Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on December 12th, 2019 📆 | 5236 Views ⚑

0

Desigo PXC00-E.D Web Server HTTP Message denial of service


https://www.ispeech.org

CVSS Meta Temp Score Current Exploit Price (β‰ˆ) CTI Interest Score
3.5 $0-$5k 1.05+

A vulnerability was found in Desigo PXC00-E.D, PXC50-E.D, PXC100-E.D, PXC200-E.D, PXC00-U, PXC64-U, PXC128-U, PXA30-W0, PXA30-W1, PXA30-W2, PXC22.1-E.D, PXC36-E.D and PXC36.1-E.D. It has been rated as problematic. This issue affects an unknown part of the component Web Server. The manipulation as part of a HTTP Message leads to a denial of service vulnerability. Using CWE to declare the problem leads to CWE-472. Impacted is availability.

The weakness was shared 12/12/2019. The identification of this vulnerability is CVE-2019-13927 since 07/18/2019. The technical details are unknown and an exploit is not publicly available.

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Vendor

Name

VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.5

VulDB Base Score: β‰ˆ3.5
VulDB Temp Score: β‰ˆ3.5
VulDB Vector: πŸ”’
VulDB Reliability: πŸ”

VulDB Base Score: πŸ”’
VulDB Temp Score: πŸ”’
VulDB Reliability: πŸ”
Class: Denial of service (CWE-472)
Local: Yes
Remote: No

Availability: πŸ”’
Status: Not defined





Price Prediction: πŸ”
Current Price Estimation: πŸ”’


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: πŸ”
Adversaries: πŸ”
Geopolitics: πŸ”
Economy: πŸ”
Predictions: πŸ”
Remediation: πŸ”Recommended: no mitigation known

0-Day Time: πŸ”’

07/18/2019 CVE assigned
12/12/2019 +147 days Advisory disclosed
12/12/2019 +0 days VulDB entry created
12/12/2019 +0 days VulDB last update
CVE: CVE-2019-13927 (πŸ”’)Created: 12/12/2019 09:31 PM
Complete: πŸ”

Check our Alexa App!

https://vuldb.com/?id.147059

Tagged with: β€’ β€’ β€’ β€’ β€’



Comments are closed.