var-201904-1022
Vulnerability from variot
ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets. Programmable Logic Controller Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. ABB/Phoenix Contact/Schneider Electric/Siemens/WAGO PLCs are prone to an remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial of service condition. There are resource management error vulnerabilities in many PLC products, which originate from improper management of system resources (such as memory, disk space, files, etc.) by the network system or products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-1022", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ilc 151 eth", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "modicon m221", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "1.10.0.0" }, { "model": "knx ip", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": null }, { "model": "bacnet\\/ip", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": null }, { "model": "6ed1052-1cc01-0ba8", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "6es7211-1ae40-0xb0", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "6es7314-6eh04-0ab0", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "pm554-tp-eth", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": null }, { "model": "ethernet", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": null }, { "model": "pfc100", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": null }, { "model": "pm554-tp-eth", "scope": null, "trust": 0.8, "vendor": "abb", "version": null }, { "model": "ilc 151 eth", "scope": null, "trust": 0.8, "vendor": "phoenix contact", "version": null }, { "model": "modicon m221", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "6ed1052-1cc01-0ba8", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "6es7211-1ae40-0xb0", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "6es7314-6eh04-0ab0", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "bacnet/ip", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "ethernet", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "knx ip", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "pfc100", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "controller pfc100", "scope": "eq", "trust": 0.3, "vendor": "wago", "version": "(750-8100)0" }, { "model": "controller knx ip", "scope": "eq", "trust": 0.3, "vendor": "wago", "version": "(750-889)0" }, { "model": "controller ethernet", "scope": "eq", "trust": 0.3, "vendor": "wago", "version": "(750-880)0" }, { "model": "controller bacnet/ip", "scope": "eq", "trust": 0.3, "vendor": "wago", "version": "(750-831)0" }, { "model": "6es7314-6eh04-0ab0 simatic s7-314", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "6es7211-1ae40-0xb0 simatic s7-1211", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "6ed1052-1cc01-0ba8 logo!", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "80" }, { "model": "modicon m221", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "0" }, { "model": "contact ilc eth", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "27009741510" }, { "model": "1sap120600r0071 pm554-tp-eth", "scope": "eq", "trust": 0.3, "vendor": "abb", "version": "0" } ], "sources": [ { "db": "BID", "id": "108413" }, { "db": "JVNDB", "id": "JVNDB-2019-003487" }, { "db": "NVD", "id": "CVE-2019-10953" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:abb:pm554-tp-eth_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:abb:pm554-tp-eth:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:ilc_151_eth_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:ilc_151_eth:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:schneider-electric:modicon_m221_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.10.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:schneider-electric:modicon_m221:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:6es7211-1ae40-0xb0_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:6es7211-1ae40-0xb0:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:6es7314-6eh04-0ab0_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:6es7314-6eh04-0ab0:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:6ed1052-1cc01-0ba8_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:6ed1052-1cc01-0ba8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:knx_ip_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:knx_ip:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:pfc100_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:ethernet_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:ethernet:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:bacnet\\/ip_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:bacnet\\/ip:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-10953" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Florian Fischer (Hochschule Augsburg), Jan-Ole Malchow (Freie Universita\u0308t Berlin), and Florian Fischer (Hochschule Augsburg) reported this vulnerability to NCCIC.,Matthias Niedermaier (Hochschule Augsburg), Jan-Ole Malchow (Freie Universita\u00c2\u00a8t Berlin)", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-770" } ], "trust": 0.6 }, "cve": "CVE-2019-10953", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-10953", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-142551", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-10953", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-10953", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201904-770", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-142551", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-10953", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142551" }, { "db": "VULMON", "id": "CVE-2019-10953" }, { "db": "JVNDB", "id": "JVNDB-2019-003487" }, { "db": "NVD", "id": "CVE-2019-10953" }, { "db": "CNNVD", "id": "CNNVD-201904-770" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets. Programmable Logic Controller Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. ABB/Phoenix Contact/Schneider Electric/Siemens/WAGO PLCs are prone to an remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial of service condition. There are resource management error vulnerabilities in many PLC products, which originate from improper management of system resources (such as memory, disk space, files, etc.) by the network system or products", "sources": [ { "db": "NVD", "id": "CVE-2019-10953" }, { "db": "JVNDB", "id": "JVNDB-2019-003487" }, { "db": "BID", "id": "108413" }, { "db": "VULHUB", "id": "VHN-142551" }, { "db": "VULMON", "id": "CVE-2019-10953" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ICS CERT", "id": "ICSA-19-106-03", "trust": 2.9 }, { "db": "NVD", "id": "CVE-2019-10953", "trust": 2.9 }, { "db": "BID", "id": "108413", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2019-003487", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201904-770", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.1312", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142551", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-10953", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142551" }, { "db": "VULMON", "id": "CVE-2019-10953" }, { "db": "BID", "id": "108413" }, { "db": "JVNDB", "id": "JVNDB-2019-003487" }, { "db": "NVD", "id": "CVE-2019-10953" }, { "db": "CNNVD", "id": "CNNVD-201904-770" } ] }, "id": "VAR-201904-1022", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142551" } ], "trust": 0.9082869342857144 }, "last_update_date": "2023-12-18T12:43:33.591000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PM554-TP-ETH", "trust": 0.8, "url": "https://new.abb.com/products/1sap120600r0071/pm554-tp-ethac500-prog-logic-controller" }, { "title": "Controller - ILC 151 ETH - 2700974", "trust": 0.8, "url": "https://www.phoenixcontact.com/online/portal/us/?uri=pxc-oc-itemdetail:pid=2700974\u0026library=usen\u0026pcck=p-08-12-08-07\u0026tab=5\u0026selectedcategory=all" }, { "title": "M221 firmware", "trust": 0.8, "url": "https://www.schneider-electric.com/en/download/document/m221+firmware+v1.3/" }, { "title": "Top Page", "trust": 0.8, "url": "https://new.siemens.com/global/en.html" }, { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "https://www.wago.co.jp/" }, { "title": "CVE-2019-10953", "trust": 0.1, "url": "https://github.com/alaial90/cve-2019-10953 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-10953" }, { "db": "JVNDB", "id": "JVNDB-2019-003487" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.1 }, { "problemtype": "CWE-400", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142551" }, { "db": "JVNDB", "id": "JVNDB-2019-003487" }, { "db": "NVD", "id": "CVE-2019-10953" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-106-03" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/108413" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10953" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10953" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/79174" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-106-03" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2019-10953" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142551" }, { "db": "VULMON", "id": "CVE-2019-10953" }, { "db": "BID", "id": "108413" }, { "db": "JVNDB", "id": "JVNDB-2019-003487" }, { "db": "NVD", "id": "CVE-2019-10953" }, { "db": "CNNVD", "id": "CNNVD-201904-770" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142551" }, { "db": "VULMON", "id": "CVE-2019-10953" }, { "db": "BID", "id": "108413" }, { "db": "JVNDB", "id": "JVNDB-2019-003487" }, { "db": "NVD", "id": "CVE-2019-10953" }, { "db": "CNNVD", "id": "CNNVD-201904-770" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-04-17T00:00:00", "db": "VULHUB", "id": "VHN-142551" }, { "date": "2019-04-17T00:00:00", "db": "VULMON", "id": "CVE-2019-10953" }, { "date": "2019-05-16T00:00:00", "db": "BID", "id": "108413" }, { "date": "2019-05-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003487" }, { "date": "2019-04-17T15:29:00.843000", "db": "NVD", "id": "CVE-2019-10953" }, { "date": "2019-04-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-770" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-02T00:00:00", "db": "VULHUB", "id": "VHN-142551" }, { "date": "2021-08-19T00:00:00", "db": "VULMON", "id": "CVE-2019-10953" }, { "date": "2019-05-16T00:00:00", "db": "BID", "id": "108413" }, { "date": "2019-05-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003487" }, { "date": "2022-01-31T20:48:56.740000", "db": "NVD", "id": "CVE-2019-10953" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-770" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-770" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Programmable Logic Controller Vulnerable to resource exhaustion", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003487" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-770" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.