VAR-201401-0139

Vulnerability from variot - Updated: 2023-12-18 13:14

Directory traversal vulnerability on the Emerson Network Power Avocent MergePoint Unity 2016 (aka MPU2016) KVM switch with firmware 1.9.16473 allows remote attackers to read arbitrary files via unspecified vectors, as demonstrated by reading the /etc/passwd file. CWE-23: Relative Path Traversal http://cwe.mitre.org/data/definitions/23.htmlThe product is /etc/passwd Information such as may be obtained. As a result, the product may be accessed with administrator privileges. Avocent MergePoint Unity 2016 KVM is a new generation of managed switches from Emerson. A remote attacker can exploit this issue to obtain sensitive information that could aid in further attacks. An attacker can use directory traversal to download critical files such as /etc/passwd to obtain the credentials for the device.

Author:

Shady.liu@dbappsecurity.com.cn

Description:

A remote unauthenticated attacker can download the configuration files of the device and use the obtained administrator credentials to access the interface. The attacker may then modify the settings of the device with unrestricted access.

Abstract:

http://www.securityfocus.com/bid/65105

http://osvdb.org/show/osvdb/102408

http://www.kb.cert.org/vuls/id/168751

Exploit:

DBAppSecurity Co.Ltd.

Email:Shady.liu@dbappsecurity.com.cn

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0139",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "network power avocent mergepoint unity 2016",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "emerson",
        "version": "1.9.16473"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "emerson network power",
        "version": null
      },
      {
        "model": "avocent mergepoint unity",
        "scope": null,
        "trust": 0.8,
        "vendor": "emerson",
        "version": null
      },
      {
        "model": "avocent mergepoint unity",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "emerson",
        "version": "version  1.9.16473"
      },
      {
        "model": "network power avocent mergepoint unity kvm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "emerson",
        "version": "20161.9.16473"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "network power avocent mergepoint unity 2016",
        "version": "1.9.16473"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "445fc886-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#168751"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001236"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6030"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-506"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:emerson:network_power_avocent_mergepoint_unity_2016_firmware:1.9.16473:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:emerson:network_power_avocent_mergepoint_unity_2016_firmware:1.9.16473:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-6030"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Shady Liu",
    "sources": [
      {
        "db": "BID",
        "id": "65105"
      },
      {
        "db": "PACKETSTORM",
        "id": "124951"
      }
    ],
    "trust": 0.4
  },
  "cve": "CVE-2013-6030",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "availabilityRequirement": "NOT DEFINED",
            "baseScore": 4.0,
            "collateralDamagePotential": "LOW",
            "confidentialityImpact": "PARTIAL",
            "confidentialityRequirement": "NOT DEFINED",
            "enviromentalScore": 0.9,
            "exploitability": "PROOF-OF-CONCEPT",
            "exploitabilityScore": 8.0,
            "id": "CVE-2013-6030",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "integrityRequirement": "NOT DEFINED",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "remediationLevel": "OFFICIAL FIX",
            "reportConfidence": "UNCOFIRMED",
            "severity": "MEDIUM",
            "targetDistribution": "LOW",
            "trust": 0.8,
            "userInterationRequired": null,
            "vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2013-6030",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-00632",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "445fc886-2352-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-66032",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-6030",
            "trust": 2.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-00632",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201401-506",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "445fc886-2352-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-66032",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "445fc886-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#168751"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66032"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001236"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6030"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-506"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Directory traversal vulnerability on the Emerson Network Power Avocent MergePoint Unity 2016 (aka MPU2016) KVM switch with firmware 1.9.16473 allows remote attackers to read arbitrary files via unspecified vectors, as demonstrated by reading the /etc/passwd file. CWE-23: Relative Path Traversal http://cwe.mitre.org/data/definitions/23.htmlThe product is /etc/passwd Information such as may be obtained. As a result, the product may be accessed with administrator privileges. Avocent MergePoint Unity 2016 KVM is a new generation of managed switches from Emerson. \nA remote attacker can exploit this issue to obtain sensitive information that could aid in further attacks. An attacker can use directory traversal to download critical files such as /etc/passwd to obtain the credentials for the device. \n\nAuthor: \n======\nShady.liu@dbappsecurity.com.cn\n\nDescription: \n======\nA remote unauthenticated attacker can download the configuration files of the device and use the obtained administrator credentials to access the interface. The attacker may then modify the settings of the device with unrestricted access. \n\nAbstract: \n======\n\nhttp://www.securityfocus.com/bid/65105\n\nhttp://osvdb.org/show/osvdb/102408\n\nhttp://www.kb.cert.org/vuls/id/168751\n\n\nExploit: \n======\n\n\n\n\n\n\nDBAppSecurity Co.Ltd. \n-----------------------------------------------------------\n\nEmail:Shady.liu@dbappsecurity.com.cn\n----------------------------------------------------------\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-6030"
      },
      {
        "db": "CERT/CC",
        "id": "VU#168751"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001236"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      },
      {
        "db": "BID",
        "id": "65105"
      },
      {
        "db": "IVD",
        "id": "445fc886-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66032"
      },
      {
        "db": "PACKETSTORM",
        "id": "124951"
      }
    ],
    "trust": 3.51
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-66032",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-66032"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-6030",
        "trust": 4.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#168751",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "65105",
        "trust": 2.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-506",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95235811",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001236",
        "trust": 0.8
      },
      {
        "db": "OSVDB",
        "id": "102408",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "445FC886-2352-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "124951",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-66032",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "445fc886-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#168751"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66032"
      },
      {
        "db": "BID",
        "id": "65105"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001236"
      },
      {
        "db": "PACKETSTORM",
        "id": "124951"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6030"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-506"
      }
    ]
  },
  "id": "VAR-201401-0139",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "445fc886-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66032"
      }
    ],
    "trust": 1.9
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "445fc886-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:14:53.791000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Previous Releases",
        "trust": 0.8,
        "url": "http://www.avocent.com/support_firmware/mergepoint_unity/mergepoint_unity_switch_-_previous_releases.aspx"
      },
      {
        "title": "MergePoint Unity Firmware",
        "trust": 0.8,
        "url": "http://www.avocent.com/support_firmware/mergepoint_unity/mergepoint_unity_switch.aspx"
      },
      {
        "title": "Emerson Avocent MergePoint Unity 2016 KVM Switch Unknown Remote Directory Traversal Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/43041"
      },
      {
        "title": "FL0620-AVO-1.14.0.19936",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=48413"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001236"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-506"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-22",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-23",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#168751"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66032"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001236"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6030"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.kb.cert.org/vuls/id/168751"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/65105"
      },
      {
        "trust": 1.4,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6030"
      },
      {
        "trust": 0.9,
        "url": "http://www.emersonnetworkpower.com/en-us/products/infrastructuremanagement/digitalkvmappliances/pages/avocentmergepointunityappliances.aspx"
      },
      {
        "trust": 0.9,
        "url": "http://www.avocent.com/support_firmware/mergepoint_unity/mergepoint_unity_switch.aspx"
      },
      {
        "trust": 0.9,
        "url": " http://www.avocent.com/support_firmware/mergepoint_unity/mergepoint_unity_switch_-_previous_releases.aspx"
      },
      {
        "trust": 0.8,
        "url": "http://cwe.mitre.org/data/definitions/23.html"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6030"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95235811/index.html"
      },
      {
        "trust": 0.6,
        "url": "http://osvdb.com/show/osvdb/102408"
      },
      {
        "trust": 0.1,
        "url": "http://osvdb.org/show/osvdb/102408"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6030"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#168751"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66032"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001236"
      },
      {
        "db": "PACKETSTORM",
        "id": "124951"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6030"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-506"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "445fc886-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CERT/CC",
        "id": "VU#168751"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      },
      {
        "db": "VULHUB",
        "id": "VHN-66032"
      },
      {
        "db": "BID",
        "id": "65105"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001236"
      },
      {
        "db": "PACKETSTORM",
        "id": "124951"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6030"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-506"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-01-26T00:00:00",
        "db": "IVD",
        "id": "445fc886-2352-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2014-01-23T00:00:00",
        "db": "CERT/CC",
        "id": "VU#168751"
      },
      {
        "date": "2014-01-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      },
      {
        "date": "2014-01-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-66032"
      },
      {
        "date": "2014-01-23T00:00:00",
        "db": "BID",
        "id": "65105"
      },
      {
        "date": "2014-01-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001236"
      },
      {
        "date": "2014-01-27T02:22:22",
        "db": "PACKETSTORM",
        "id": "124951"
      },
      {
        "date": "2014-01-24T04:38:09.620000",
        "db": "NVD",
        "id": "CVE-2013-6030"
      },
      {
        "date": "2014-01-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201401-506"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#168751"
      },
      {
        "date": "2014-01-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      },
      {
        "date": "2016-12-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-66032"
      },
      {
        "date": "2014-01-28T00:33:00",
        "db": "BID",
        "id": "65105"
      },
      {
        "date": "2014-05-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001236"
      },
      {
        "date": "2016-12-31T02:59:07.623000",
        "db": "NVD",
        "id": "CVE-2013-6030"
      },
      {
        "date": "2014-01-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201401-506"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-506"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Emerson Avocent MergePoint Unity 2016 KVM Switch Unknown remote directory traversal vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "445fc886-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00632"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Path traversal",
    "sources": [
      {
        "db": "IVD",
        "id": "445fc886-2352-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201401-506"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…