VAR-201702-0416

Vulnerability from variot - Updated: 2023-12-18 12:51

An issue was discovered in Locus Energy LGate prior to 1.05H, LGate 50, LGate 100, LGate 101, LGate 120, and LGate 320. Locus Energy meters use a PHP script to manage the energy meter parameters for voltage monitoring and network configuration. The PHP code does not properly validate information that is sent in the POST request. Sauter is a leading provider of construction, room automation, energy management and equipment management. The Sauter NovaWeb Web HMI has a certification bypass vulnerability that an attacker can use to bypass security restrictions and perform unauthorized operations. An attacker may leverage this issue to inject and execute arbitrary commands. Sauter NovaWeb Web HMI is prone to an authentication-bypass vulnerability. Attackers can exploit this issue to gain unauthorized access and perform unauthorized actions. are the Web-based data acquisition systems of Locus Energy Corporation in the United States

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0416",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "lgate",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "locusenergy",
        "version": null
      },
      {
        "model": "lgate 100",
        "scope": null,
        "trust": 0.8,
        "vendor": "locus energy",
        "version": null
      },
      {
        "model": "lgate 101",
        "scope": null,
        "trust": 0.8,
        "vendor": "locus energy",
        "version": null
      },
      {
        "model": "lgate 120",
        "scope": null,
        "trust": 0.8,
        "vendor": "locus energy",
        "version": null
      },
      {
        "model": "lgate 320",
        "scope": null,
        "trust": 0.8,
        "vendor": "locus energy",
        "version": null
      },
      {
        "model": "lgate 50",
        "scope": null,
        "trust": 0.8,
        "vendor": "locus energy",
        "version": null
      },
      {
        "model": "lgate",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "locus energy",
        "version": "1.05h"
      },
      {
        "model": "novaweb web hmi",
        "scope": null,
        "trust": 0.6,
        "vendor": "sauter",
        "version": null
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "500"
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "3200"
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "1200"
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "1010"
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "1000"
      },
      {
        "model": "energy lgate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "locus",
        "version": "0"
      },
      {
        "model": "energy lgate 1.05h",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "locus",
        "version": null
      },
      {
        "model": "novaweb web hmi",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sauter",
        "version": "0"
      },
      {
        "model": "novaweb web hmi",
        "scope": "eq",
        "trust": 0.2,
        "vendor": "sauter",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:locusenergy:lgate_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:locusenergy:lgate_100:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:locusenergy:lgate_120:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:locusenergy:lgate_320:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:locusenergy:lgate_50:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:locusenergy:lgate_101:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Maxim Rupp,Daniel Reich",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2016-5782",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2016-5782",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-12553",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-94601",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "LOW",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 4.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "Low",
            "baseScore": 8.6,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2016-5782",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-5782",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-12553",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201612-182",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-94601",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in Locus Energy LGate prior to 1.05H, LGate 50, LGate 100, LGate 101, LGate 120, and LGate 320. Locus Energy meters use a PHP script to manage the energy meter parameters for voltage monitoring and network configuration. The PHP code does not properly validate information that is sent in the POST request. Sauter is a leading provider of construction, room automation, energy management and equipment management. The Sauter NovaWeb Web HMI has a certification bypass vulnerability that an attacker can use to bypass security restrictions and perform unauthorized operations. \nAn attacker may leverage this issue to inject and execute arbitrary commands. Sauter NovaWeb Web HMI is prone to an authentication-bypass vulnerability. \nAttackers can exploit this issue to gain unauthorized access and perform unauthorized actions. are the Web-based data acquisition systems of Locus Energy Corporation in the United States",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      },
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      }
    ],
    "trust": 2.97
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-5782",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "94782",
        "trust": 2.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-231-01",
        "trust": 2.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-343-02",
        "trust": 1.5
      },
      {
        "db": "BID",
        "id": "94698",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "3927BA3A-7291-4EFE-8EB4-5C278DE9FCFD",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ]
  },
  "id": "VAR-201702-0416",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:51:24.170000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://locusenergy.com/"
      },
      {
        "title": "Multiple Locus Energy LGate Product Command Injection Vulnerability Fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66223"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/94782"
      },
      {
        "trust": 2.2,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-231-01-0"
      },
      {
        "trust": 1.5,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-343-02"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/94698"
      },
      {
        "trust": 0.9,
        "url": "http://www.sauter-controls.com/en.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5782"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5782"
      },
      {
        "trust": 0.3,
        "url": "http://locusenergy.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5782"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-19T00:00:00",
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "date": "2016-12-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "date": "2017-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "date": "2016-12-06T00:00:00",
        "db": "BID",
        "id": "94698"
      },
      {
        "date": "2016-12-08T00:00:00",
        "db": "BID",
        "id": "94782"
      },
      {
        "date": "2017-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "date": "2017-02-13T21:59:00.190000",
        "db": "NVD",
        "id": "CVE-2016-5782"
      },
      {
        "date": "2016-12-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      },
      {
        "date": "2017-03-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94601"
      },
      {
        "date": "2016-12-20T01:08:00",
        "db": "BID",
        "id": "94698"
      },
      {
        "date": "2019-04-12T21:00:00",
        "db": "BID",
        "id": "94782"
      },
      {
        "date": "2017-04-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007973"
      },
      {
        "date": "2017-03-14T19:17:44.520000",
        "db": "NVD",
        "id": "CVE-2016-5782"
      },
      {
        "date": "2019-04-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "BID",
        "id": "94782"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sauter NovaWeb Web HMI Authentication Bypass Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-12553"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Input validation error",
    "sources": [
      {
        "db": "IVD",
        "id": "3927ba3a-7291-4efe-8eb4-5c278de9fcfd"
      },
      {
        "db": "BID",
        "id": "94698"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-182"
      }
    ],
    "trust": 1.1
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…