var-201503-0063
Vulnerability from variot

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 transmit cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network. A remote attacker can exploit the vulnerability to gain sensitive information by sniffing the network. The following products are affected: InduSoft Web Studio 7.1.3.2 and prior. InTouch Machine Edition 7.1.3.2 and prior. This product provides HMI clients with read, write tag and event monitoring capabilities. The vulnerability is caused by the programs transmitting plaintext certificates

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201503-0063",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wonderware intouch 2014",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "schneider electric",
        "version": "7.1"
      },
      {
        "model": "indusoft web studio",
        "scope": "eq",
        "trust": 1.2,
        "vendor": "schneider electric",
        "version": "7.1"
      },
      {
        "model": "edge",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "aveva",
        "version": "7.1.3.4"
      },
      {
        "model": "wonderware intouch 2014",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "schneider electric",
        "version": "7.1.3.4"
      },
      {
        "model": "indusoft web studio",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "7.1.3.4 sp3 patch 4"
      },
      {
        "model": "intouch machine edition 2014",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "schneider electric",
        "version": "7.1.3.4 sp3 patch 4"
      },
      {
        "model": "electric indusoft web studio sp3 patch",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "7.1.3.44"
      },
      {
        "model": "electric intouch machine edition sp3 patch",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "schneider",
        "version": "2014(\u003c7.1.3.44)"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "indusoft web studio",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.4,
        "vendor": "wonderware intouch 2014",
        "version": "*"
      },
      {
        "model": "intouch machine edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "20147.1.3.2"
      },
      {
        "model": "indusoft web studio",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "7.1.3.2"
      },
      {
        "model": "indusoft web studio sp patch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "schneider electric",
        "version": "7.1.3.434"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f27c1-463f-11e9-81a1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "9a355f92-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      },
      {
        "db": "BID",
        "id": "73378"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-617"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0998"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:schneider_electric:indusoft_web_studio",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:schneider_electric:wonderware_intouch_2014",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Gleb Gritsai, Ilya Karpov, and Kirill Nesterov of Positive Technologies Security Lab and Alisa Esage Shevcheckno",
    "sources": [
      {
        "db": "BID",
        "id": "73378"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-0998",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CVE-2015-0998",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.8,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2015-02057",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "7d7f27c1-463f-11e9-81a1-000c29342cb1",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.2,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "9a355f92-2351-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.2,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "VHN-78944",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-0998",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-0998",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-02057",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201503-617",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "7d7f27c1-463f-11e9-81a1-000c29342cb1",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "9a355f92-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-78944",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f27c1-463f-11e9-81a1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "9a355f92-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78944"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-617"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0998"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 transmit cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network. A remote attacker can exploit the vulnerability to gain sensitive information by sniffing the network. \nThe following products are affected:\nInduSoft Web Studio 7.1.3.2 and prior. \nInTouch Machine Edition 7.1.3.2 and prior. This product provides HMI clients with read, write tag and event monitoring capabilities. The vulnerability is caused by the programs transmitting plaintext certificates",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-0998"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      },
      {
        "db": "BID",
        "id": "73378"
      },
      {
        "db": "IVD",
        "id": "7d7f27c1-463f-11e9-81a1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "9a355f92-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78944"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-0998",
        "trust": 3.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-15-085-01",
        "trust": 2.8
      },
      {
        "db": "SCHNEIDER",
        "id": "SEVD-2015-054-02",
        "trust": 2.3
      },
      {
        "db": "SCHNEIDER",
        "id": "SEVD-2015-054-01",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-617",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-02057",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "73378",
        "trust": 0.4
      },
      {
        "db": "IVD",
        "id": "7D7F27C1-463F-11E9-81A1-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "IVD",
        "id": "9A355F92-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-78944",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f27c1-463f-11e9-81a1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "9a355f92-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78944"
      },
      {
        "db": "BID",
        "id": "73378"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-617"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0998"
      }
    ]
  },
  "id": "VAR-201503-0063",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f27c1-463f-11e9-81a1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "9a355f92-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78944"
      }
    ],
    "trust": 1.8657392000000002
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d7f27c1-463f-11e9-81a1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "9a355f92-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:01:52.754000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "InTouch Machine Edition 2014 Vulnerabilities",
        "trust": 0.8,
        "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-054-02"
      },
      {
        "title": "InduSoft Web Studi Vulnerabilities",
        "trust": 0.8,
        "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-054-01"
      },
      {
        "title": "\\302\\240\\302\\240\\302\\240\\302\\240\\302\\240Patch for Schneider Electric InduSoft Web Studio and InTouch Machine Edition Information Disclosure Vulnerability (CNVD-2015-02057)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/56787"
      },
      {
        "title": "IWS71.3.4",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54647"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-617"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-78944"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0998"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-085-01"
      },
      {
        "trust": 2.3,
        "url": "http://download.schneider-electric.com/files?p_doc_ref=sevd-2015-054-02"
      },
      {
        "trust": 1.7,
        "url": "http://download.schneider-electric.com/files?p_doc_ref=sevd-2015-054-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0998"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0998"
      },
      {
        "trust": 0.3,
        "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78944"
      },
      {
        "db": "BID",
        "id": "73378"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-617"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0998"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "7d7f27c1-463f-11e9-81a1-000c29342cb1"
      },
      {
        "db": "IVD",
        "id": "9a355f92-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78944"
      },
      {
        "db": "BID",
        "id": "73378"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-617"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0998"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-03-31T00:00:00",
        "db": "IVD",
        "id": "7d7f27c1-463f-11e9-81a1-000c29342cb1"
      },
      {
        "date": "2015-03-31T00:00:00",
        "db": "IVD",
        "id": "9a355f92-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2015-03-31T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      },
      {
        "date": "2015-03-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-78944"
      },
      {
        "date": "2015-03-26T00:00:00",
        "db": "BID",
        "id": "73378"
      },
      {
        "date": "2015-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      },
      {
        "date": "2015-03-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201503-617"
      },
      {
        "date": "2015-03-29T10:59:07.460000",
        "db": "NVD",
        "id": "CVE-2015-0998"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-03-31T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-02057"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-78944"
      },
      {
        "date": "2015-03-26T00:00:00",
        "db": "BID",
        "id": "73378"
      },
      {
        "date": "2015-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      },
      {
        "date": "2021-05-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201503-617"
      },
      {
        "date": "2024-11-21T02:24:06.567000",
        "db": "NVD",
        "id": "CVE-2015-0998"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific network environment",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-617"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Schneider Electric InduSoft Web Studio and  InTouch Machine Edition 2014 Vulnerability in which important information is obtained",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001995"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201503-617"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.