VAR-201609-0305
Vulnerability from variot - Updated: 2023-12-18 12:57Yokogawa STARDOM FCN/FCJ controller R1.01 through R4.01 does not require authentication for Logic Designer connections, which allows remote attackers to reconfigure the device or cause a denial of service via a (1) stop application program, (2) change value, or (3) modify application command. Provided by Yokogawa Electric Corporation STARDOM A vulnerability exists in the controller that allows arbitrary commands to be executed. Provided by Yokogawa Electric Corporation STARDOM For small and medium-sized factories PLC Instrumentation system. STARDOM The controller is not authenticated when connecting from the logic designer (CWE-306) there is. for that reason, STARDOM An arbitrary command may be executed by a third party who can access the controller. CWE-306: Missing Authentication for Critical Function https://cwe.mitre.org/data/definitions/306.htmlSTARDOM By a third party with access to the controller IEC The application may be stopped, the value may be rewritten, or the application may be changed. YokogawaSTARDOMFCN/FCJcontroller is a controller for network-based control systems. Yokogawa STARDOM is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass authentication mechanism and execute arbitrary commands. The following versions are vulnerable: Yokogawa STARDOM FCJ versions from R1.01 to R4.01 are vulnerable. Yokogawa STARDOM FCN versions from R1.01 to R4.01 are vulnerable. The vulnerability is caused by the program not requiring authentication for Logic Designer connection
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0305",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "stardom fcn\\/fcj",
"scope": "eq",
"trust": 1.6,
"vendor": "yokogawa",
"version": "r2.01"
},
{
"model": "stardom fcn\\/fcj",
"scope": "eq",
"trust": 1.6,
"vendor": "yokogawa",
"version": "r1.01"
},
{
"model": "stardom fcn\\/fcj",
"scope": "eq",
"trust": 1.6,
"vendor": "yokogawa",
"version": "r4.01"
},
{
"model": "stardom fcn\\/fcj",
"scope": "eq",
"trust": 1.6,
"vendor": "yokogawa",
"version": "r3.01"
},
{
"model": "stardom",
"scope": "lte",
"trust": 0.8,
"vendor": "yokogawa electric",
"version": "fcn/fcj r1.01 from r4.01"
},
{
"model": "stardom fcj \u003er1.01 \u003cr4.01",
"scope": null,
"trust": 0.6,
"vendor": "yokogawa",
"version": null
},
{
"model": "stardom fcn \u003er1.01 \u003cr4.01",
"scope": null,
"trust": 0.6,
"vendor": "yokogawa",
"version": null
},
{
"model": "stardom fcn r4.01",
"scope": null,
"trust": 0.3,
"vendor": "yokogawa",
"version": null
},
{
"model": "stardom fcn r1.01",
"scope": null,
"trust": 0.3,
"vendor": "yokogawa",
"version": null
},
{
"model": "stardom fcj r4.01",
"scope": null,
"trust": 0.3,
"vendor": "yokogawa",
"version": null
},
{
"model": "stardom fcj r1.01",
"scope": null,
"trust": 0.3,
"vendor": "yokogawa",
"version": null
},
{
"model": "stardom fcn r4.02",
"scope": "ne",
"trust": 0.3,
"vendor": "yokogawa",
"version": null
},
{
"model": "stardom fcj r4.02",
"scope": "ne",
"trust": 0.3,
"vendor": "yokogawa",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08088"
},
{
"db": "BID",
"id": "92981"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004705"
},
{
"db": "NVD",
"id": "CVE-2016-4860"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-340"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:yokogawa:stardom_fcn\\/fcj:r2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:yokogawa:stardom_fcn\\/fcj:r3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:yokogawa:stardom_fcn\\/fcj:r4.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:yokogawa:stardom_fcn\\/fcj:r1.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4860"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "92981"
}
],
"trust": 0.3
},
"cve": "CVE-2016-4860",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2016-4860",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2016-08088",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-93679",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "Low",
"baseScore": 7.3,
"baseSeverity": "High",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2016-4860",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-4860",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-08088",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201609-340",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-93679",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08088"
},
{
"db": "VULHUB",
"id": "VHN-93679"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004705"
},
{
"db": "NVD",
"id": "CVE-2016-4860"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-340"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Yokogawa STARDOM FCN/FCJ controller R1.01 through R4.01 does not require authentication for Logic Designer connections, which allows remote attackers to reconfigure the device or cause a denial of service via a (1) stop application program, (2) change value, or (3) modify application command. Provided by Yokogawa Electric Corporation STARDOM A vulnerability exists in the controller that allows arbitrary commands to be executed. Provided by Yokogawa Electric Corporation STARDOM For small and medium-sized factories PLC Instrumentation system. STARDOM The controller is not authenticated when connecting from the logic designer (CWE-306) there is. for that reason, STARDOM An arbitrary command may be executed by a third party who can access the controller. CWE-306: Missing Authentication for Critical Function https://cwe.mitre.org/data/definitions/306.htmlSTARDOM By a third party with access to the controller IEC The application may be stopped, the value may be rewritten, or the application may be changed. YokogawaSTARDOMFCN/FCJcontroller is a controller for network-based control systems. Yokogawa STARDOM is prone to an authentication-bypass vulnerability. \nAn attacker can exploit this issue to bypass authentication mechanism and execute arbitrary commands. \nThe following versions are vulnerable:\nYokogawa STARDOM FCJ versions from R1.01 to R4.01 are vulnerable. \nYokogawa STARDOM FCN versions from R1.01 to R4.01 are vulnerable. The vulnerability is caused by the program not requiring authentication for Logic Designer connection",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4860"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004705"
},
{
"db": "CNVD",
"id": "CNVD-2016-08088"
},
{
"db": "BID",
"id": "92981"
},
{
"db": "VULHUB",
"id": "VHN-93679"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4860",
"trust": 3.4
},
{
"db": "ICS CERT",
"id": "ICSA-16-259-01",
"trust": 2.8
},
{
"db": "BID",
"id": "92981",
"trust": 2.0
},
{
"db": "JVN",
"id": "JVNVU98542287",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004705",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201609-340",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-08088",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-93679",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08088"
},
{
"db": "VULHUB",
"id": "VHN-93679"
},
{
"db": "BID",
"id": "92981"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004705"
},
{
"db": "NVD",
"id": "CVE-2016-4860"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-340"
}
]
},
"id": "VAR-201609-0305",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08088"
},
{
"db": "VULHUB",
"id": "VHN-93679"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08088"
}
]
},
"last_update_date": "2023-12-18T12:57:36.364000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "YSAR-16-0002:STARDOM \u30b3\u30f3\u30c8\u30ed\u30fc\u30e9\u306b\u4efb\u610f\u306e\u30b3\u30de\u30f3\u30c9\u3092\u5b9f\u884c\u3055\u308c\u308b\u8106\u5f31\u6027",
"trust": 0.8,
"url": "http://www.yokogawa.co.jp/dcs/security/ysar/ysar-16-0002-j.pdf"
},
{
"title": "\u6a2a\u6cb3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u60c5\u5831",
"trust": 0.8,
"url": "http://www.yokogawa.co.jp/dcs/security/ysar/dcs-ysar-index-ja.htm"
},
{
"title": "\u4e2d\u5c0f\u898f\u6a21\u5411\u3051PLC\u8a08\u88c5\u30b7\u30b9\u30c6\u30e0 STARDOM\uff08\u30b9\u30bf\u30fc\u30c0\u30e0\uff09",
"trust": 0.8,
"url": "http://www.yokogawa.co.jp/stardom/stardom-index.htm?ms=jp"
},
{
"title": "YokogawaSTARDOM certification bypasses the patch for the vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/81660"
},
{
"title": "Yokogawa STARDOM FCN/FCJ Repair measures for controller security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=64140"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08088"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004705"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-340"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-93679"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004705"
},
{
"db": "NVD",
"id": "CVE-2016-4860"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-259-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/92981"
},
{
"trust": 1.7,
"url": "https://web-material3.yokogawa.com/ysar-16-0002-e.pdf"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4860"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu98542287/index.html"
},
{
"trust": 0.8,
"url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4860"
},
{
"trust": 0.3,
"url": "http://www.yokogawa.com/"
},
{
"trust": 0.3,
"url": "https://web-material3.yokogawa.com/ysar-16-0002-e.pdf?_ga=1.58874094.2131094256.1474023671"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08088"
},
{
"db": "VULHUB",
"id": "VHN-93679"
},
{
"db": "BID",
"id": "92981"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004705"
},
{
"db": "NVD",
"id": "CVE-2016-4860"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-340"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-08088"
},
{
"db": "VULHUB",
"id": "VHN-93679"
},
{
"db": "BID",
"id": "92981"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004705"
},
{
"db": "NVD",
"id": "CVE-2016-4860"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-340"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-08088"
},
{
"date": "2016-09-19T00:00:00",
"db": "VULHUB",
"id": "VHN-93679"
},
{
"date": "2016-09-15T00:00:00",
"db": "BID",
"id": "92981"
},
{
"date": "2016-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004705"
},
{
"date": "2016-09-19T01:59:03.837000",
"db": "NVD",
"id": "CVE-2016-4860"
},
{
"date": "2016-09-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-340"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-08088"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-93679"
},
{
"date": "2016-09-15T00:00:00",
"db": "BID",
"id": "92981"
},
{
"date": "2016-10-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004705"
},
{
"date": "2016-11-28T20:21:55.717000",
"db": "NVD",
"id": "CVE-2016-4860"
},
{
"date": "2016-09-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-340"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-340"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "STARDOM Vulnerability in arbitrary command execution on controller",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004705"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-340"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.