VAR-201807-0329

Vulnerability from variot - Updated: 2023-12-18 13:02

In Moxa NPort 5210, 5230, and 5232 versions 2.9 build 17030709 and prior, the amount of resources requested by a malicious actor are not restricted, allowing for a denial-of-service condition. Moxa NPort 5210 , 5230 and 5232 Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Moxa's NPort 5210, 5230 and 5232 are all Moxa's serial communication servers for connecting industrial serial devices to the network. A security vulnerability exists in Moxa's NPort 5210, 5230, and 52322.9build17030709 and earlier versions that caused the program to fail to limit the size of the requested resource. An attacker could exploit the vulnerability to cause a denial of service. Moxa NPort is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to resource exhaustion and crash the affected application, denying service to legitimate users. There are security vulnerabilities in Moxa NPort 5210, 5230, and 5232 2.9 build 17030709 and earlier versions

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0329",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nport 5210",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "moxa",
        "version": "2.9"
      },
      {
        "model": "nport 5230",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "moxa",
        "version": "2.9"
      },
      {
        "model": "nport 5232",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "moxa",
        "version": "2.9"
      },
      {
        "model": "nport 5210",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "moxa",
        "version": "2.9 build 17030709"
      },
      {
        "model": "nport 5230",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "moxa",
        "version": "2.9 build 17030709"
      },
      {
        "model": "nport 5232",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "moxa",
        "version": "2.9 build 17030709"
      },
      {
        "model": "nport build",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "5210\u003c=2.917030709"
      },
      {
        "model": "nport build",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "5230\u003c=2.917030709"
      },
      {
        "model": "nport build",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "moxa",
        "version": "5232\u003c=2.917030709"
      },
      {
        "model": "nport build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "52322.917030709"
      },
      {
        "model": "nport build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "52302.917030709"
      },
      {
        "model": "nport build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "moxa",
        "version": "52102.917030709"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "nport 5230",
        "version": "2.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "nport 5232",
        "version": "2.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "nport 5210",
        "version": "2.9"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d854242-463f-11e9-8fcc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      },
      {
        "db": "BID",
        "id": "104863"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1796"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:moxa:nport_5230_firmware:2.9:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:moxa:nport_5232_firmware:2.9:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:moxa:nport_5210_firmware:2.9:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-10632"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mikael Vingaard",
    "sources": [
      {
        "db": "BID",
        "id": "104863"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2018-10632",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2018-10632",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-14240",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "7d854242-463f-11e9-8fcc-000c29342cb1",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-120411",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2018-10632",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2018-10632",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-14240",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201807-1796",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "7d854242-463f-11e9-8fcc-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-120411",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2018-10632",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d854242-463f-11e9-8fcc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120411"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1796"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Moxa NPort 5210, 5230, and 5232 versions 2.9 build 17030709 and prior, the amount of resources requested by a malicious actor are not restricted, allowing for a denial-of-service condition. Moxa NPort 5210 , 5230 and 5232 Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Moxa\u0027s NPort 5210, 5230 and 5232 are all Moxa\u0027s serial communication servers for connecting industrial serial devices to the network. A security vulnerability exists in Moxa\u0027s NPort 5210, 5230, and 52322.9build17030709 and earlier versions that caused the program to fail to limit the size of the requested resource. An attacker could exploit the vulnerability to cause a denial of service. Moxa NPort is prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to resource exhaustion and crash the affected application, denying service to legitimate users. There are security vulnerabilities in Moxa NPort 5210, 5230, and 5232 2.9 build 17030709 and earlier versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-10632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      },
      {
        "db": "BID",
        "id": "104863"
      },
      {
        "db": "IVD",
        "id": "7d854242-463f-11e9-8fcc-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120411"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10632"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-10632",
        "trust": 3.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-200-04",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "104863",
        "trust": 2.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1796",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-14240",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008458",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "7D854242-463F-11E9-8FCC-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-98931",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-120411",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10632",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d854242-463f-11e9-8fcc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120411"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10632"
      },
      {
        "db": "BID",
        "id": "104863"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1796"
      }
    ]
  },
  "id": "VAR-201807-0329",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "7d854242-463f-11e9-8fcc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120411"
      }
    ],
    "trust": 1.775
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d854242-463f-11e9-8fcc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:02:33.927000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Firmware for External Device Servers NPort 5200 Series",
        "trust": 0.8,
        "url": "https://www.moxa.com/support/download.aspx?type=support\u0026id=904"
      },
      {
        "title": "Patches for Moxa\u0027s NPort 5210, 5230, and 5232 Denial of Service Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/135787"
      },
      {
        "title": "Moxa NPort 5210 , 5230  and 5232 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=82590"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1796"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-400",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-120411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10632"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-200-04"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/104863"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10632"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10632"
      },
      {
        "trust": 0.3,
        "url": "https://www.moxa.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/400.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120411"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10632"
      },
      {
        "db": "BID",
        "id": "104863"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1796"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "7d854242-463f-11e9-8fcc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120411"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10632"
      },
      {
        "db": "BID",
        "id": "104863"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1796"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-07-31T00:00:00",
        "db": "IVD",
        "id": "7d854242-463f-11e9-8fcc-000c29342cb1"
      },
      {
        "date": "2018-07-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      },
      {
        "date": "2018-07-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-120411"
      },
      {
        "date": "2018-07-24T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-10632"
      },
      {
        "date": "2018-07-19T00:00:00",
        "db": "BID",
        "id": "104863"
      },
      {
        "date": "2018-10-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      },
      {
        "date": "2018-07-24T17:29:00.307000",
        "db": "NVD",
        "id": "CVE-2018-10632"
      },
      {
        "date": "2018-07-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201807-1796"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-01-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-14240"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-120411"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-10632"
      },
      {
        "date": "2018-07-19T00:00:00",
        "db": "BID",
        "id": "104863"
      },
      {
        "date": "2018-10-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      },
      {
        "date": "2019-10-09T23:32:57.853000",
        "db": "NVD",
        "id": "CVE-2018-10632"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201807-1796"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1796"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Moxa NPort Product depletion vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008458"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "7d854242-463f-11e9-8fcc-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-1796"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…