var-202102-0295
Vulnerability from variot
A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP1 Update 1), SINEMA Server (All versions < V14.0 SP2 Update 2). When uploading files to an affected system using a zip container, the system does not correctly check if the relative file path of the extracted files is still within the intended target directory. With this an attacker could create or overwrite arbitrary files on an affected system. This type of vulnerability is also known as 'Zip-Slip'. (ZDI-CAN-12054). SINEC NMS and SINEMA Server Contains a path traversal vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-12054 Was numbered.Information is tampered with and denial of service (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens SINEC NMS. Authentication is required to exploit this vulnerability.The specific flaw exists within the FirmwareFileUtils class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Siemens SINE CNMS is a new generation of network management system enterprise account for digital libraries. This system can be used to centrally monitor, manage and configure the network. Siemens SINEMA Server is a network monitoring and management software designed by Siemens for industrial Ethernet. There is a security vulnerability in SINEC NMS, and there is no relevant information about this vulnerability at present, please pay attention to CNNVD or manufacturer announcements at any time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0295", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sinema server", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "14.0" }, { "model": "sinema server", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "14.0" }, { "model": "sinec network management system", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "1.0" }, { "model": "sinec network management system", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0" }, { "model": "sinec nms", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "sinema \u30b5\u30fc\u30d0", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "sinec nms", "scope": null, "trust": 0.7, "vendor": "siemens", "version": null }, { "model": "sinec nms sp1 update", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v1.01" }, { "model": "sinema server sp2 update", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v14.02" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-253" }, { "db": "CNVD", "id": "CNVD-2021-11835" }, { "db": "JVNDB", "id": "JVNDB-2020-016032" }, { "db": "NVD", "id": "CVE-2020-25237" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sinec_network_management_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:sinec_network_management_system:1.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:sinec_network_management_system:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:sinema_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:sinema_server:14.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:sinema_server:14.0:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:sinema_server:14.0:sp2_update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-25237" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-253" } ], "trust": 0.7 }, "cve": "CVE-2020-25237", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.5, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-25237", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2021-11835", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-179195", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-25237", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-25237", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-25237", "trust": 1.8, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2020-25237", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2021-11835", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202102-840", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-179195", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-25237", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-253" }, { "db": "CNVD", "id": "CNVD-2021-11835" }, { "db": "VULHUB", "id": "VHN-179195" }, { "db": "VULMON", "id": "CVE-2020-25237" }, { "db": "JVNDB", "id": "JVNDB-2020-016032" }, { "db": "NVD", "id": "CVE-2020-25237" }, { "db": "CNNVD", "id": "CNNVD-202102-840" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SINEC NMS (All versions \u003c V1.0 SP1 Update 1), SINEMA Server (All versions \u003c V14.0 SP2 Update 2). When uploading files to an affected system using a zip container, the system does not correctly check if the relative file path of the extracted files is still within the intended target directory. With this an attacker could create or overwrite arbitrary files on an affected system. This type of vulnerability is also known as \u0027Zip-Slip\u0027. (ZDI-CAN-12054). SINEC NMS and SINEMA Server Contains a path traversal vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-12054 Was numbered.Information is tampered with and denial of service (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens SINEC NMS. Authentication is required to exploit this vulnerability.The specific flaw exists within the FirmwareFileUtils class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Siemens SINE CNMS is a new generation of network management system enterprise account for digital libraries. This system can be used to centrally monitor, manage and configure the network. Siemens SINEMA Server is a network monitoring and management software designed by Siemens for industrial Ethernet. There is a security vulnerability in SINEC NMS, and there is no relevant information about this vulnerability at present, please pay attention to CNNVD or manufacturer announcements at any time", "sources": [ { "db": "NVD", "id": "CVE-2020-25237" }, { "db": "JVNDB", "id": "JVNDB-2020-016032" }, { "db": "ZDI", "id": "ZDI-21-253" }, { "db": "CNVD", "id": "CNVD-2021-11835" }, { "db": "VULHUB", "id": "VHN-179195" }, { "db": "VULMON", "id": "CVE-2020-25237" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-25237", "trust": 3.9 }, { "db": "ZDI", "id": "ZDI-21-253", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-21-040-03", "trust": 2.6 }, { "db": "SIEMENS", "id": "SSA-156833", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU91083521", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-016032", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12054", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2021-11835", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0474", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202102-840", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-179195", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-25237", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-253" }, { "db": "CNVD", "id": "CNVD-2021-11835" }, { "db": "VULHUB", "id": "VHN-179195" }, { "db": "VULMON", "id": "CVE-2020-25237" }, { "db": "JVNDB", "id": "JVNDB-2020-016032" }, { "db": "NVD", "id": "CVE-2020-25237" }, { "db": "CNNVD", "id": "CNNVD-202102-840" } ] }, "id": "VAR-202102-0295", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-11835" }, { "db": "VULHUB", "id": "VHN-179195" } ], "trust": 1.4535714266666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-11835" } ] }, "last_update_date": "2023-12-18T11:27:44.562000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-156833", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-156833.pdf" }, { "title": "", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-03https://cert-portal.siemens.com/productcert/pdf/ssa-156833.pdf" }, { "title": "Patch for Siemens SINEMA Server and SINE CNMS catalog traversal vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/248771" }, { "title": "SINEC NMS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=141262" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=bee3f161c685335c061e9d57ac79a176" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-253" }, { "db": "CNVD", "id": "CNVD-2021-11835" }, { "db": "VULMON", "id": "CVE-2020-25237" }, { "db": "JVNDB", "id": "JVNDB-2020-016032" }, { "db": "CNNVD", "id": "CNNVD-202102-840" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-179195" }, { "db": "JVNDB", "id": "JVNDB-2020-016032" }, { "db": "NVD", "id": "CVE-2020-25237" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-253/" }, { "trust": 3.2, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-03" }, { "trust": 2.4, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-156833.pdf" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu91083521" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25237" }, { "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-03https://cert-portal.siemens.com/productcert/pdf/ssa-156833.pdf" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0474" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/22.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://cert-portal.siemens.com/productcert/txt/ssa-156833.txt" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-253" }, { "db": "CNVD", "id": "CNVD-2021-11835" }, { "db": "VULHUB", "id": "VHN-179195" }, { "db": "VULMON", "id": "CVE-2020-25237" }, { "db": "JVNDB", "id": "JVNDB-2020-016032" }, { "db": "NVD", "id": "CVE-2020-25237" }, { "db": "CNNVD", "id": "CNNVD-202102-840" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-21-253" }, { "db": "CNVD", "id": "CNVD-2021-11835" }, { "db": "VULHUB", "id": "VHN-179195" }, { "db": "VULMON", "id": "CVE-2020-25237" }, { "db": "JVNDB", "id": "JVNDB-2020-016032" }, { "db": "NVD", "id": "CVE-2020-25237" }, { "db": "CNNVD", "id": "CNNVD-202102-840" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-25T00:00:00", "db": "ZDI", "id": "ZDI-21-253" }, { "date": "2021-02-22T00:00:00", "db": "CNVD", "id": "CNVD-2021-11835" }, { "date": "2021-02-09T00:00:00", "db": "VULHUB", "id": "VHN-179195" }, { "date": "2021-02-09T00:00:00", "db": "VULMON", "id": "CVE-2020-25237" }, { "date": "2021-11-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016032" }, { "date": "2021-02-09T17:15:13.517000", "db": "NVD", "id": "CVE-2020-25237" }, { "date": "2021-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-840" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-02-25T00:00:00", "db": "ZDI", "id": "ZDI-21-253" }, { "date": "2021-04-12T00:00:00", "db": "CNVD", "id": "CNVD-2021-11835" }, { "date": "2021-03-10T00:00:00", "db": "VULHUB", "id": "VHN-179195" }, { "date": "2021-03-10T00:00:00", "db": "VULMON", "id": "CVE-2020-25237" }, { "date": "2021-11-01T09:04:00", "db": "JVNDB", "id": "JVNDB-2020-016032" }, { "date": "2021-03-10T12:52:29.993000", "db": "NVD", "id": "CVE-2020-25237" }, { "date": "2021-03-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202102-840" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-840" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SINEC\u00a0NMS\u00a0 and \u00a0SINEMA\u00a0Server\u00a0 Traversal Vulnerability in Japan", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016032" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202102-840" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.