var-201903-0175
Vulnerability from variot
The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior. plural Scalance The product contains an input validation vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLCs) or human machine interfaces (HMIs). A mirror port isolation vulnerability exists in several SCALANCE X switches products. Siemens SCALANCE X switches are prone to a security weakness. Successful exploits may allow an attacker to obtain sensitive information that may lead to further attacks. Failed exploit attempts will result in a denial of service condition. A vulnerability has been identified in Scalance X-200 (All versions. Siemens Scalance X-200, etc. are all products of Germany's Siemens (Siemens). Scalance X-200 is an industrial grade Ethernet switch. Scalance X-300 is an industrial grade Ethernet switch. Scalance XP-200 is an Ethernet switch
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201903-0175", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xc-200", "scope": "lt", "trust": 1.8, "vendor": "siemens", "version": "4.1" }, { "model": "scalance xf-200", "scope": "lt", "trust": 1.8, "vendor": "siemens", "version": "4.1" }, { "model": "scalance xp-200", "scope": "lt", "trust": 1.8, "vendor": "siemens", "version": "4.1" }, { "model": "scalance x-200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.4" }, { "model": "scalance x-300", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1.3" }, { "model": "scalance x-200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x-300", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-300" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x-200" }, { "model": "scalance xp/xc/xf-200", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v4.1" }, { "model": "scalance xf-200", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "scalance xc-200", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x-3000" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x-2000" }, { "model": "scalance xp-200", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "scalance xf-200", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 200", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x 300", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xp 200", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xc 200", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xf 200", "version": "*" } ], "sources": [ { "db": "IVD", "id": "abd4f3db-d6ce-4f38-bd42-e5d8d0a93f0a" }, { "db": "CNVD", "id": "CNVD-2019-07008" }, { "db": "BID", "id": "107465" }, { "db": "JVNDB", "id": "JVNDB-2019-003223" }, { "db": "NVD", "id": "CVE-2019-6569" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x-200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.2.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_x-300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_x-300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_xp-200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_xp-200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_xc-200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_xc-200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_xf-200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_xf-200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-6569" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.,Siemens reported this vulnerability to NCCIC.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201903-699" } ], "trust": 0.6 }, "cve": "CVE-2019-6569", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-6569", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CNVD-2019-07008", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "abd4f3db-d6ce-4f38-bd42-e5d8d0a93f0a", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-158004", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6569", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-6569", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2019-07008", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201903-699", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "abd4f3db-d6ce-4f38-bd42-e5d8d0a93f0a", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-158004", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-6569", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "abd4f3db-d6ce-4f38-bd42-e5d8d0a93f0a" }, { "db": "CNVD", "id": "CNVD-2019-07008" }, { "db": "VULHUB", "id": "VHN-158004" }, { "db": "VULMON", "id": "CVE-2019-6569" }, { "db": "JVNDB", "id": "JVNDB-2019-003223" }, { "db": "NVD", "id": "CVE-2019-6569" }, { "db": "CNNVD", "id": "CNNVD-201903-699" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior. plural Scalance The product contains an input validation vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLCs) or human machine interfaces (HMIs). A mirror port isolation vulnerability exists in several SCALANCE X switches products. Siemens SCALANCE X switches are prone to a security weakness. \nSuccessful exploits may allow an attacker to obtain sensitive information that may lead to further attacks. Failed exploit attempts will result in a denial of service condition. A vulnerability has been identified in Scalance X-200 (All versions. Siemens Scalance X-200, etc. are all products of Germany\u0027s Siemens (Siemens). Scalance X-200 is an industrial grade Ethernet switch. Scalance X-300 is an industrial grade Ethernet switch. Scalance XP-200 is an Ethernet switch", "sources": [ { "db": "NVD", "id": "CVE-2019-6569" }, { "db": "JVNDB", "id": "JVNDB-2019-003223" }, { "db": "CNVD", "id": "CNVD-2019-07008" }, { "db": "BID", "id": "107465" }, { "db": "IVD", "id": "abd4f3db-d6ce-4f38-bd42-e5d8d0a93f0a" }, { "db": "VULHUB", "id": "VHN-158004" }, { "db": "VULMON", "id": "CVE-2019-6569" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6569", "trust": 3.7 }, { "db": "SIEMENS", "id": "SSA-557804", "trust": 2.7 }, { "db": "ICS CERT", "id": "ICSA-19-085-01", "trust": 1.8 }, { "db": "BID", "id": "107465", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-201903-699", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-07008", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-003223", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.1010.2", "trust": 0.6 }, { "db": "IVD", "id": "ABD4F3DB-D6CE-4F38-BD42-E5D8D0A93F0A", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-158004", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-6569", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "abd4f3db-d6ce-4f38-bd42-e5d8d0a93f0a" }, { "db": "CNVD", "id": "CNVD-2019-07008" }, { "db": "VULHUB", "id": "VHN-158004" }, { "db": "VULMON", "id": "CVE-2019-6569" }, { "db": "BID", "id": "107465" }, { "db": "JVNDB", "id": "JVNDB-2019-003223" }, { "db": "NVD", "id": "CVE-2019-6569" }, { "db": "CNNVD", "id": "CNNVD-201903-699" } ] }, "id": "VAR-201903-0175", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "abd4f3db-d6ce-4f38-bd42-e5d8d0a93f0a" }, { "db": "CNVD", "id": "CNVD-2019-07008" }, { "db": "VULHUB", "id": "VHN-158004" } ], "trust": 1.4752352666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "abd4f3db-d6ce-4f38-bd42-e5d8d0a93f0a" }, { "db": "CNVD", "id": "CNVD-2019-07008" } ] }, "last_update_date": "2023-12-18T13:28:38.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-557804", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf" }, { "title": "Patches for multiple SCALANCE X switches product mirror port isolation vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/156051" }, { "title": "Multiple Siemens Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=90252" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=7ae14387a55523872a9f4bd3861a6fd2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-07008" }, { "db": "VULMON", "id": "CVE-2019-6569" }, { "db": "JVNDB", "id": "JVNDB-2019-003223" }, { "db": "CNNVD", "id": "CNNVD-201903-699" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-440", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158004" }, { "db": "JVNDB", "id": "JVNDB-2019-003223" }, { "db": "NVD", "id": "CVE-2019-6569" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/107465" }, { "trust": 1.7, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-085-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6569" }, { "trust": 0.9, "url": "http://www.siemens.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6569" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-085-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/77898" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/440.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-19-085-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-07008" }, { "db": "VULHUB", "id": "VHN-158004" }, { "db": "VULMON", "id": "CVE-2019-6569" }, { "db": "BID", "id": "107465" }, { "db": "JVNDB", "id": "JVNDB-2019-003223" }, { "db": "NVD", "id": "CVE-2019-6569" }, { "db": "CNNVD", "id": "CNNVD-201903-699" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "abd4f3db-d6ce-4f38-bd42-e5d8d0a93f0a" }, { "db": "CNVD", "id": "CNVD-2019-07008" }, { "db": "VULHUB", "id": "VHN-158004" }, { "db": "VULMON", "id": "CVE-2019-6569" }, { "db": "BID", "id": "107465" }, { "db": "JVNDB", "id": "JVNDB-2019-003223" }, { "db": "NVD", "id": "CVE-2019-6569" }, { "db": "CNNVD", "id": "CNNVD-201903-699" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-13T00:00:00", "db": "IVD", "id": "abd4f3db-d6ce-4f38-bd42-e5d8d0a93f0a" }, { "date": "2019-03-13T00:00:00", "db": "CNVD", "id": "CNVD-2019-07008" }, { "date": "2019-03-26T00:00:00", "db": "VULHUB", "id": "VHN-158004" }, { "date": "2019-03-26T00:00:00", "db": "VULMON", "id": "CVE-2019-6569" }, { "date": "2019-03-12T00:00:00", "db": "BID", "id": "107465" }, { "date": "2019-05-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003223" }, { "date": "2019-03-26T22:29:00.833000", "db": "NVD", "id": "CVE-2019-6569" }, { "date": "2019-03-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201903-699" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-13T00:00:00", "db": "CNVD", "id": "CNVD-2019-07008" }, { "date": "2020-10-16T00:00:00", "db": "VULHUB", "id": "VHN-158004" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2019-6569" }, { "date": "2019-03-12T00:00:00", "db": "BID", "id": "107465" }, { "date": "2019-06-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003223" }, { "date": "2022-07-12T14:15:13.240000", "db": "NVD", "id": "CVE-2019-6569" }, { "date": "2021-10-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201903-699" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201903-699" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Scalance Vulnerability related to input validation in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003223" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201903-699" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.