var-201304-0154
Vulnerability from variot

Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 do not properly handle exceptions, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via malformed data in a formatted text command, leading to out-of-bounds access to (1) heap or (2) stack memory. Cogent Real-Time Systems is a real-time data solutions vendor. The Cogent Real-Time Systems DataHub application receives formatted text commands in TCP link mode that are parsed, verified, and executed within the application. An attacker can exploit this issue to execute arbitrary code within the context of the affected applications. Failed exploit attempts may crash the application, denying service to legitimate users. The following Cogent Real-Time Systems products are vulnerable: Cogent DataHub 7.2.2 and prior versions OPC DataHub 6.4.21 and prior versions Cascade DataHub for Windows 6.4.21 and prior versions Cogent DataHub DataSim and DataPid demonstration clients 7.2.2 OPC DataHub DataSim and DataPid demonstration clients 6.4.21 Cascade DataHub DataSim and DataPid demonstration clients 6.4.21 DataHub QuickTrend 7.2.2 and prior versions

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0154",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "7.1.1"
      },
      {
        "model": "cascade datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "6.4.20"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "7.1.1.63"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "7.1.2"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "7.1.0"
      },
      {
        "model": "opc datahub",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cogentdatahub",
        "version": "6.4.20"
      },
      {
        "model": "datahub quicktrend",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "7.2.2"
      },
      {
        "model": "opc datahub",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "6.4.21"
      },
      {
        "model": "cogent datahub",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "7.2.2"
      },
      {
        "model": "cascade datahub",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "6.4.21"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "7.0.2"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cogentdatahub",
        "version": "7.0"
      },
      {
        "model": "cascade datahub",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cogent real time",
        "version": "6.4.22"
      },
      {
        "model": "datahub",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cogent real time",
        "version": "7.3.0"
      },
      {
        "model": "datahub quicktrend",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cogent real time",
        "version": "7.3.0"
      },
      {
        "model": "opc datahub",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cogent real time",
        "version": "6.4.22"
      },
      {
        "model": "real-time systems opc datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "6.4.21"
      },
      {
        "model": "real-time systems cascade datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "6.4.21"
      },
      {
        "model": "real-time systems cogent datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "7.2.2"
      },
      {
        "model": "real-time systems datahub quicktrend",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "7.2.2"
      },
      {
        "model": "real-time systems datapid",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "7.2.2"
      },
      {
        "model": "real-time systems datapid",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "6.4.21"
      },
      {
        "model": "real-time systems datasim",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "7.2.2"
      },
      {
        "model": "real-time systems datasim",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogent",
        "version": "6.4.21"
      },
      {
        "model": "datahub quicktrend",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogentdatahub",
        "version": "7.2.2"
      },
      {
        "model": "cogent datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogentdatahub",
        "version": "7.2.2"
      },
      {
        "model": "cascade datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogentdatahub",
        "version": "6.4.21"
      },
      {
        "model": "opc datahub",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "cogentdatahub",
        "version": "6.4.21"
      },
      {
        "model": "real-time systems opc datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "6.4.20"
      },
      {
        "model": "real-time systems opc datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "6.0.2"
      },
      {
        "model": "real-time systems opc datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "6"
      },
      {
        "model": "real-time systems cogent datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "7.1.2"
      },
      {
        "model": "real-time systems cogent datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "7.1.1.63"
      },
      {
        "model": "real-time systems cogent datahub",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cogent",
        "version": "7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.0.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.1.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.1.1.63"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "7.1.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cogent datahub",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "opc datahub",
        "version": "6.4.20"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "opc datahub",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cascade datahub",
        "version": "6.4.20"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cascade datahub",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "datahub quicktrend",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "BID",
        "id": "58905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:cogentdatahub:cascade_datahub",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:cogentdatahub:cogent_datahub",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:cogentdatahub:datahub_quicktrend",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:cogentdatahub:opc_datahub",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Dillon Beresford",
    "sources": [
      {
        "db": "BID",
        "id": "58905"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-0682",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2013-0682",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-02823",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "038f53d4-2353-11e6-abef-000c29c66e3d",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-0682",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-0682",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-02823",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201304-032",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "038f53d4-2353-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cogent Real-Time Systems Cogent DataHub before 7.3.0, OPC DataHub before 6.4.22, Cascade DataHub before 6.4.22 on Windows, and DataHub QuickTrend before 7.3.0 do not properly handle exceptions, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via malformed data in a formatted text command, leading to out-of-bounds access to (1) heap or (2) stack memory. Cogent Real-Time Systems is a real-time data solutions vendor. The Cogent Real-Time Systems DataHub application receives formatted text commands in TCP link mode that are parsed, verified, and executed within the application. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected applications. Failed exploit attempts may crash the application, denying service to legitimate users. \nThe following Cogent Real-Time Systems products are vulnerable:\nCogent DataHub 7.2.2 and prior versions\nOPC DataHub 6.4.21 and prior versions\nCascade DataHub for Windows 6.4.21 and prior versions\nCogent DataHub DataSim and DataPid demonstration clients 7.2.2\nOPC DataHub DataSim and DataPid demonstration clients 6.4.21\nCascade DataHub DataSim and DataPid demonstration clients 6.4.21\nDataHub QuickTrend 7.2.2 and prior versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "BID",
        "id": "58905"
      },
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-0682",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-13-095-01",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "58905",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "038F53D4-2353-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "BID",
        "id": "58905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      }
    ]
  },
  "id": "VAR-201304-0154",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      }
    ],
    "trust": 1.6601670400000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:55:36.562000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Cogent DataHub",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/Products/Cogent_DataHub.html"
      },
      {
        "title": "OPC DataHub",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/Products/OPC_DataHub.html"
      },
      {
        "title": "Cascade DataHub",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/Products/Cascade_DataHub.html"
      },
      {
        "title": "DataHub QuickTrend",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/Products/DataHub_QuickTrend.html"
      },
      {
        "title": "Release Notes",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/ReleaseNotes.html"
      },
      {
        "title": "Download Software",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/Contact_Form.html"
      },
      {
        "title": "TopPage",
        "trust": 0.8,
        "url": "http://www.cogentdatahub.com/jp/"
      },
      {
        "title": "Cogent Real-Time Systems DataHub Text Command Buffer Overflow Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/33174"
      },
      {
        "title": "OPCDataHub-6.4.22-130302-Windows",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45674"
      },
      {
        "title": "CogentDataHub-7.3.0-130328-Windows",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45673"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "http://ics-cert.us-cert.gov/pdf/icsa-13-095-01.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0682"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0682"
      },
      {
        "trust": 0.3,
        "url": "http://www.cogentdatahub.com/products/cogent_datahub.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "BID",
        "id": "58905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "db": "BID",
        "id": "58905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-0682"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-04-09T00:00:00",
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2013-04-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "date": "2013-04-05T00:00:00",
        "db": "BID",
        "id": "58905"
      },
      {
        "date": "2013-04-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "date": "2013-04-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      },
      {
        "date": "2013-04-05T21:55:00.863000",
        "db": "NVD",
        "id": "CVE-2013-0682"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-05-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      },
      {
        "date": "2015-03-19T09:23:00",
        "db": "BID",
        "id": "58905"
      },
      {
        "date": "2013-04-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-002156"
      },
      {
        "date": "2013-04-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      },
      {
        "date": "2024-11-21T01:48:00.127000",
        "db": "NVD",
        "id": "CVE-2013-0682"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cogent Real-Time Systems DataHub Text Command Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02823"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "038f53d4-2353-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201304-032"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.