VAR-201711-0415
Vulnerability from variot - Updated: 2023-12-18 13:48A Resource Exhaustion issue was discovered in Moxa NPort 5110 Version 2.2, NPort 5110 Version 2.4, NPort 5110 Version 2.6, NPort 5110 Version 2.7, NPort 5130 Version 3.7 and prior, and NPort 5150 Version 3.7 and prior. An attacker may be able to exhaust memory resources by sending a large amount of TCP SYN packets. plural Moxa NPort The product is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Moxa's NPort 5110, 5130 and 5150 are all Moxa's serial communication servers for connecting industrial serial devices to the network. Multiple Moxa NPort products are prone to multiple denial-of-service vulnerabilities and an information-disclosure vulnerability. An attacker can exploit these issues to obtain sensitive information or cause excessive consumption of resources or crash of application resulting in a denial of service condition. A security vulnerability exists in the Moxa NPort 5110, 5130, and 5150
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201711-0415",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nport 5110",
"scope": "eq",
"trust": 2.4,
"vendor": "moxa",
"version": "2.2"
},
{
"model": "nport 5110",
"scope": "eq",
"trust": 2.4,
"vendor": "moxa",
"version": "2.4"
},
{
"model": "nport 5110",
"scope": "eq",
"trust": 2.4,
"vendor": "moxa",
"version": "2.6"
},
{
"model": "nport 5110",
"scope": "eq",
"trust": 2.4,
"vendor": "moxa",
"version": "2.7"
},
{
"model": "nport 5130",
"scope": "lte",
"trust": 1.8,
"vendor": "moxa",
"version": "3.7"
},
{
"model": "nport 5150",
"scope": "lte",
"trust": 1.8,
"vendor": "moxa",
"version": "3.7"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.9,
"vendor": "moxa",
"version": "51102.2"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.9,
"vendor": "moxa",
"version": "51102.4"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.9,
"vendor": "moxa",
"version": "51102.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.9,
"vendor": "moxa",
"version": "51102.7"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5150\u003c=3.7"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "5130\u003c=3.7"
},
{
"model": "nport 5130",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.7"
},
{
"model": "nport 5150",
"scope": "eq",
"trust": 0.6,
"vendor": "moxa",
"version": "3.7"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.7"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.7"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.6"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.5"
},
{
"model": "nport",
"scope": "eq",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.5"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51503.8"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51303.8"
},
{
"model": "nport",
"scope": "ne",
"trust": 0.3,
"vendor": "moxa",
"version": "51102.9"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "nport 5110",
"version": "2.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "nport 5110",
"version": "2.4"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "nport 5110",
"version": "2.6"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "nport 5110",
"version": "2.7"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "nport 5130",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "nport 5150",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91"
},
{
"db": "CNVD",
"id": "CNVD-2017-34492"
},
{
"db": "BID",
"id": "101885"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010326"
},
{
"db": "NVD",
"id": "CVE-2017-14028"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1247"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5110_firmware:2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5110_firmware:2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5110_firmware:2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5110_firmware:2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5130_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:moxa:nport_5150_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.7",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-14028"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Florian Adamsky",
"sources": [
{
"db": "BID",
"id": "101885"
}
],
"trust": 0.3
},
"cve": "CVE-2017-14028",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2017-14028",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-34492",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-104709",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2017-14028",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-14028",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-34492",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201708-1247",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-104709",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91"
},
{
"db": "CNVD",
"id": "CNVD-2017-34492"
},
{
"db": "VULHUB",
"id": "VHN-104709"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010326"
},
{
"db": "NVD",
"id": "CVE-2017-14028"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1247"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Resource Exhaustion issue was discovered in Moxa NPort 5110 Version 2.2, NPort 5110 Version 2.4, NPort 5110 Version 2.6, NPort 5110 Version 2.7, NPort 5130 Version 3.7 and prior, and NPort 5150 Version 3.7 and prior. An attacker may be able to exhaust memory resources by sending a large amount of TCP SYN packets. plural Moxa NPort The product is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Moxa\u0027s NPort 5110, 5130 and 5150 are all Moxa\u0027s serial communication servers for connecting industrial serial devices to the network. Multiple Moxa NPort products are prone to multiple denial-of-service vulnerabilities and an information-disclosure vulnerability. \nAn attacker can exploit these issues to obtain sensitive information or cause excessive consumption of resources or crash of application resulting in a denial of service condition. A security vulnerability exists in the Moxa NPort 5110, 5130, and 5150",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-14028"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010326"
},
{
"db": "CNVD",
"id": "CNVD-2017-34492"
},
{
"db": "BID",
"id": "101885"
},
{
"db": "IVD",
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91"
},
{
"db": "VULHUB",
"id": "VHN-104709"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-14028",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-320-01",
"trust": 3.4
},
{
"db": "BID",
"id": "101885",
"trust": 2.0
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1247",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-34492",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010326",
"trust": 0.8
},
{
"db": "IVD",
"id": "23AAEF23-F0D6-42A4-B900-AA242EE04A91",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-104709",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91"
},
{
"db": "CNVD",
"id": "CNVD-2017-34492"
},
{
"db": "VULHUB",
"id": "VHN-104709"
},
{
"db": "BID",
"id": "101885"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010326"
},
{
"db": "NVD",
"id": "CVE-2017-14028"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1247"
}
]
},
"id": "VAR-201711-0415",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91"
},
{
"db": "CNVD",
"id": "CNVD-2017-34492"
},
{
"db": "VULHUB",
"id": "VHN-104709"
}
],
"trust": 1.775
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91"
},
{
"db": "CNVD",
"id": "CNVD-2017-34492"
}
]
},
"last_update_date": "2023-12-18T13:48:28.418000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "http://japan.moxa.com/index.htm"
},
{
"title": "Patches for multiple MoxaNport product denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/106360"
},
{
"title": "Moxa NPort 5110 , 5130 and 5150 Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=100010"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34492"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010326"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1247"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-400",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-104709"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010326"
},
{
"db": "NVD",
"id": "CVE-2017-14028"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-320-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/101885"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14028"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-14028"
},
{
"trust": 0.3,
"url": "https://www.moxa.com/support/download.aspx?type=support\u0026id=882"
},
{
"trust": 0.3,
"url": "https://www.moxa.com/support/download.aspx?type=support\u0026id=356"
},
{
"trust": 0.3,
"url": "http://www.moxa.com/product/vport_sdk.htm"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-34492"
},
{
"db": "VULHUB",
"id": "VHN-104709"
},
{
"db": "BID",
"id": "101885"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010326"
},
{
"db": "NVD",
"id": "CVE-2017-14028"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1247"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91"
},
{
"db": "CNVD",
"id": "CNVD-2017-34492"
},
{
"db": "VULHUB",
"id": "VHN-104709"
},
{
"db": "BID",
"id": "101885"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-010326"
},
{
"db": "NVD",
"id": "CVE-2017-14028"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1247"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-17T00:00:00",
"db": "IVD",
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91"
},
{
"date": "2017-11-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-34492"
},
{
"date": "2017-11-16T00:00:00",
"db": "VULHUB",
"id": "VHN-104709"
},
{
"date": "2017-11-16T00:00:00",
"db": "BID",
"id": "101885"
},
{
"date": "2017-12-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010326"
},
{
"date": "2017-11-16T21:29:00.293000",
"db": "NVD",
"id": "CVE-2017-14028"
},
{
"date": "2017-08-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201708-1247"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-34492"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-104709"
},
{
"date": "2017-12-19T22:37:00",
"db": "BID",
"id": "101885"
},
{
"date": "2017-12-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-010326"
},
{
"date": "2019-10-09T23:23:45.843000",
"db": "NVD",
"id": "CVE-2017-14028"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201708-1247"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201708-1247"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Moxa NPort Product depletion vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-010326"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Resource management error",
"sources": [
{
"db": "IVD",
"id": "23aaef23-f0d6-42a4-b900-aa242ee04a91"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-1247"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.