VAR-201511-0016
Vulnerability from variot - Updated: 2023-12-18 12:37Unitronics VisiLogic OPLC IDE before 9.8.02 allows remote attackers to execute unspecified code via unknown vectors. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within implementation of the WinSockPath property of the HTTPS ActiveX control. The control passes this property as the URL for a DLL to the LoadLibraryA API, which will automatically execute DllMain in the DLL. This can be leveraged by an attacker for remote code execution in the context of the process. A crafted value can cause system software to treat arbitrary memory as a certificate structure which is then modified. Unitronics VisiLogic OPLC IDE is Unitronics' suite of human machine interface (HMI) and PLC application programming environments for SAMBA series controllers. A security vulnerability exists in Unitronics VisiLogic OPLC IDE 9.8.0.0 and earlier. Unitronics VisiLogic is prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. The affected ActiveX control is identified by CLSID: 3D6F2DBA-F4E5-40A6-8725-E99BC96CC23A. Note: This issue was previously titled 'Unitronics VisiLogic ActiveX Control Security Bypass and Arbitrary Code Injection Vulnerabilities'. The title and technical details have been changed to better reflect the underlying component affected. Unitronics VisiLogic 9.8.0.00 and prior versions are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201511-0016",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "unidownloader visilogic oplc ide",
"scope": null,
"trust": 1.4,
"vendor": "unitronicsunitronics",
"version": null
},
{
"model": "visilogic oplc ide",
"scope": "lte",
"trust": 1.0,
"vendor": "unitronics",
"version": "9.8.0.00"
},
{
"model": "visilogic oplc ide",
"scope": "lt",
"trust": 0.8,
"vendor": "unitronics",
"version": "9.8.02"
},
{
"model": "unidownloader",
"scope": null,
"trust": 0.7,
"vendor": "unitronics",
"version": null
},
{
"model": "visilogic oplc ide",
"scope": "lte",
"trust": 0.6,
"vendor": "unitronics",
"version": "\u003c=9.8.0.00"
},
{
"model": "visilogic oplc ide",
"scope": "eq",
"trust": 0.6,
"vendor": "unitronics",
"version": "9.8.0.00"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "visilogic oplc ide",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-15-576"
},
{
"db": "ZDI",
"id": "ZDI-15-574"
},
{
"db": "ZDI",
"id": "ZDI-15-575"
},
{
"db": "CNVD",
"id": "CNVD-2015-07636"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005913"
},
{
"db": "NVD",
"id": "CVE-2015-7905"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:unitronics:visilogic_oplc_ide:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "9.8.0.00",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-7905"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Andrea Micalizzi (rgod)",
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-576"
},
{
"db": "ZDI",
"id": "ZDI-15-574"
},
{
"db": "ZDI",
"id": "ZDI-15-575"
}
],
"trust": 2.1
},
"cve": "CVE-2015-7905",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-7905",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 2.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2015-7905",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-07636",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "6d539d54-2351-11e6-abef-000c29c66e3d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
}
],
"cvssV3": [],
"severity": [
{
"author": "ZDI",
"id": "CVE-2015-7905",
"trust": 2.1,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-7905",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2015-07636",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201511-245",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-15-576"
},
{
"db": "ZDI",
"id": "ZDI-15-574"
},
{
"db": "ZDI",
"id": "ZDI-15-575"
},
{
"db": "CNVD",
"id": "CNVD-2015-07636"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005913"
},
{
"db": "NVD",
"id": "CVE-2015-7905"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unitronics VisiLogic OPLC IDE before 9.8.02 allows remote attackers to execute unspecified code via unknown vectors. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within implementation of the WinSockPath property of the HTTPS ActiveX control. The control passes this property as the URL for a DLL to the LoadLibraryA API, which will automatically execute DllMain in the DLL. This can be leveraged by an attacker for remote code execution in the context of the process. A crafted value can cause system software to treat arbitrary memory as a certificate structure which is then modified. Unitronics VisiLogic OPLC IDE is Unitronics\u0027 suite of human machine interface (HMI) and PLC application programming environments for SAMBA series controllers. A security vulnerability exists in Unitronics VisiLogic OPLC IDE 9.8.0.0 and earlier. Unitronics VisiLogic is prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely result in denial-of-service conditions. \nThe affected ActiveX control is identified by CLSID: 3D6F2DBA-F4E5-40A6-8725-E99BC96CC23A. \nNote: This issue was previously titled \u0027Unitronics VisiLogic ActiveX Control Security Bypass and Arbitrary Code Injection Vulnerabilities\u0027. The title and technical details have been changed to better reflect the underlying component affected. \nUnitronics VisiLogic 9.8.0.00 and prior versions are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-7905"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005913"
},
{
"db": "ZDI",
"id": "ZDI-15-576"
},
{
"db": "ZDI",
"id": "ZDI-15-574"
},
{
"db": "ZDI",
"id": "ZDI-15-575"
},
{
"db": "CNVD",
"id": "CNVD-2015-07636"
},
{
"db": "BID",
"id": "77571"
},
{
"db": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d"
}
],
"trust": 4.5
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-7905",
"trust": 5.6
},
{
"db": "ICS CERT",
"id": "ICSA-15-274-02",
"trust": 3.0
},
{
"db": "BID",
"id": "77571",
"trust": 1.9
},
{
"db": "ZDI",
"id": "ZDI-15-576",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-15-574",
"trust": 1.7
},
{
"db": "ZDI",
"id": "ZDI-15-575",
"trust": 1.7
},
{
"db": "CNVD",
"id": "CNVD-2015-07636",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201511-245",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005913",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-2965",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-2964",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-2930",
"trust": 0.7
},
{
"db": "IVD",
"id": "6D539D54-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-15-576"
},
{
"db": "ZDI",
"id": "ZDI-15-574"
},
{
"db": "ZDI",
"id": "ZDI-15-575"
},
{
"db": "CNVD",
"id": "CNVD-2015-07636"
},
{
"db": "BID",
"id": "77571"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005913"
},
{
"db": "NVD",
"id": "CVE-2015-7905"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
]
},
"id": "VAR-201511-0016",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-07636"
}
],
"trust": 1.3869565000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-07636"
}
]
},
"last_update_date": "2023-12-18T12:37:55.668000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Unitronics has issued an update to correct this vulnerability. Unitronics has issued an update to correct this vulnerability.",
"trust": 2.1,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-274-02"
},
{
"title": "Download -VisiLogic (Vision Series)",
"trust": 0.8,
"url": "http://www.unitronics.com/support/downloads"
},
{
"title": "Patch for Unitronics VisiLogic OPLC IDE Code Injection Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/66867"
},
{
"title": "Unitronics VisiLogic OPLC IDE Fixes for code injection vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=58734"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-576"
},
{
"db": "ZDI",
"id": "ZDI-15-574"
},
{
"db": "ZDI",
"id": "ZDI-15-575"
},
{
"db": "CNVD",
"id": "CNVD-2015-07636"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005913"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-94",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-005913"
},
{
"db": "NVD",
"id": "CVE-2015-7905"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 6.5,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-274-02"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/bid/77571"
},
{
"trust": 1.0,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-574"
},
{
"trust": 1.0,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-575"
},
{
"trust": 1.0,
"url": "http://www.zerodayinitiative.com/advisories/zdi-15-576"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7905"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7905"
},
{
"trust": 0.3,
"url": "http://support.microsoft.com/kb/240797"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-15-576"
},
{
"db": "ZDI",
"id": "ZDI-15-574"
},
{
"db": "ZDI",
"id": "ZDI-15-575"
},
{
"db": "CNVD",
"id": "CNVD-2015-07636"
},
{
"db": "BID",
"id": "77571"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005913"
},
{
"db": "NVD",
"id": "CVE-2015-7905"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d"
},
{
"db": "ZDI",
"id": "ZDI-15-576"
},
{
"db": "ZDI",
"id": "ZDI-15-574"
},
{
"db": "ZDI",
"id": "ZDI-15-575"
},
{
"db": "CNVD",
"id": "CNVD-2015-07636"
},
{
"db": "BID",
"id": "77571"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-005913"
},
{
"db": "NVD",
"id": "CVE-2015-7905"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-11-18T00:00:00",
"db": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2015-12-02T00:00:00",
"db": "ZDI",
"id": "ZDI-15-576"
},
{
"date": "2015-12-02T00:00:00",
"db": "ZDI",
"id": "ZDI-15-574"
},
{
"date": "2015-12-02T00:00:00",
"db": "ZDI",
"id": "ZDI-15-575"
},
{
"date": "2015-11-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07636"
},
{
"date": "2015-11-12T00:00:00",
"db": "BID",
"id": "77571"
},
{
"date": "2015-11-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005913"
},
{
"date": "2015-11-13T03:59:04.977000",
"db": "NVD",
"id": "CVE-2015-7905"
},
{
"date": "2015-11-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-02T00:00:00",
"db": "ZDI",
"id": "ZDI-15-576"
},
{
"date": "2015-12-02T00:00:00",
"db": "ZDI",
"id": "ZDI-15-574"
},
{
"date": "2015-12-02T00:00:00",
"db": "ZDI",
"id": "ZDI-15-575"
},
{
"date": "2015-11-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-07636"
},
{
"date": "2015-12-08T22:23:00",
"db": "BID",
"id": "77571"
},
{
"date": "2015-11-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-005913"
},
{
"date": "2017-01-12T12:05:03.310000",
"db": "NVD",
"id": "CVE-2015-7905"
},
{
"date": "2015-11-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unitronics VisiLogic OPLC IDE Code injection vulnerability",
"sources": [
{
"db": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-07636"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Code injection",
"sources": [
{
"db": "IVD",
"id": "6d539d54-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNNVD",
"id": "CNNVD-201511-245"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.