VAR-201501-0654

Vulnerability from variot - Updated: 2023-12-18 12:45

Cross-site scripting (XSS) vulnerability in D-link IP camera DCS-2103 with firmware before 1.20 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING to vb.htm. D-link IP camera The DCS-2103 is a camera for IP surveillance solutions. Dcs-2103 Hd Cube Network Camera is prone to a cross-site scripting vulnerability. If previous Path Traversal and Full path disclosure vulnerabilities were post-auth, then these BF and XSS vulnerabilities are pre-auth.


Affected products:

Vulnerable is the next model: D-Link DCS-2103, Firmware 1.0.0. For BF vulnerability version 1.20 and previous versions are vulnerable.

Developers refused to fix BF vulnerability (they think that it's problem of a user to have strong password) and XSS vulnerability was fixed in firmware version 1.20.


Details:

Brute Force (WASC-11):

http://site

No protection from BF attacks.

Cross-Site Scripting (WASC-08):

http://site/vb.htm?%3Cscript%3Ealert%28document.cookie%29%3C/script%3E


Timeline:

2014.05.22-2014.11.26 - conversation with D-Link about vulnerabilities in DAP-1360. 2014.08.01 - announced at my site about vulnerabilities in DCS-2103. 2014.11.14-2014.12.13 - conversation with D-Link about vulnerabilities in DCS-2103. 2014.12.16 - disclosed at my site (http://websecurity.com.ua/7288/).

I found this and other web cameras during summer to watch terrorists activities in Donetsk and Lugansks regions of Ukraine (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-November/009062.html) and also I took under control web cameras in Russia (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-December/009065.html).

Best wishes & regards, Eugene Dokukin aka MustLive Administrator of Websecurity web site http://websecurity.com.ua

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201501-0654",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dcs-2103",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.20"
      },
      {
        "model": "dcs-2103 hd cube network camera",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "d link",
        "version": "1.0.0"
      },
      {
        "model": "d-link dcs-2103",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "d-link dcs-2103",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.20"
      },
      {
        "model": "ip camera dcs-2103 with",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.20"
      },
      {
        "model": "dcs-2103 hd cube network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      },
      {
        "db": "BID",
        "id": "79983"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-078"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dcs-2103_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "1.20",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dcs-2103:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-9517"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "79983"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-9517",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2014-9517",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2015-00116",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-77462",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-9517",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-00116",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201501-078",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-77462",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77462"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-078"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site scripting (XSS) vulnerability in D-link IP camera DCS-2103 with firmware before 1.20 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING to vb.htm. D-link IP camera The DCS-2103 is a camera for IP surveillance solutions. Dcs-2103 Hd Cube Network Camera is prone to a cross-site scripting vulnerability. If previous Path Traversal and Full path disclosure \nvulnerabilities were post-auth, then these BF and XSS vulnerabilities are \npre-auth. \n\n-------------------------\nAffected products:\n-------------------------\n\nVulnerable is the next model: D-Link DCS-2103, Firmware 1.0.0. For BF \nvulnerability version 1.20 and previous versions are vulnerable. \n\nDevelopers refused to fix BF vulnerability (they think that it\u0027s problem of \na user to have strong password) and XSS vulnerability was fixed in firmware \nversion 1.20. \n\n----------\nDetails:\n----------\n\nBrute Force (WASC-11):\n\nhttp://site\n\nNo protection from BF attacks. \n\nCross-Site Scripting (WASC-08):\n\nhttp://site/vb.htm?%3Cscript%3Ealert%28document.cookie%29%3C/script%3E\n\n------------\nTimeline:\n------------\n\n2014.05.22-2014.11.26 - conversation with D-Link about vulnerabilities in \nDAP-1360. \n2014.08.01 - announced at my site about vulnerabilities in DCS-2103. \n2014.11.14-2014.12.13 - conversation with D-Link about vulnerabilities in \nDCS-2103. \n2014.12.16 - disclosed at my site (http://websecurity.com.ua/7288/). \n\nI found this and other web cameras during summer to watch terrorists \nactivities in Donetsk and Lugansks regions of Ukraine \n(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-November/009062.html) \nand also I took under control web cameras in Russia \n(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-December/009065.html). \n\nBest wishes \u0026 regards,\nEugene Dokukin aka MustLive\nAdministrator of Websecurity web site\nhttp://websecurity.com.ua \n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-9517"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      },
      {
        "db": "BID",
        "id": "79983"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77462"
      },
      {
        "db": "PACKETSTORM",
        "id": "129609"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-9517",
        "trust": 3.4
      },
      {
        "db": "PACKETSTORM",
        "id": "129609",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007509",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-078",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-00116",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "79983",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-77462",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77462"
      },
      {
        "db": "BID",
        "id": "79983"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      },
      {
        "db": "PACKETSTORM",
        "id": "129609"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-078"
      }
    ]
  },
  "id": "VAR-201501-0654",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77462"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:45:08.318000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "D-Link DCS-2103",
        "trust": 0.8,
        "url": "http://www.dlink.ru/mn/products/1433/1453.html"
      },
      {
        "title": "D-link IP camera DCS-2103 patch with firmware cross-site scripting vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/53603"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-77462"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9517"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://packetstormsecurity.com/files/129609/d-link-dcs-2103-brute-force-cross-site-scripting.html"
      },
      {
        "trust": 1.7,
        "url": "http://websecurity.com.ua/7288/"
      },
      {
        "trust": 1.4,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9517"
      },
      {
        "trust": 1.4,
        "url": "http://seclists.org/fulldisclosure/2014/dec/85"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9517"
      },
      {
        "trust": 0.1,
        "url": "http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-december/009065.html)."
      },
      {
        "trust": 0.1,
        "url": "http://websecurity.com.ua"
      },
      {
        "trust": 0.1,
        "url": "http://websecurity.com.ua/7288/)."
      },
      {
        "trust": 0.1,
        "url": "http://site/vb.htm?%3cscript%3ealert%28document.cookie%29%3c/script%3e"
      },
      {
        "trust": 0.1,
        "url": "http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-november/009062.html)"
      },
      {
        "trust": 0.1,
        "url": "http://site"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77462"
      },
      {
        "db": "BID",
        "id": "79983"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      },
      {
        "db": "PACKETSTORM",
        "id": "129609"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-078"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77462"
      },
      {
        "db": "BID",
        "id": "79983"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      },
      {
        "db": "PACKETSTORM",
        "id": "129609"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-078"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-01-07T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      },
      {
        "date": "2015-01-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77462"
      },
      {
        "date": "2015-01-05T00:00:00",
        "db": "BID",
        "id": "79983"
      },
      {
        "date": "2015-01-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      },
      {
        "date": "2014-12-16T10:22:22",
        "db": "PACKETSTORM",
        "id": "129609"
      },
      {
        "date": "2015-01-05T20:59:11.650000",
        "db": "NVD",
        "id": "CVE-2014-9517"
      },
      {
        "date": "2015-01-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201501-078"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-01-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-00116"
      },
      {
        "date": "2016-09-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77462"
      },
      {
        "date": "2015-01-05T00:00:00",
        "db": "BID",
        "id": "79983"
      },
      {
        "date": "2015-01-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      },
      {
        "date": "2023-11-17T20:01:31.690000",
        "db": "NVD",
        "id": "CVE-2014-9517"
      },
      {
        "date": "2015-01-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201501-078"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-078"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-link IP camera  DCS-2103 Firmware cross-site scripting vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007509"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "xss",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "129609"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201501-078"
      }
    ],
    "trust": 0.7
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…