Vulnerabilites related to wellintech - kingview
Vulnerability from fkie_nvd
Published
2011-12-27 04:01
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in nettransdll.dll in HistorySvr.exe (aka HistoryServer.exe) in WellinTech KingView 6.53 and 65.30.2010.18018 allows remote attackers to execute arbitrary code via a crafted op-code 3 packet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 6.53 | |
wellintech | kingview | 65.30.2010.18018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*", "matchCriteriaId": "C256036A-9428-4BD3-BB8D-0192EB219764", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nettransdll.dll in HistorySvr.exe (aka HistoryServer.exe) in WellinTech KingView 6.53 and 65.30.2010.18018 allows remote attackers to execute arbitrary code via a crafted op-code 3 packet." }, { "lang": "es", "value": "Desbordamiento de buffer de memoria din\u00e1mica en nettransdll.dll en HistorySvr.exe (tambi\u00e9n conocido como HistoryServer.exe) en WellinTech KingView v6.53 y 65.30.2010.18018 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete manipulado \u0027op-code 3\u0027." } ], "id": "CVE-2011-4536", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-27T04:01:39.857", "references": [ { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47339" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "source": "cret@cert.org", "url": "http://www.osvdb.org/77992" }, { "source": "cret@cert.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf" }, { "source": "cret@cert.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/77992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-10-25 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.52 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack." }, { "lang": "es", "value": "El control SUPERGRIDLib.SuperGrid ActiveX en SuperGrid.ocx anterior a la versi\u00f3n 65.30.30000.10002 de WellinTech KingView anterior a la versi\u00f3n 6.53 no restringe adecuadamente los m\u00e9todos de llamada ReplaceDBFile, lo que permite a atacantes remotos crear y sobreescribir archivos arbitrarios, y posteriormente ejecutar programas arbitrarios, a trav\u00e9s de dos argumentos pathname, como lo demuestra un ataque de recorrido de directorio." } ], "id": "CVE-2013-6127", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-10-25T20:55:03.500", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/28084/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/28084/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-05 03:23
Modified
2025-04-11 00:51
Severity ?
Summary
WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, US Government Resource | |
cret@cert.org | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.5.30.2010.18018 | |
wellintech | kingview | 6.52 | |
wellintech | kingview | 65.30.2010.18018 | |
wellintech | kingview | 65.30.17249 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1909-52F3-42C7-AF6B-FE5EC1FB1657", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*", "matchCriteriaId": "5161BBEA-1BA5-4FF1-9D8A-52D6C7BE2282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001." }, { "lang": "es", "value": "WellinTech KingView v6.53, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites) a trav\u00e9s de un paquete modificado al puerto 2001 (1) TCP o (2) UDP" } ], "id": "CVE-2012-1832", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-05T03:23:18.323", "references": [ { "source": "cret@cert.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-02 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Untrusted search path vulnerability in WellinTech KingView 6.53 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 6.53 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*", "matchCriteriaId": "C256036A-9428-4BD3-BB8D-0192EB219764", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in WellinTech KingView 6.53 allows local users to gain privileges via a Trojan horse DLL in the current working directory." }, { "lang": "es", "value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en WellinTech KingView v6.53 permite a usuarios locales conseguir privilegios a trav\u00e9s de un caballo de Troya DLL en el directorio de trabajo actual." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/lists/426.html\r\n\r\n\u0027Untrusted Search Path\u0027", "evaluatorImpact": "Per: http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf\r\n\r\n\u0027This vulnerability is remotely exploitable but may require the use of social engineering to exploit.\u0027", "id": "CVE-2012-1819", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-02T22:55:02.140", "references": [ { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/53316" }, { "source": "cret@cert.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-16 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 6.52 | |
wellintech | kingview | 6.53 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*", "matchCriteriaId": "C256036A-9428-4BD3-BB8D-0192EB219764", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method." }, { "lang": "es", "value": "Desbordamiento de buffer de pila en un control ActiveX de KVWebSvr.dll de WellinTech KingView 6.52 y 6.53 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un argumento segundo extenso al m\u00e9todo ValidateUser." } ], "id": "CVE-2011-3142", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-16T21:55:01.273", "references": [ { "source": "cve@mitre.org", "url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/16936" }, { "source": "cve@mitre.org", "url": "http://www.kingview.com/news/detail.aspx?contentid=537" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/72889" }, { "source": "cve@mitre.org", "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/46757" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/16936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kingview.com/news/detail.aspx?contentid=537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/72889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/46757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 10:33
Modified
2025-06-26 22:15
Severity ?
Summary
WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file." }, { "lang": "es", "value": "WellinTech KingSCADA 3.0 utiliza un formato base64 en texto claro para el almacenamiento de contrase\u00f1as en user.db, lo que permite a atacantes locales o remotos obtener informaci\u00f3n sensible mediante la lectura de este archivo." } ], "id": "CVE-2012-1977", "lastModified": "2025-06-26T22:15:24.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "ics-cert@hq.dhs.gov", "type": "Secondary", "userInteractionRequired": false }, { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T10:33:15.020", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-12-129-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dsecrg.com/pages/vul/show.php?id=405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-129-01.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2013-10-25 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4C15589-36E2-41B9-AE71-989CABF8B374", "versionEndIncluding": "6.52", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack." }, { "lang": "es", "value": "El control ActiveX KCHARTXYLib.KChartXY en KChartXY.ocx anterior a 6.53 no restringe apropiadamente las llamadas al m\u00e9todo SaveToFile, lo que permite a atacantes remotos crear o sobreecribir archivos a discrecci\u00f3n, y subsecuentemente ejecutar programas de forma arbitraria, a traves de un argumento de ruta simple, como fue demostrado por un ataque de recorrido de directorios." } ], "id": "CVE-2013-6128", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-10-25T20:55:03.517", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch", "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" }, { "source": "ics-cert@hq.dhs.gov", "url": "http://www.exploit-db.com/exploits/28085/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/28085/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-11 03:00
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 6.53 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*", "matchCriteriaId": "C256036A-9428-4BD3-BB8D-0192EB219764", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en el mont\u00f3n en HistorySvr.exe en WellinTech KingView v6.53 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una petici\u00f3n larga al puerto TCP 777." } ], "id": "CVE-2011-0406", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-11T03:00:06.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/70366" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42851" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/8134" }, { "source": "cve@mitre.org", "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "source": "cve@mitre.org", "url": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15957" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/180119" }, { "source": "cve@mitre.org", "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/45727" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/70366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/180119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/45727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-10 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf | US Government Resource | |
cve@mitre.org | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.5.30.2010.18018 | |
wellintech | kingview | 6.52 | |
wellintech | kingview | 65.30.2010.18018 | |
wellintech | kingview | 65.30.17249 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1909-52F3-42C7-AF6B-FE5EC1FB1657", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*", "matchCriteriaId": "5161BBEA-1BA5-4FF1-9D8A-52D6C7BE2282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file." }, { "lang": "es", "value": "WellinTech KingView6.5.3 y anterior utiliza algoritmo d\u00e9bil de generaci\u00f3n de contrase\u00f1as, lo que hace que sea m\u00e1s f\u00e1cil para los usuarios locales descubrir credenciales mediante la lectura de un archivo especificado." } ], "id": "CVE-2012-4899", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-10T18:55:05.550", "references": [ { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-05 03:23
Modified
2025-04-11 00:51
Severity ?
Summary
Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | US Government Resource | |
cret@cert.org | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.5.30.2010.18018 | |
wellintech | kingview | 6.52 | |
wellintech | kingview | 65.30.2010.18018 | |
wellintech | kingview | 65.30.17249 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1909-52F3-42C7-AF6B-FE5EC1FB1657", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*", "matchCriteriaId": "5161BBEA-1BA5-4FF1-9D8A-52D6C7BE2282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en WellinTech KingView v6.53, permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de peticiones HTTP al puerto 8001 modificadas." } ], "id": "CVE-2012-2560", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-05T03:23:18.603", "references": [ { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-05 03:23
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, Vendor Advisory | |
cret@cert.org | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.5.30.2010.18018 | |
wellintech | kingview | 6.52 | |
wellintech | kingview | 65.30.2010.18018 | |
wellintech | kingview | 65.30.17249 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1909-52F3-42C7-AF6B-FE5EC1FB1657", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*", "matchCriteriaId": "5161BBEA-1BA5-4FF1-9D8A-52D6C7BE2282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en WellinTech KingView v6.53, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de paquetes modificados al puerto TCP 555." } ], "evaluatorImpact": "Per: http://www.wellintech.com/index.php/news/33-patch-for-kingview653\r\n\r\n\"KingView with the version 65.30.17249( TouchExplorer: 65.30.2003.17249; TouchVew: 65.30.2003.17376) and also the previous version is affected.\"", "id": "CVE-2012-1830", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-05T03:23:18.230", "references": [ { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-07-05 03:23
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, US Government Resource | |
cret@cert.org | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf | Patch, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.wellintech.com/index.php/news/33-patch-for-kingview653 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | * | |
wellintech | kingview | 3.0 | |
wellintech | kingview | 6.5.30.2010.18018 | |
wellintech | kingview | 6.52 | |
wellintech | kingview | 65.30.2010.18018 | |
wellintech | kingview | 65.30.17249 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B19F35-84B4-45AE-96D9-352213070CBC", "versionEndIncluding": "6.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAB5609B-2D1E-42F5-9C78-1460A21C8795", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.5.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "F98B1909-52F3-42C7-AF6B-FE5EC1FB1657", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.2010.18018:*:*:*:*:*:*:*", "matchCriteriaId": "1DAAC197-9039-4D12-A4B0-7A534E3A1B59", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:65.30.17249:*:*:*:*:*:*:*", "matchCriteriaId": "5161BBEA-1BA5-4FF1-9D8A-52D6C7BE2282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en memoria din\u00e1mica en WellinTech KingView v6.53, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de paquetes modificados al puerto TCP 555." } ], "id": "CVE-2012-1831", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-05T03:23:18.277", "references": [ { "source": "cret@cert.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-02-15 12:09
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wellintech | kingview | 6.52 | |
wellintech | kingview | 6.53 | |
wellintech | kingview | 6.55 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellintech:kingview:6.52:*:*:*:*:*:*:*", "matchCriteriaId": "37C00AAD-8824-4F27-8203-EBBDB879772D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*", "matchCriteriaId": "C256036A-9428-4BD3-BB8D-0192EB219764", "vulnerable": true }, { "criteria": "cpe:2.3:a:wellintech:kingview:6.55:*:*:*:*:*:*:*", "matchCriteriaId": "C657AF50-F338-42FB-80B8-B8B8A7E7AE20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet." }, { "lang": "es", "value": "Desbordamiento de buffer en kingMess.exe v65.20.2003.10300 en WellinTech KingView v6.52, kingMess.exe v65.20.2003.10400 en KingView v6.53, y kingMess.exe v65.50.2011.18049 en KingView v6.55 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria) mediante un paquete manipulado." } ], "id": "CVE-2012-4711", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-15T12:09:27.820", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2012-1977 (GCVE-0-2012-1977)
Vulnerability from cvelistv5
Published
2012-05-09 10:00
Modified
2025-06-26 21:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WellinTech | KingSCADA |
Version: 3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.498Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dsecrg.com/pages/vul/show.php?id=405" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-129-01.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "KingSCADA", "vendor": "WellinTech", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Independent researchers Alexandr Polyakov and Alexey Sintsov from DSecRG identified an unsecure password encryption vulnerability in WellinTech KingSCADA application." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eWellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file.\u003c/p\u003e" } ], "value": "WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file." } ], "metrics": [ { "cvssV2_0": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-311", "description": "CWE-311", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-26T21:30:25.305Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-12-129-01" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eWellinTech has provided the following link to the latest version of KingSCADA: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://download.kingview.com/software/KingSCADA/EN/KingSCADA3.1_2012-04-16EN.rar\"\u003ehttp://download.kingview.com/software/KingSCADA/EN/KingSCADA3.1_2012-04-16EN.rar\u003c/a\u003e.\u003c/p\u003e\u003cp\u003eAccording to WellinTech, this new version securely hashes passwords.\u003c/p\u003e" } ], "value": "WellinTech has provided the following link to the latest version of KingSCADA: http://download.kingview.com/software/KingSCADA/EN/KingSCADA3.1_2012-04-16EN.rar .\n\nAccording to WellinTech, this new version securely hashes passwords." } ], "source": { "advisory": "ICSA-12-129-01", "discovery": "EXTERNAL" }, "title": "WellinTech KingSCADA Missing Encryption of Sensitive Data", "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-1977", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.db, which allows context-dependent attackers to obtain sensitive information by reading this file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dsecrg.com/pages/vul/show.php?id=405", "refsource": "MISC", "url": "http://dsecrg.com/pages/vul/show.php?id=405" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-129-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-129-01.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-1977", "datePublished": "2012-05-09T10:00:00Z", "dateReserved": "2012-03-30T00:00:00Z", "dateUpdated": "2025-06-26T21:30:25.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-6127 (GCVE-0-2013-6127)
Vulnerability from cvelistv5
Published
2013-10-25 20:00
Modified
2024-09-17 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:29:43.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28084", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/28084/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-10-25T20:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "28084", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/28084/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-6127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28084", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/28084/" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-6127", "datePublished": "2013-10-25T20:00:00Z", "dateReserved": "2013-10-15T00:00:00Z", "dateUpdated": "2024-09-17T00:37:21.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1832 (GCVE-0-2012-1832)
Vulnerability from cvelistv5
Published
2012-07-05 01:00
Modified
2024-09-17 04:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:38.489Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-05T01:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-1832", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WellinTech KingView 6.53 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted packet to (1) TCP or (2) UDP port 2001." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "name": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", "refsource": "CONFIRM", "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-1832", "datePublished": "2012-07-05T01:00:00Z", "dateReserved": "2012-03-21T00:00:00Z", "dateUpdated": "2024-09-17T04:19:22.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1819 (GCVE-0-2012-1819)
Vulnerability from cvelistv5
Published
2012-05-02 22:00
Modified
2024-08-06 19:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Untrusted search path vulnerability in WellinTech KingView 6.53 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:38.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf" }, { "name": "53316", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53316" }, { "name": "kingview-dll-code-execution(75309)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in WellinTech KingView 6.53 allows local users to gain privileges via a Trojan horse DLL in the current working directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-13T18:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf" }, { "name": "53316", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53316" }, { "name": "kingview-dll-code-execution(75309)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-1819", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in WellinTech KingView 6.53 allows local users to gain privileges via a Trojan horse DLL in the current working directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://en.wellintech.com/news/detail.aspx?contentid=168", "refsource": "CONFIRM", "url": "http://en.wellintech.com/news/detail.aspx?contentid=168" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf" }, { "name": "53316", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53316" }, { "name": "kingview-dll-code-execution(75309)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-1819", "datePublished": "2012-05-02T22:00:00", "dateReserved": "2012-03-21T00:00:00", "dateUpdated": "2024-08-06T19:08:38.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4536 (GCVE-0-2011-4536)
Vulnerability from cvelistv5
Published
2011-12-27 02:00
Modified
2024-09-16 23:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in nettransdll.dll in HistorySvr.exe (aka HistoryServer.exe) in WellinTech KingView 6.53 and 65.30.2010.18018 allows remote attackers to execute arbitrary code via a crafted op-code 3 packet.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/" }, { "name": "77992", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/77992" }, { "name": "47339", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47339" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in nettransdll.dll in HistorySvr.exe (aka HistoryServer.exe) in WellinTech KingView 6.53 and 65.30.2010.18018 allows remote attackers to execute arbitrary code via a crafted op-code 3 packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-27T02:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/" }, { "name": "77992", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/77992" }, { "name": "47339", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47339" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2011-4536", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in nettransdll.dll in HistorySvr.exe (aka HistoryServer.exe) in WellinTech KingView 6.53 and 65.30.2010.18018 allows remote attackers to execute arbitrary code via a crafted op-code 3 packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-351/" }, { "name": "77992", "refsource": "OSVDB", "url": "http://www.osvdb.org/77992" }, { "name": "47339", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47339" }, { "name": "http://en.wellintech.com/news/detail.aspx?contentid=166", "refsource": "CONFIRM", "url": "http://en.wellintech.com/news/detail.aspx?contentid=166" }, { "name": "http://www.kingview.com/news/detail.aspx?contentid=587", "refsource": "CONFIRM", "url": "http://www.kingview.com/news/detail.aspx?contentid=587" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-355-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2011-4536", "datePublished": "2011-12-27T02:00:00Z", "dateReserved": "2011-11-22T00:00:00Z", "dateUpdated": "2024-09-16T23:20:33.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4899 (GCVE-0-2012-4899)
Vulnerability from cvelistv5
Published
2012-10-10 18:00
Modified
2024-09-16 22:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:50:17.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-10-10T18:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4899", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WellinTech KingView 6.5.3 and earlier uses a weak password-hashing algorithm, which makes it easier for local users to discover credentials by reading an unspecified file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", "refsource": "MISC", "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-283-02.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4899", "datePublished": "2012-10-10T18:00:00Z", "dateReserved": "2012-09-12T00:00:00Z", "dateUpdated": "2024-09-16T22:19:42.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1831 (GCVE-0-2012-1831)
Vulnerability from cvelistv5
Published
2012-07-05 01:00
Modified
2024-09-16 18:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:38.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-05T01:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-1831", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "name": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", "refsource": "CONFIRM", "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-1831", "datePublished": "2012-07-05T01:00:00Z", "dateReserved": "2012-03-21T00:00:00Z", "dateUpdated": "2024-09-16T18:43:21.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1830 (GCVE-0-2012-1830)
Vulnerability from cvelistv5
Published
2012-07-05 01:00
Modified
2024-09-17 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:38.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-05T01:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-1830", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 555." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "name": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", "refsource": "CONFIRM", "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-1830", "datePublished": "2012-07-05T01:00:00Z", "dateReserved": "2012-03-21T00:00:00Z", "dateUpdated": "2024-09-17T02:46:36.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-6128 (GCVE-0-2013-6128)
Vulnerability from cvelistv5
Published
2013-10-25 20:00
Modified
2024-09-16 20:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:29:42.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28085", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/28085/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-10-25T20:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "28085", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/28085/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-6128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28085", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/28085/" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-295-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-6128", "datePublished": "2013-10-25T20:00:00Z", "dateReserved": "2013-10-15T00:00:00Z", "dateUpdated": "2024-09-16T20:47:34.907Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0406 (GCVE-0-2011-0406)
Vulnerability from cvelistv5
Published
2011-01-11 01:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "kingview-historysvr-bo(64559)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" }, { "name": "15957", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/15957" }, { "name": "45727", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" }, { "name": "42851", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42851" }, { "name": "70366", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70366" }, { "name": "8134", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8134" }, { "name": "ADV-2011-0063", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "name": "VU#180119", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/180119" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "kingview-historysvr-bo(64559)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" }, { "name": "15957", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/15957" }, { "name": "45727", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45727" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" }, { "name": "42851", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42851" }, { "name": "70366", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70366" }, { "name": "8134", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8134" }, { "name": "ADV-2011-0063", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "tags": [ "x_refsource_MISC" ], "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "name": "VU#180119", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/180119" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0406", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "kingview-historysvr-bo(64559)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" }, { "name": "15957", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/15957" }, { "name": "45727", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45727" }, { "name": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108", "refsource": "MISC", "url": "http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" }, { "name": "42851", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42851" }, { "name": "70366", "refsource": "OSVDB", "url": "http://osvdb.org/70366" }, { "name": "8134", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8134" }, { "name": "ADV-2011-0063", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0063" }, { "name": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html", "refsource": "MISC", "url": "http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" }, { "name": "http://www.kingview.com/news/detail.aspx?contentid=528", "refsource": "CONFIRM", "url": "http://www.kingview.com/news/detail.aspx?contentid=528" }, { "name": "VU#180119", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/180119" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0406", "datePublished": "2011-01-11T01:00:00", "dateReserved": "2011-01-10T00:00:00", "dateUpdated": "2024-08-06T21:51:08.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-3142 (GCVE-0-2011-3142)
Vulnerability from cvelistv5
Published
2011-08-16 21:00
Modified
2024-09-17 01:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:22:27.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541" }, { "name": "16936", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/16936" }, { "name": "46757", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46757" }, { "name": "72889", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/72889" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=537" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-08-16T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541" }, { "name": "16936", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/16936" }, { "name": "46757", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46757" }, { "name": "72889", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/72889" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kingview.com/news/detail.aspx?contentid=537" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in an ActiveX control in KVWebSvr.dll in WellinTech KingView 6.52 and 6.53 allows remote attackers to execute arbitrary code via a long second argument to the ValidateUser method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html", "refsource": "MISC", "url": "http://www.scadahacker.com/exploits-wellintech-kvwebsvr.html" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-074-01.pdf" }, { "name": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541", "refsource": "MISC", "url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-04541" }, { "name": "16936", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/16936" }, { "name": "46757", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46757" }, { "name": "72889", "refsource": "OSVDB", "url": "http://www.osvdb.org/72889" }, { "name": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-066-01.pdf" }, { "name": "http://www.kingview.com/news/detail.aspx?contentid=537", "refsource": "CONFIRM", "url": "http://www.kingview.com/news/detail.aspx?contentid=537" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3142", "datePublished": "2011-08-16T21:00:00Z", "dateReserved": "2011-08-16T00:00:00Z", "dateUpdated": "2024-09-17T01:20:36.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4711 (GCVE-0-2012-4711)
Vulnerability from cvelistv5
Published
2013-02-15 11:00
Modified
2024-08-06 20:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:42:55.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-21T09:00:00", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2012-4711", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-043-02.pdf" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-043-02A" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2012-4711", "datePublished": "2013-02-15T11:00:00", "dateReserved": "2012-08-28T00:00:00", "dateUpdated": "2024-08-06T20:42:55.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2560 (GCVE-0-2012-2560)
Vulnerability from cvelistv5
Published
2012-07-05 01:00
Modified
2024-09-16 19:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:34:25.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-07-05T01:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-2560", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in WellinTech KingView 6.53 allows remote attackers to read arbitrary files via a crafted HTTP request to port 8001." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", "refsource": "MISC", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf" }, { "name": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", "refsource": "CONFIRM", "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-2560", "datePublished": "2012-07-05T01:00:00Z", "dateReserved": "2012-05-09T00:00:00Z", "dateUpdated": "2024-09-16T19:25:49.875Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }