var-201908-1967
Vulnerability from variot
A vulnerability has been identified in SCALANCE SC-600 (V2.0), SCALANCE XB-200 (V4.1), SCALANCE XC-200 (V4.1), SCALANCE XF-200BA (V4.1), SCALANCE XP-200 (V4.1), SCALANCE XR-300WG (V4.1). An authenticated attacker with network access to to port 22/tcp of an affected device may cause a Denial-of-Service condition. The security vulnerability could be exploited by an authenticated attacker with network access to the affected device. No user interaction is required to exploit this vulnerability. The vulnerability impacts the availability of the affected device. plural SCALANCE The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SCALANCE SC firewall is used to protect trusted industrial networks from untrusted networks. It allows filtering of input and output network connections in different ways. SCALANCE X switches a are used to connect industrial components such as programmable logic controllers (PLCs) or human machine interfaces (HMIs). A denial of service vulnerability exists in several Siemens products. Siemens SCALANCE SC-600, etc. are all products of Siemens (Siemens) in Germany. Siemens SCALANCE SC-600 is an industrial security device. SCALANCE XB-200 is a managed industrial Ethernet switch. SCALANCE XR-300WG is a rack-mounted managed switch. The vulnerability stems from the failure of the network system or product to properly validate the input data. 1 version, SCALANCE XR-300WG V4.1 version
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201908-1967", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xb-200", "scope": "eq", "trust": 1.8, "vendor": "siemens", "version": "4.1" }, { "model": "scalance xc-200", "scope": "eq", "trust": 1.8, "vendor": "siemens", "version": "4.1" }, { "model": "scalance xf-200ba", "scope": "eq", "trust": 1.8, "vendor": "siemens", "version": "4.1" }, { "model": "scalance xp-200", "scope": "eq", "trust": 1.8, "vendor": "siemens", "version": "4.1" }, { "model": "scalance xr-300wg", "scope": "eq", "trust": 1.8, "vendor": "siemens", "version": "4.1" }, { "model": "scalance xb-200", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v4.1" }, { "model": "scalance xc-200", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v4.1" }, { "model": "scalance xf-200ba", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v4.1" }, { "model": "scalance xp-200", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v4.1" }, { "model": "scalance xr-300wg", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v4.1" }, { "model": "scalance sc-600", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "v2.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xb 200", "version": "4.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xc 200", "version": "4.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xf 200ba", "version": "4.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xp 200", "version": "4.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xr 300wg", "version": "4.1" } ], "sources": [ { "db": "IVD", "id": "500b373e-f73d-435e-97a3-e56d272baed8" }, { "db": "CNVD", "id": "CNVD-2019-27702" }, { "db": "CNVD", "id": "CNVD-2019-27706" }, { "db": "JVNDB", "id": "JVNDB-2019-008094" }, { "db": "NVD", "id": "CVE-2019-10927" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_xb-200_firmware:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_xb-200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_xc-200_firmware:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_xc-200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_xf-200ba_firmware:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_xf-200ba:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_xp-200_firmware:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_xp-200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_xr-300wg_firmware:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_xr-300wg:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-10927" } ] }, "cve": "CVE-2019-10927", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-10927", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-27702", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CNVD-2019-27706", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "500b373e-f73d-435e-97a3-e56d272baed8", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-142522", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-10927", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-10927", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-27702", "trust": 0.6, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2019-27706", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201908-891", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "500b373e-f73d-435e-97a3-e56d272baed8", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142522", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "500b373e-f73d-435e-97a3-e56d272baed8" }, { "db": "CNVD", "id": "CNVD-2019-27702" }, { "db": "CNVD", "id": "CNVD-2019-27706" }, { "db": "VULHUB", "id": "VHN-142522" }, { "db": "JVNDB", "id": "JVNDB-2019-008094" }, { "db": "NVD", "id": "CVE-2019-10927" }, { "db": "CNNVD", "id": "CNNVD-201908-891" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SCALANCE SC-600 (V2.0), SCALANCE XB-200 (V4.1), SCALANCE XC-200 (V4.1), SCALANCE XF-200BA (V4.1), SCALANCE XP-200 (V4.1), SCALANCE XR-300WG (V4.1). An authenticated attacker with network access to to port 22/tcp of an affected device may cause a Denial-of-Service condition. The security vulnerability could be exploited by an authenticated attacker with network access to the affected device. No user interaction is required to exploit this vulnerability. The vulnerability impacts the availability of the affected device. plural SCALANCE The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SCALANCE SC firewall is used to protect trusted industrial networks from untrusted networks. It allows filtering of input and output network connections in different ways. SCALANCE X switches a are used to connect industrial components such as programmable logic controllers (PLCs) or human machine interfaces (HMIs). A denial of service vulnerability exists in several Siemens products. Siemens SCALANCE SC-600, etc. are all products of Siemens (Siemens) in Germany. Siemens SCALANCE SC-600 is an industrial security device. SCALANCE XB-200 is a managed industrial Ethernet switch. SCALANCE XR-300WG is a rack-mounted managed switch. The vulnerability stems from the failure of the network system or product to properly validate the input data. 1 version, SCALANCE XR-300WG V4.1 version", "sources": [ { "db": "NVD", "id": "CVE-2019-10927" }, { "db": "JVNDB", "id": "JVNDB-2019-008094" }, { "db": "CNVD", "id": "CNVD-2019-27702" }, { "db": "CNVD", "id": "CNVD-2019-27706" }, { "db": "IVD", "id": "500b373e-f73d-435e-97a3-e56d272baed8" }, { "db": "VULHUB", "id": "VHN-142522" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-10927", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-671286", "trust": 2.9 }, { "db": "ICS CERT", "id": "ICSA-19-227-03", "trust": 1.4 }, { "db": "CNNVD", "id": "CNNVD-201908-891", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-27702", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-008094", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-27706", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3149", "trust": 0.6 }, { "db": "IVD", "id": "500B373E-F73D-435E-97A3-E56D272BAED8", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-142522", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "500b373e-f73d-435e-97a3-e56d272baed8" }, { "db": "CNVD", "id": "CNVD-2019-27702" }, { "db": "CNVD", "id": "CNVD-2019-27706" }, { "db": "VULHUB", "id": "VHN-142522" }, { "db": "JVNDB", "id": "JVNDB-2019-008094" }, { "db": "NVD", "id": "CVE-2019-10927" }, { "db": "CNNVD", "id": "CNNVD-201908-891" } ] }, "id": "VAR-201908-1967", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "500b373e-f73d-435e-97a3-e56d272baed8" }, { "db": "CNVD", "id": "CNVD-2019-27702" }, { "db": "CNVD", "id": "CNVD-2019-27706" }, { "db": "VULHUB", "id": "VHN-142522" } ], "trust": 2.1103673033333332 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 }, { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "IVD", "id": "500b373e-f73d-435e-97a3-e56d272baed8" }, { "db": "CNVD", "id": "CNVD-2019-27702" }, { "db": "CNVD", "id": "CNVD-2019-27706" } ] }, "last_update_date": "2023-12-18T13:38:12.593000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-671286", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-671286.pdf" }, { "title": "Patches for several Siemens Product Denial of Service Vulnerabilities (CNVD-2019-27702)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/175783" }, { "title": "Patch for Siemens SCALANCE SC-600 Command Execution Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/175789" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-27702" }, { "db": "CNVD", "id": "CNVD-2019-27706" }, { "db": "JVNDB", "id": "JVNDB-2019-008094" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142522" }, { "db": "JVNDB", "id": "JVNDB-2019-008094" }, { "db": "NVD", "id": "CVE-2019-10927" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-671286.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-227-03" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10927" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10927" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-19-227-03" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3149/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-27702" }, { "db": "CNVD", "id": "CNVD-2019-27706" }, { "db": "VULHUB", "id": "VHN-142522" }, { "db": "JVNDB", "id": "JVNDB-2019-008094" }, { "db": "NVD", "id": "CVE-2019-10927" }, { "db": "CNNVD", "id": "CNNVD-201908-891" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "500b373e-f73d-435e-97a3-e56d272baed8" }, { "db": "CNVD", "id": "CNVD-2019-27702" }, { "db": "CNVD", "id": "CNVD-2019-27706" }, { "db": "VULHUB", "id": "VHN-142522" }, { "db": "JVNDB", "id": "JVNDB-2019-008094" }, { "db": "NVD", "id": "CVE-2019-10927" }, { "db": "CNNVD", "id": "CNNVD-201908-891" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-15T00:00:00", "db": "IVD", "id": "500b373e-f73d-435e-97a3-e56d272baed8" }, { "date": "2019-08-15T00:00:00", "db": "CNVD", "id": "CNVD-2019-27702" }, { "date": "2019-08-15T00:00:00", "db": "CNVD", "id": "CNVD-2019-27706" }, { "date": "2019-08-13T00:00:00", "db": "VULHUB", "id": "VHN-142522" }, { "date": "2019-08-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-008094" }, { "date": "2019-08-13T19:15:14.687000", "db": "NVD", "id": "CVE-2019-10927" }, { "date": "2019-08-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201908-891" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-15T00:00:00", "db": "CNVD", "id": "CNVD-2019-27702" }, { "date": "2019-08-15T00:00:00", "db": "CNVD", "id": "CNVD-2019-27706" }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-142522" }, { "date": "2019-10-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-008094" }, { "date": "2021-10-28T13:32:45.090000", "db": "NVD", "id": "CVE-2019-10927" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201908-891" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201908-891" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural SCALANCE Vulnerability related to input validation in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-008094" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201908-891" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.