VAR-201702-0421
Vulnerability from variot - Updated: 2023-12-18 12:20An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to 2.10.10. Multiple instances of out-of-bounds write conditions may allow malicious files to be read and executed by the affected software. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within parsing of a dvp file. A malformed dvp file can cause heap corruption and the BorrlndmmSysGetMem function will write to an arbitrary memory location in the user process. A remote attacker could leverage this vulnerability to execute arbitrary code in the context of the process. The process does not properly validate user-supplied data which can result in a write past the end of an allocated buffer. Delta Electronics WPLSoft and others are software control platforms used by Delta Electronics to edit the Delta DVP series of programmable logic controllers (PLCs)
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201702-0421",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wplsoft",
"scope": null,
"trust": 2.8,
"vendor": "delta industrial automation",
"version": null
},
{
"model": "wplsoft",
"scope": "eq",
"trust": 1.6,
"vendor": "delta",
"version": null
},
{
"model": "ispsoft",
"scope": "eq",
"trust": 1.6,
"vendor": "delta",
"version": null
},
{
"model": "pmsoft",
"scope": "eq",
"trust": 1.6,
"vendor": "delta",
"version": null
},
{
"model": "electronics inc ispsoft",
"scope": "eq",
"trust": 0.9,
"vendor": "delta",
"version": "3.0"
},
{
"model": "electronics inc pmsoft",
"scope": "eq",
"trust": 0.9,
"vendor": "delta",
"version": "2.0"
},
{
"model": "electronics inc wplsoft",
"scope": "eq",
"trust": 0.9,
"vendor": "delta",
"version": "2.0"
},
{
"model": "ispsoft",
"scope": "lt",
"trust": 0.8,
"vendor": "delta",
"version": "3.02.11"
},
{
"model": "pmsoft",
"scope": "lt",
"trust": 0.8,
"vendor": "delta",
"version": "2.10.10"
},
{
"model": "wplsoft",
"scope": "lt",
"trust": 0.8,
"vendor": "delta",
"version": "2.42.11"
},
{
"model": "pmsoft",
"scope": null,
"trust": 0.7,
"vendor": "delta industrial automation",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "ispsoft",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "pmsoft",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "wplsoft",
"version": null
},
{
"model": "electronics inc wplsoft",
"scope": "ne",
"trust": 0.3,
"vendor": "delta",
"version": "2.42.11"
},
{
"model": "electronics inc pmsoft",
"scope": "ne",
"trust": 0.3,
"vendor": "delta",
"version": "2.10.10"
},
{
"model": "electronics inc ispsoft",
"scope": "ne",
"trust": 0.3,
"vendor": "delta",
"version": "3.02.11"
}
],
"sources": [
{
"db": "IVD",
"id": "369617cd-e442-4f7b-852f-d167d53a3ae8"
},
{
"db": "IVD",
"id": "e2ff3e00-39ab-11e9-baf6-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-16-660"
},
{
"db": "ZDI",
"id": "ZDI-16-646"
},
{
"db": "ZDI",
"id": "ZDI-16-647"
},
{
"db": "ZDI",
"id": "ZDI-16-652"
},
{
"db": "ZDI",
"id": "ZDI-16-663"
},
{
"db": "CNVD",
"id": "CNVD-2016-12682"
},
{
"db": "BID",
"id": "94887"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007976"
},
{
"db": "NVD",
"id": "CVE-2016-5802"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-510"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:delta_electronics:pmsoft:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:delta_electronics:wplsoft:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:delta_electronics:ispsoft:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-5802"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "axt",
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-660"
},
{
"db": "ZDI",
"id": "ZDI-16-647"
},
{
"db": "ZDI",
"id": "ZDI-16-652"
},
{
"db": "ZDI",
"id": "ZDI-16-663"
}
],
"trust": 2.8
},
"cve": "CVE-2016-5802",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2016-5802",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 2.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2016-5802",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 1.4,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-12682",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "369617cd-e442-4f7b-852f-d167d53a3ae8",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "e2ff3e00-39ab-11e9-baf6-000c29342cb1",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-94621",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2016-5802",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2016-5802",
"trust": 2.1,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2016-5802",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "ZDI",
"id": "CVE-2016-5802",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-12682",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201612-510",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "369617cd-e442-4f7b-852f-d167d53a3ae8",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e2ff3e00-39ab-11e9-baf6-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-94621",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "369617cd-e442-4f7b-852f-d167d53a3ae8"
},
{
"db": "IVD",
"id": "e2ff3e00-39ab-11e9-baf6-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-16-660"
},
{
"db": "ZDI",
"id": "ZDI-16-646"
},
{
"db": "ZDI",
"id": "ZDI-16-647"
},
{
"db": "ZDI",
"id": "ZDI-16-652"
},
{
"db": "ZDI",
"id": "ZDI-16-663"
},
{
"db": "CNVD",
"id": "CNVD-2016-12682"
},
{
"db": "VULHUB",
"id": "VHN-94621"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007976"
},
{
"db": "NVD",
"id": "CVE-2016-5802"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-510"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to 2.10.10. Multiple instances of out-of-bounds write conditions may allow malicious files to be read and executed by the affected software. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within parsing of a dvp file. A malformed dvp file can cause heap corruption and the BorrlndmmSysGetMem function will write to an arbitrary memory location in the user process. A remote attacker could leverage this vulnerability to execute arbitrary code in the context of the process. The process does not properly validate user-supplied data which can result in a write past the end of an allocated buffer. Delta Electronics WPLSoft and others are software control platforms used by Delta Electronics to edit the Delta DVP series of programmable logic controllers (PLCs)",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-5802"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007976"
},
{
"db": "ZDI",
"id": "ZDI-16-660"
},
{
"db": "ZDI",
"id": "ZDI-16-646"
},
{
"db": "ZDI",
"id": "ZDI-16-647"
},
{
"db": "ZDI",
"id": "ZDI-16-652"
},
{
"db": "ZDI",
"id": "ZDI-16-663"
},
{
"db": "CNVD",
"id": "CNVD-2016-12682"
},
{
"db": "BID",
"id": "94887"
},
{
"db": "IVD",
"id": "369617cd-e442-4f7b-852f-d167d53a3ae8"
},
{
"db": "IVD",
"id": "e2ff3e00-39ab-11e9-baf6-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-94621"
}
],
"trust": 6.03
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-5802",
"trust": 7.3
},
{
"db": "ICS CERT",
"id": "ICSA-16-348-03",
"trust": 3.4
},
{
"db": "BID",
"id": "94887",
"trust": 2.6
},
{
"db": "CNNVD",
"id": "CNNVD-201612-510",
"trust": 1.1
},
{
"db": "CNVD",
"id": "CNVD-2016-12682",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007976",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3914",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-16-660",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3587",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-16-646",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3858",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-16-647",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3861",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-16-652",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-3935",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-16-663",
"trust": 0.7
},
{
"db": "IVD",
"id": "369617CD-E442-4F7B-852F-D167D53A3AE8",
"trust": 0.2
},
{
"db": "IVD",
"id": "E2FF3E00-39AB-11E9-BAF6-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-94621",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "369617cd-e442-4f7b-852f-d167d53a3ae8"
},
{
"db": "IVD",
"id": "e2ff3e00-39ab-11e9-baf6-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-16-660"
},
{
"db": "ZDI",
"id": "ZDI-16-646"
},
{
"db": "ZDI",
"id": "ZDI-16-647"
},
{
"db": "ZDI",
"id": "ZDI-16-652"
},
{
"db": "ZDI",
"id": "ZDI-16-663"
},
{
"db": "CNVD",
"id": "CNVD-2016-12682"
},
{
"db": "VULHUB",
"id": "VHN-94621"
},
{
"db": "BID",
"id": "94887"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007976"
},
{
"db": "NVD",
"id": "CVE-2016-5802"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-510"
}
]
},
"id": "VAR-201702-0421",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "369617cd-e442-4f7b-852f-d167d53a3ae8"
},
{
"db": "IVD",
"id": "e2ff3e00-39ab-11e9-baf6-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2016-12682"
},
{
"db": "VULHUB",
"id": "VHN-94621"
}
],
"trust": 1.7291666650000002
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.0
}
],
"sources": [
{
"db": "IVD",
"id": "369617cd-e442-4f7b-852f-d167d53a3ae8"
},
{
"db": "IVD",
"id": "e2ff3e00-39ab-11e9-baf6-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2016-12682"
}
]
},
"last_update_date": "2023-12-18T12:20:04.949000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Delta Industrial Automation has issued an update to correct this vulnerability.",
"trust": 3.5,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-348-03"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.deltaww.com/"
},
{
"title": "Patches for arbitrary file access vulnerabilities in various Delta Electronics products",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/86303"
},
{
"title": "Multiple Delta Electronics Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=66544"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-660"
},
{
"db": "ZDI",
"id": "ZDI-16-646"
},
{
"db": "ZDI",
"id": "ZDI-16-647"
},
{
"db": "ZDI",
"id": "ZDI-16-652"
},
{
"db": "ZDI",
"id": "ZDI-16-663"
},
{
"db": "CNVD",
"id": "CNVD-2016-12682"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007976"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-510"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-94621"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007976"
},
{
"db": "NVD",
"id": "CVE-2016-5802"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 6.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-348-03"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/94887"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5802"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-5802"
},
{
"trust": 0.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-348-03#footnotea_6tkr584"
},
{
"trust": 0.3,
"url": "http://www.deltaww.com/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-16-660"
},
{
"db": "ZDI",
"id": "ZDI-16-646"
},
{
"db": "ZDI",
"id": "ZDI-16-647"
},
{
"db": "ZDI",
"id": "ZDI-16-652"
},
{
"db": "ZDI",
"id": "ZDI-16-663"
},
{
"db": "CNVD",
"id": "CNVD-2016-12682"
},
{
"db": "VULHUB",
"id": "VHN-94621"
},
{
"db": "BID",
"id": "94887"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007976"
},
{
"db": "NVD",
"id": "CVE-2016-5802"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-510"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "369617cd-e442-4f7b-852f-d167d53a3ae8"
},
{
"db": "IVD",
"id": "e2ff3e00-39ab-11e9-baf6-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-16-660"
},
{
"db": "ZDI",
"id": "ZDI-16-646"
},
{
"db": "ZDI",
"id": "ZDI-16-647"
},
{
"db": "ZDI",
"id": "ZDI-16-652"
},
{
"db": "ZDI",
"id": "ZDI-16-663"
},
{
"db": "CNVD",
"id": "CNVD-2016-12682"
},
{
"db": "VULHUB",
"id": "VHN-94621"
},
{
"db": "BID",
"id": "94887"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-007976"
},
{
"db": "NVD",
"id": "CVE-2016-5802"
},
{
"db": "CNNVD",
"id": "CNNVD-201612-510"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-21T00:00:00",
"db": "IVD",
"id": "369617cd-e442-4f7b-852f-d167d53a3ae8"
},
{
"date": "2016-12-21T00:00:00",
"db": "IVD",
"id": "e2ff3e00-39ab-11e9-baf6-000c29342cb1"
},
{
"date": "2016-12-15T00:00:00",
"db": "ZDI",
"id": "ZDI-16-660"
},
{
"date": "2016-12-15T00:00:00",
"db": "ZDI",
"id": "ZDI-16-646"
},
{
"date": "2016-12-15T00:00:00",
"db": "ZDI",
"id": "ZDI-16-647"
},
{
"date": "2016-12-15T00:00:00",
"db": "ZDI",
"id": "ZDI-16-652"
},
{
"date": "2016-12-15T00:00:00",
"db": "ZDI",
"id": "ZDI-16-663"
},
{
"date": "2016-12-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-12682"
},
{
"date": "2017-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-94621"
},
{
"date": "2016-12-14T00:00:00",
"db": "BID",
"id": "94887"
},
{
"date": "2017-04-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007976"
},
{
"date": "2017-02-13T21:59:00.330000",
"db": "NVD",
"id": "CVE-2016-5802"
},
{
"date": "2016-12-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-510"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-15T00:00:00",
"db": "ZDI",
"id": "ZDI-16-660"
},
{
"date": "2016-12-15T00:00:00",
"db": "ZDI",
"id": "ZDI-16-646"
},
{
"date": "2016-12-15T00:00:00",
"db": "ZDI",
"id": "ZDI-16-647"
},
{
"date": "2016-12-15T00:00:00",
"db": "ZDI",
"id": "ZDI-16-652"
},
{
"date": "2016-12-15T00:00:00",
"db": "ZDI",
"id": "ZDI-16-663"
},
{
"date": "2018-11-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-12682"
},
{
"date": "2017-03-14T00:00:00",
"db": "VULHUB",
"id": "VHN-94621"
},
{
"date": "2016-12-20T01:09:00",
"db": "BID",
"id": "94887"
},
{
"date": "2017-04-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-007976"
},
{
"date": "2017-03-14T18:21:15.757000",
"db": "NVD",
"id": "CVE-2016-5802"
},
{
"date": "2016-12-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201612-510"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-510"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Delta Electronics Vulnerability to load malicious files in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-007976"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201612-510"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.