ID

VAR-201805-1147


CVE

CVE-2018-7507


TITLE

(0Day) Delta Industrial Automation WPLSoft dvp File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability

Trust: 2.8

sources: ZDI: ZDI-17-705 // ZDI: ZDI-17-703 // ZDI: ZDI-17-704 // ZDI: ZDI-17-702

DESCRIPTION

WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffer where a value larger than the buffer can be read from a file into the buffer, causing the buffer to be overwritten, which may allow remote code execution or cause the application to crash. Delta Electronics WPLSoft Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of dvp files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process. Delta Industrial Automation is the industry automation vendor for power management and cooling solutions worldwide. The length of the data provided by the user is not verified. WPLSoft (Delta PLC programming software) is a PLC program programming software used by Delta Electronics in the WINDOWS operating system environment. Delta Electronics WPLSoft has a heap buffer overflow vulnerability. Execute or cause the application to crash. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3. Delta Industrial WPLSoft Version 2.45.0 and prior versions are vulnerable

Trust: 7.65

sources: NVD: CVE-2018-7507 // JVNDB: JVNDB-2018-004571 // ZDI: ZDI-17-703 // ZDI: ZDI-17-702 // ZDI: ZDI-17-704 // ZDI: ZDI-17-699 // ZDI: ZDI-17-705 // CNVD: CNVD-2017-22821 // CNVD: CNVD-2017-22824 // CNVD: CNVD-2018-03768 // BID: 103179 // IVD: e300285e-39ab-11e9-83a1-000c29342cb1 // IVD: e3000150-39ab-11e9-9ca4-000c29342cb1 // IVD: e8dd53be-8850-484e-ab8a-bc308c7f1c64 // IVD: e4e1f909-5d49-466d-ac98-cdbbb329c50d // IVD: e3004f6e-39ab-11e9-a5a2-000c29342cb1 // VULMON: CVE-2018-7507

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 2.8

sources: IVD: e3004f6e-39ab-11e9-a5a2-000c29342cb1 // IVD: e3000150-39ab-11e9-9ca4-000c29342cb1 // IVD: e4e1f909-5d49-466d-ac98-cdbbb329c50d // IVD: e8dd53be-8850-484e-ab8a-bc308c7f1c64 // IVD: e300285e-39ab-11e9-83a1-000c29342cb1 // CNVD: CNVD-2017-22821 // CNVD: CNVD-2017-22824 // CNVD: CNVD-2018-03768

AFFECTED PRODUCTS

vendor:delta industrial automationmodel:wplsoftscope: - version: -

Trust: 3.5

vendor:deltamodel:industrial automation wplsoftscope: - version: -

Trust: 1.2

vendor:deltawwmodel:wplsoftscope:lteversion:2.45.0

Trust: 1.0

vendor:deltamodel:electronics wplsoftscope:lteversion:<=2.45.0

Trust: 0.8

vendor:deltamodel:industrial automation wplsoftscope:eqversion:*

Trust: 0.8

vendor:deltamodel:wplsoftscope:lteversion:2.45.0

Trust: 0.8

vendor:deltawwmodel:wplsoftscope:eqversion:2.45.0

Trust: 0.6

vendor:deltamodel:electronics inc wplsoftscope:eqversion:2.45.0

Trust: 0.3

vendor:deltamodel:electronics inc wplsoftscope:eqversion:2.42.11

Trust: 0.3

vendor:deltamodel:electronics inc wplsoftscope:eqversion:2.0

Trust: 0.3

vendor:deltamodel:electronics inc wplsoftscope:neversion:2.46.0

Trust: 0.3

sources: IVD: e3004f6e-39ab-11e9-a5a2-000c29342cb1 // IVD: e3000150-39ab-11e9-9ca4-000c29342cb1 // IVD: e4e1f909-5d49-466d-ac98-cdbbb329c50d // IVD: e8dd53be-8850-484e-ab8a-bc308c7f1c64 // IVD: e300285e-39ab-11e9-83a1-000c29342cb1 // ZDI: ZDI-17-705 // ZDI: ZDI-17-703 // ZDI: ZDI-17-704 // ZDI: ZDI-17-699 // ZDI: ZDI-17-702 // CNVD: CNVD-2017-22821 // CNVD: CNVD-2017-22824 // CNVD: CNVD-2018-03768 // BID: 103179 // JVNDB: JVNDB-2018-004571 // CNNVD: CNNVD-201803-768 // NVD: CVE-2018-7507

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2018-7507
value: MEDIUM

Trust: 2.1

ZDI: CVE-2018-7507
value: HIGH

Trust: 1.4

nvd@nist.gov: CVE-2018-7507
value: HIGH

Trust: 1.0

NVD: CVE-2018-7507
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-22821
value: HIGH

Trust: 0.6

CNVD: CNVD-2017-22824
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2018-03768
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201803-768
value: HIGH

Trust: 0.6

IVD: e3004f6e-39ab-11e9-a5a2-000c29342cb1
value: HIGH

Trust: 0.2

IVD: e3000150-39ab-11e9-9ca4-000c29342cb1
value: HIGH

Trust: 0.2

IVD: e4e1f909-5d49-466d-ac98-cdbbb329c50d
value: HIGH

Trust: 0.2

IVD: e8dd53be-8850-484e-ab8a-bc308c7f1c64
value: MEDIUM

Trust: 0.2

IVD: e300285e-39ab-11e9-83a1-000c29342cb1
value: MEDIUM

Trust: 0.2

VULMON: CVE-2018-7507
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-7507
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 3.3

ZDI: CVE-2018-7507
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.4

ZDI: CVE-2018-7507
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

CNVD: CNVD-2017-22821
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2017-22824
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2018-03768
severity: HIGH
baseScore: 9.7
vectorString: AV:N/AC:L/AU:N/C:P/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e3004f6e-39ab-11e9-a5a2-000c29342cb1
severity: HIGH
baseScore: 9.7
vectorString: AV:N/AC:L/AU:N/C:P/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: e3000150-39ab-11e9-9ca4-000c29342cb1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: e4e1f909-5d49-466d-ac98-cdbbb329c50d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: e8dd53be-8850-484e-ab8a-bc308c7f1c64
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: e300285e-39ab-11e9-83a1-000c29342cb1
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2018-7507
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e3004f6e-39ab-11e9-a5a2-000c29342cb1 // IVD: e3000150-39ab-11e9-9ca4-000c29342cb1 // IVD: e4e1f909-5d49-466d-ac98-cdbbb329c50d // IVD: e8dd53be-8850-484e-ab8a-bc308c7f1c64 // IVD: e300285e-39ab-11e9-83a1-000c29342cb1 // ZDI: ZDI-17-705 // ZDI: ZDI-17-703 // ZDI: ZDI-17-704 // ZDI: ZDI-17-699 // ZDI: ZDI-17-702 // CNVD: CNVD-2017-22821 // CNVD: CNVD-2017-22824 // CNVD: CNVD-2018-03768 // VULMON: CVE-2018-7507 // JVNDB: JVNDB-2018-004571 // CNNVD: CNNVD-201803-768 // NVD: CVE-2018-7507

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

problemtype:CWE-122

Trust: 1.0

sources: JVNDB: JVNDB-2018-004571 // NVD: CVE-2018-7507

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201803-768

TYPE

Buffer error

Trust: 0.8

sources: IVD: e3004f6e-39ab-11e9-a5a2-000c29342cb1 // CNNVD: CNNVD-201803-768

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-004571

PATCH

title:Delta Industrial Automation has issued an update to correct this vulnerability. This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.02/01/17 - ZDI disclosed reports to ICS-CERT02/07/17 - ICS-CERT provided ZDI with an ICS-VU # ICS-VU-97456803/16/17 - ICS-CERT asked ZDI questions about reproduction03/27/17 - ICS-CERT asked ZDI again some questions about reproduction06/07/17 - ICS-CERT offered ZDI a pre-release patch to test06/07/17 - ZDI replied that we cannot do the testing for the vendor07/20/17 - ZDI sent a mail to ICS-CERT asking the status07/26/17 - ICS-CERT advised that the vendor has a new version they believe addressed the reports (though to ZDI knowledge, no advisory was released)08/02/17 - ZDI advised ICS-CERT that our finder indicated that the vulnerabilities are still present08/11/17 - ZDI wrote ICS-CERT to indicate the intention to move these reports to 0-day on 8/24-- Mitigation:Given the nature of the vulnerability the only salient mitigation strategy is to restrict interaction with the application to trusted files.url:https://ics-cert.us-cert.gov/advisories/ICSA-18-058-02

Trust: 3.5

title:Top Pageurl:http://www.deltaww.com/

Trust: 0.8

title:Patch for Delta Industrial Automation WPLSoft dvp File Buffer Buffer Overflow Vulnerability (CNVD-2017-228214)url:https://www.cnvd.org.cn/patchInfo/show/143677

Trust: 0.6

title:Delta Industrial Automation WPLSoft dvp file heap buffer overflow vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/143683

Trust: 0.6

title:Patch for Delta Electronics WPLSoft Heap Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/119165

Trust: 0.6

title:Delta Electronics WPLSoft Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79354

Trust: 0.6

sources: ZDI: ZDI-17-705 // ZDI: ZDI-17-703 // ZDI: ZDI-17-704 // ZDI: ZDI-17-699 // ZDI: ZDI-17-702 // CNVD: CNVD-2017-22821 // CNVD: CNVD-2017-22824 // CNVD: CNVD-2018-03768 // JVNDB: JVNDB-2018-004571 // CNNVD: CNNVD-201803-768

EXTERNAL IDS

db:NVDid:CVE-2018-7507

Trust: 7.1

db:ICS CERTid:ICSA-18-058-02

Trust: 3.4

db:BIDid:103179

Trust: 2.0

db:ZDIid:ZDI-17-705

Trust: 1.3

db:ZDIid:ZDI-17-702

Trust: 1.3

db:CNVDid:CNVD-2017-22821

Trust: 1.0

db:CNVDid:CNVD-2017-22824

Trust: 1.0

db:CNVDid:CNVD-2018-03768

Trust: 0.8

db:CNNVDid:CNNVD-201803-768

Trust: 0.8

db:JVNDBid:JVNDB-2018-004571

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-4442

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-4436

Trust: 0.7

db:ZDIid:ZDI-17-703

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-4441

Trust: 0.7

db:ZDIid:ZDI-17-704

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-4439

Trust: 0.7

db:ZDIid:ZDI-17-699

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-4440

Trust: 0.7

db:IVDid:E3004F6E-39AB-11E9-A5A2-000C29342CB1

Trust: 0.2

db:IVDid:E3000150-39AB-11E9-9CA4-000C29342CB1

Trust: 0.2

db:IVDid:E4E1F909-5D49-466D-AC98-CDBBB329C50D

Trust: 0.2

db:IVDid:E8DD53BE-8850-484E-AB8A-BC308C7F1C64

Trust: 0.2

db:IVDid:E300285E-39AB-11E9-83A1-000C29342CB1

Trust: 0.2

db:VULMONid:CVE-2018-7507

Trust: 0.1

sources: IVD: e3004f6e-39ab-11e9-a5a2-000c29342cb1 // IVD: e3000150-39ab-11e9-9ca4-000c29342cb1 // IVD: e4e1f909-5d49-466d-ac98-cdbbb329c50d // IVD: e8dd53be-8850-484e-ab8a-bc308c7f1c64 // IVD: e300285e-39ab-11e9-83a1-000c29342cb1 // ZDI: ZDI-17-705 // ZDI: ZDI-17-703 // ZDI: ZDI-17-704 // ZDI: ZDI-17-699 // ZDI: ZDI-17-702 // CNVD: CNVD-2017-22821 // CNVD: CNVD-2017-22824 // CNVD: CNVD-2018-03768 // VULMON: CVE-2018-7507 // BID: 103179 // JVNDB: JVNDB-2018-004571 // CNNVD: CNNVD-201803-768 // NVD: CVE-2018-7507

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-058-02

Trust: 7.0

url:http://www.securityfocus.com/bid/103179

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7507

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-7507

Trust: 0.8

url:http://www.zerodayinitiative.com/advisories/zdi-17-702/

Trust: 0.6

url:http://www.zerodayinitiative.com/advisories/zdi-17-705/

Trust: 0.6

url:http://www.deltaww.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-17-705 // ZDI: ZDI-17-703 // ZDI: ZDI-17-704 // ZDI: ZDI-17-699 // ZDI: ZDI-17-702 // CNVD: CNVD-2017-22821 // CNVD: CNVD-2017-22824 // CNVD: CNVD-2018-03768 // VULMON: CVE-2018-7507 // BID: 103179 // JVNDB: JVNDB-2018-004571 // CNNVD: CNNVD-201803-768 // NVD: CVE-2018-7507

CREDITS

axt

Trust: 3.5

sources: ZDI: ZDI-17-705 // ZDI: ZDI-17-703 // ZDI: ZDI-17-704 // ZDI: ZDI-17-699 // ZDI: ZDI-17-702

SOURCES

db:IVDid:e3004f6e-39ab-11e9-a5a2-000c29342cb1
db:IVDid:e3000150-39ab-11e9-9ca4-000c29342cb1
db:IVDid:e4e1f909-5d49-466d-ac98-cdbbb329c50d
db:IVDid:e8dd53be-8850-484e-ab8a-bc308c7f1c64
db:IVDid:e300285e-39ab-11e9-83a1-000c29342cb1
db:ZDIid:ZDI-17-705
db:ZDIid:ZDI-17-703
db:ZDIid:ZDI-17-704
db:ZDIid:ZDI-17-699
db:ZDIid:ZDI-17-702
db:CNVDid:CNVD-2017-22821
db:CNVDid:CNVD-2017-22824
db:CNVDid:CNVD-2018-03768
db:VULMONid:CVE-2018-7507
db:BIDid:103179
db:JVNDBid:JVNDB-2018-004571
db:CNNVDid:CNNVD-201803-768
db:NVDid:CVE-2018-7507

LAST UPDATE DATE

2024-12-20T22:44:40.659000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-705date:2018-03-28T00:00:00
db:ZDIid:ZDI-17-703date:2018-03-28T00:00:00
db:ZDIid:ZDI-17-704date:2018-03-28T00:00:00
db:ZDIid:ZDI-17-699date:2018-03-28T00:00:00
db:ZDIid:ZDI-17-702date:2018-03-28T00:00:00
db:CNVDid:CNVD-2017-22821date:2018-11-05T00:00:00
db:CNVDid:CNVD-2017-22824date:2018-11-05T00:00:00
db:CNVDid:CNVD-2018-03768date:2018-11-05T00:00:00
db:VULMONid:CVE-2018-7507date:2019-10-09T00:00:00
db:BIDid:103179date:2018-02-27T00:00:00
db:JVNDBid:JVNDB-2018-004571date:2018-06-25T00:00:00
db:CNNVDid:CNNVD-201803-768date:2019-10-17T00:00:00
db:NVDid:CVE-2018-7507date:2024-11-21T04:12:15.890

SOURCES RELEASE DATE

db:IVDid:e3004f6e-39ab-11e9-a5a2-000c29342cb1date:2018-02-28T00:00:00
db:IVDid:e3000150-39ab-11e9-9ca4-000c29342cb1date:2017-08-25T00:00:00
db:IVDid:e4e1f909-5d49-466d-ac98-cdbbb329c50ddate:2017-08-25T00:00:00
db:IVDid:e8dd53be-8850-484e-ab8a-bc308c7f1c64date:2017-08-25T00:00:00
db:IVDid:e300285e-39ab-11e9-83a1-000c29342cb1date:2017-08-25T00:00:00
db:ZDIid:ZDI-17-705date:2017-08-24T00:00:00
db:ZDIid:ZDI-17-703date:2017-08-24T00:00:00
db:ZDIid:ZDI-17-704date:2017-08-24T00:00:00
db:ZDIid:ZDI-17-699date:2017-08-24T00:00:00
db:ZDIid:ZDI-17-702date:2017-08-24T00:00:00
db:CNVDid:CNVD-2017-22821date:2017-08-25T00:00:00
db:CNVDid:CNVD-2017-22824date:2017-08-25T00:00:00
db:CNVDid:CNVD-2018-03768date:2018-02-28T00:00:00
db:VULMONid:CVE-2018-7507date:2018-05-04T00:00:00
db:BIDid:103179date:2018-02-27T00:00:00
db:JVNDBid:JVNDB-2018-004571date:2018-06-25T00:00:00
db:CNNVDid:CNNVD-201803-768date:2018-03-22T00:00:00
db:NVDid:CVE-2018-7507date:2018-05-04T19:29:00.313