at www.onapsis.com. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Onapsis Research Team
iEYEARECAAYFAlOR3fUACgkQz3i6WNVBcDWrjwCdFC60a5sqq2hol1xAYYt0NczH fZwAn0St6TPuqLg210wpu2LM+bTDNY2S =2YwW -----END PGP SIGNATURE-----
Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.
http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0213", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netweaver", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": null }, { "model": "netweaver", "scope": null, "trust": 0.8, "vendor": "sap", "version": null }, { "model": "sap", "scope": null, "trust": 0.6, "vendor": "sap", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "netweaver", "version": null } ], "sources": [ { "db": "IVD", "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03664" }, { "db": "JVNDB", "id": "JVNDB-2014-002807" }, { "db": "NVD", "id": "CVE-2014-4003" }, { "db": "CNNVD", "id": "CNNVD-201406-118" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sap:netweaver:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-4003" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jordan Santarsieri, Pablo Muller, Juan Perez-Etchegoyen", "sources": [ { "db": "BID", "id": "67923" } ], "trust": 0.3 }, "cve": "CVE-2014-4003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-4003", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2014-03664", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-4003", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2014-03664", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201406-118", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03664" }, { "db": "JVNDB", "id": "JVNDB-2014-002807" }, { "db": "NVD", "id": "CVE-2014-4003" }, { "db": "CNNVD", "id": "CNNVD-201406-118" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The System Landscape Directory (SLD) in SAP NetWeaver allows remote attackers to modify information via vectors related to adding a system. SAP is the world\u0027s leading provider of enterprise management software solutions. SAP System Landscape Directory is prone to an unauthorized-access vulnerability. \nSuccessful exploits will allow attackers to gain unauthorized access and modify sensitive information, which may aid in further attacks. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nOnapsis Security Advisory 2014-020: SAP SLD Information Tampering\n\n\n1. Impact on Business\n===================== \nBy exploiting this vulnerability, a remote unauthenticated attacker\nmight be able to\nmodify technical information about the SAP systems potentially leading\nto a full compromise of all business information. \n\nRisk Level: High\n\n2. Advisory Information\n=======================\n\n- -- Public Release Date: 2014-06-06\n\n- -- Subscriber Notification Date: 2014-06-06\n \n- -- Last Revised: 2014-06-06\n\n- -- Security Advisory ID: ONAPSIS-2014-020\n\n- -- Onapsis SVS ID: ONAPSIS-SVS00081\n\n- -- Researchers: Jordan Santarsieri, Pablo Muller, Juan Perez-Etchegoyen\n\n- -- Initial Base CVSS v2: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)\n\n3. Vulnerability Information\n============================\n\n- -- Vendor: SAP\n\n- -- Affected Components:\n * SAP System Landscape Directory (available in all SAP JAVA App Servers)\n (Check SAP Note 1939334 for detailed information on affected releases)\n\n- -- Vulnerability Class: Improper Handling of Insufficient Permissions\nor Privileges (CWE-280)\n\n- -- Remotely Exploitable: Yes\n\n- -- Locally Exploitable: No\n\n- -- Authentication Required: No\n\n- -- Original Advisory:\nhttp://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-020\n\n\n4. \n\n\n5. \n\nTechnical details about this issue are not disclosed at this moment with\nthe purpose of\nproviding enough time to affected customers to patch their systems and\nprotect against\nthe exploitation of the described vulnerability. \n\n\n6. Solution\n===========\n\nSAP has released SAP Note 1939334 which provide patched versions of the\naffected components. \n\nThe patches can be downloaded from\nhttps://service.sap.com/sap/support/notes/1939334. \n\nOnapsis strongly recommends SAP customers to download the related\nsecurity fixes and apply them to the affected\ncomponents in order to reduce business risks. \n\n\n7. \n2014-02-11: SAP releases security patches. \n2014-05-30: Onapsis notifies availability of security advisory to\nsecurity mailing lists. \n\n\nAbout Onapsis, Inc. \n===================\n\nOnapsis provides innovative security software solutions to protect ERP\nsystems from cyber-attacks. Through unmatched ERP security, compliance\nand continuous monitoring products, Onapsis secures the\nbusiness-critical infrastructure of its global customers against\nespionage, sabotage and financial fraud threats. \n\nOnapsis X1, the company\u0027s flagship product, is the industry\u0027s first\ncomprehensive solution for the automated security assessment of SAP\nplatforms. Being the first and only SAP-certified solution of its kind,\nOnapsis X1 allows customers to perform automated Vulnerability\nAssessments, Security \u0026 Compliance Audits and Penetration Tests over\ntheir entire SAP platform. \n\nOnapsis is backed by the Onapsis Research Labs, a world-renowned team of\nSAP \u0026 ERP security experts who are continuously invited to lecture at\nthe leading IT security conferences, such as RSA and BlackHat, and\nfeatured by mainstream media such as CNN, Reuters, IDG and New York Times. \n\nFor further information about our solutions, please contact us at\ninfo@onapsis.com and visit our website at www.onapsis.com. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\nComment: Onapsis Research Team\n\niEYEARECAAYFAlOR3fUACgkQz3i6WNVBcDWrjwCdFC60a5sqq2hol1xAYYt0NczH\nfZwAn0St6TPuqLg210wpu2LM+bTDNY2S\n=2YwW\n-----END PGP SIGNATURE-----\n\n\n------------------------------------------------------------------------\nSecuring Apache Web Server with thawte Digital Certificate\nIn this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. \n\nhttp://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1\n------------------------------------------------------------------------\n\n", "sources": [ { "db": "NVD", "id": "CVE-2014-4003" }, { "db": "JVNDB", "id": "JVNDB-2014-002807" }, { "db": "CNVD", "id": "CNVD-2014-03664" }, { "db": "BID", "id": "67923" }, { "db": "IVD", "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "126986" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-4003", "trust": 2.9 }, { "db": "BID", "id": "67923", "trust": 1.9 }, { "db": "PACKETSTORM", "id": "126986", "trust": 1.1 }, { "db": "SECUNIA", "id": "58633", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2014-03664", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201406-118", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-002807", "trust": 0.8 }, { "db": "FULLDISC", "id": "20140606 [ONAPSIS SECURITY ADVISORY 2014-020] SAP SLD INFORMATION TAMPERING", "trust": 0.6 }, { "db": "IVD", "id": "F7471C7C-1ED1-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03664" }, { "db": "BID", "id": "67923" }, { "db": "JVNDB", "id": "JVNDB-2014-002807" }, { "db": "PACKETSTORM", "id": "126986" }, { "db": "NVD", "id": "CVE-2014-4003" }, { "db": "CNNVD", "id": "CNNVD-201406-118" } ] }, "id": "VAR-201406-0213", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03664" } ], "trust": 1.07111164 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03664" } ] }, "last_update_date": "2023-12-18T12:51:56.851000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP Security Note 1939334", "trust": 0.8, "url": "http://scn.sap.com/docs/doc-8218" }, { "title": "SAP System Landscape Directory is not authorized to access vulnerable patches", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/46408" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03664" }, { "db": "JVNDB", "id": "JVNDB-2014-002807" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002807" }, { "db": "NVD", "id": "CVE-2014-4003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "http://seclists.org/fulldisclosure/2014/jun/37" }, { "trust": 1.6, "url": "http://scn.sap.com/docs/doc-8218" }, { "trust": 1.6, "url": "https://service.sap.com/sap/support/notes/1939334" }, { "trust": 1.0, "url": "http://packetstormsecurity.com/files/126986/sap-sld-information-tampering.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/58633" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/532331/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/67923" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4003" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-4003" }, { "trust": 0.3, "url": "http://www.sap.com" }, { "trust": 0.1, "url": "https://www.onapsis.com." }, { "trust": 0.1, "url": "https://service.sap.com/sap/support/notes/1939334." }, { "trust": 0.1, "url": "http://www.dinclinx.com/redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1" }, { "trust": 0.1, "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-020" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03664" }, { "db": "BID", "id": "67923" }, { "db": "JVNDB", "id": "JVNDB-2014-002807" }, { "db": "PACKETSTORM", "id": "126986" }, { "db": "NVD", "id": "CVE-2014-4003" }, { "db": "CNNVD", "id": "CNNVD-201406-118" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03664" }, { "db": "BID", "id": "67923" }, { "db": "JVNDB", "id": "JVNDB-2014-002807" }, { "db": "PACKETSTORM", "id": "126986" }, { "db": "NVD", "id": "CVE-2014-4003" }, { "db": "CNNVD", "id": "CNNVD-201406-118" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-17T00:00:00", "db": "IVD", "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d" }, { "date": "2014-06-16T00:00:00", "db": "CNVD", "id": "CNVD-2014-03664" }, { "date": "2014-06-06T00:00:00", "db": "BID", "id": "67923" }, { "date": "2014-06-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002807" }, { "date": "2014-06-06T23:56:58", "db": "PACKETSTORM", "id": "126986" }, { "date": "2014-06-09T20:55:08.497000", "db": "NVD", "id": "CVE-2014-4003" }, { "date": "2014-06-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-118" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-17T00:00:00", "db": "CNVD", "id": "CNVD-2014-03664" }, { "date": "2014-06-11T00:02:00", "db": "BID", "id": "67923" }, { "date": "2014-06-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002807" }, { "date": "2018-10-09T19:47:33.220000", "db": "NVD", "id": "CVE-2014-4003" }, { "date": "2014-06-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-118" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "126986" }, { "db": "CNNVD", "id": "CNNVD-201406-118" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP System Landscape Directory Unauthorized Access Vulnerability", "sources": [ { "db": "IVD", "id": "f7471c7c-1ed1-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-03664" }, { "db": "BID", "id": "67923" } ], "trust": 1.1 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201406-118" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.