Skip to content
This repository was archived by the owner on May 14, 2024. It is now read-only.

Commit 0b9176b

Browse files
committed
new files
1 parent eeae2a6 commit 0b9176b

File tree

1,104 files changed

+17951
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,104 files changed

+17951
-0
lines changed

data/13/vu_608413/vu_608413.json

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
{
2+
"Author": "This document was written by [Unassigned].",
3+
"CAM_AttackerAccessRequired": "0",
4+
"CAM_EaseOfExploitation": "0",
5+
"CAM_Exploitation": "0",
6+
"CAM_Impact": "0",
7+
"CAM_InternetInfrastructure": "0",
8+
"CAM_Population": "0",
9+
"CAM_ScoreCurrent": 0,
10+
"CAM_ScoreCurrentWidelyKnown": 0,
11+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
12+
"CAM_WidelyKnown": "0",
13+
"CERTAdvisory": "",
14+
"CVEIDs": "",
15+
"CVSS_AccessComplexity": "--",
16+
"CVSS_AccessVector": "--",
17+
"CVSS_Authenication": "--",
18+
"CVSS_AvailabilityImpact": "--",
19+
"CVSS_BaseScore": 0,
20+
"CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--",
21+
"CVSS_CollateralDamagePotential": "ND",
22+
"CVSS_ConfidentialityImpact": "--",
23+
"CVSS_EnvironmentalScore": 0,
24+
"CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND",
25+
"CVSS_Exploitability": "ND",
26+
"CVSS_IntegrityImpact": "--",
27+
"CVSS_RemediationLevel": "ND",
28+
"CVSS_ReportConfidence": "ND",
29+
"CVSS_SecurityRequirementsAR": "ND",
30+
"CVSS_SecurityRequirementsCR": "ND",
31+
"CVSS_SecurityRequirementsIR": "ND",
32+
"CVSS_TargetDistribution": "ND",
33+
"CVSS_TemporalScore": 0,
34+
"CVSS_TemporalVector": "E:ND/RL:ND/RC:ND",
35+
"DateCreated": "2019-05-09T09:06:37-04:00",
36+
"DateFirstPublished": "",
37+
"DateLastUpdated": "2019-05-09T14:58:00-04:00",
38+
"DatePublic": "",
39+
"Description": "",
40+
"ID": "VU#608413",
41+
"IDNumber": "608413",
42+
"IPProtocol": "",
43+
"Impact": "The complete impact of this vulnerability is not yet known.",
44+
"Keywords": [
45+
"Jay Angus",
46+
"ICS-CERT",
47+
"Report #15"
48+
],
49+
"Overview": "",
50+
"References": "",
51+
"Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.",
52+
"Revision": 5,
53+
"SystemsAffectedPreamble": "",
54+
"ThanksAndCredit": "",
55+
"Title": "Neptune web page suffers from broken authentication",
56+
"US-CERTTechnicalAlert": "",
57+
"VRDA_D1_DirectReport": "0",
58+
"VRDA_D1_Impact": "",
59+
"VRDA_D1_Population": "",
60+
"VulnerabilityCount": 1,
61+
"Workarounds": ""
62+
}
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"Addendum": "There are no additional comments at this time.",
3+
"DateLastUpdated": "2018-12-13T08:35:00-05:00",
4+
"DateNotified": "2018-12-05T00:00:00",
5+
"DateResponded": "",
6+
"ID": "VU#756913",
7+
"Revision": 1,
8+
"Status": "Affected",
9+
"Vendor": "Pixar Animation Studios",
10+
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
11+
"VendorRecordID": "MOLR-B7EHXB",
12+
"VendorReferences": "None",
13+
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
14+
}

data/13/vu_756913/vu_756913.json

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
{
2+
"Author": "This document was written by Madison Oliver.",
3+
"CAM_AttackerAccessRequired": "0",
4+
"CAM_EaseOfExploitation": "0",
5+
"CAM_Exploitation": "0",
6+
"CAM_Impact": "0",
7+
"CAM_InternetInfrastructure": "0",
8+
"CAM_Population": "0",
9+
"CAM_ScoreCurrent": 0,
10+
"CAM_ScoreCurrentWidelyKnown": 0,
11+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
12+
"CAM_WidelyKnown": "0",
13+
"CERTAdvisory": "",
14+
"CVEIDs": "CVE-2018-5411",
15+
"CVSS_AccessComplexity": "L",
16+
"CVSS_AccessVector": "L",
17+
"CVSS_Authenication": "S",
18+
"CVSS_AvailabilityImpact": "P",
19+
"CVSS_BaseScore": 3.2,
20+
"CVSS_BaseVector": "AV:L/AC:L/Au:S/C:N/I:P/A:P",
21+
"CVSS_CollateralDamagePotential": "L",
22+
"CVSS_ConfidentialityImpact": "N",
23+
"CVSS_EnvironmentalScore": 0.81340236580705,
24+
"CVSS_EnvironmentalVector": "CDP:L/TD:L/CR:ND/IR:ND/AR:ND",
25+
"CVSS_Exploitability": "POC",
26+
"CVSS_IntegrityImpact": "P",
27+
"CVSS_RemediationLevel": "OF",
28+
"CVSS_ReportConfidence": "C",
29+
"CVSS_SecurityRequirementsAR": "ND",
30+
"CVSS_SecurityRequirementsCR": "ND",
31+
"CVSS_SecurityRequirementsIR": "ND",
32+
"CVSS_TargetDistribution": "L",
33+
"CVSS_TemporalScore": 2.5,
34+
"CVSS_TemporalVector": "E:POC/RL:OF/RC:C",
35+
"DateCreated": "2018-08-20T08:47:03-04:00",
36+
"DateFirstPublished": "2018-12-13T09:12:46-05:00",
37+
"DateLastUpdated": "2019-01-28T12:04:00-05:00",
38+
"DatePublic": "2018-12-12T00:00:00",
39+
"Description": "Pixar's Tractor software, versions 2.2 and earlier, contain a stored cross-site scripting vulnerability (CWE-79) in the field that allows a user to add a note to an existing node. The stored information is displayed when a user requests information about the node. An attacker could insert JavaScript into this note field that is then saved and displayed to the end user.",
40+
"ID": "VU#756913",
41+
"IDNumber": "756913",
42+
"IPProtocol": "",
43+
"Impact": "An authenticated attacker might include JavaScript that could execute on an authenticated user's system, which could lead to website redirects, session cookie hijacking, social engineering, and other impacts. Since the attacker's script is stored with the information about the node, all other users with access to this data are also vulnerable.",
44+
"Keywords": [
45+
"Pixar",
46+
"Tractor",
47+
"rendering software",
48+
"stored XSS",
49+
"CVE-2018-5411"
50+
],
51+
"Overview": "Pixar's Tractor network rendering software is vulnerable to stored cross-site scripting which may allow an attacker to execute arbitrary JavaScript.",
52+
"References": [
53+
"https://cwe.mitre.org/data/definitions/79.html",
54+
"https://renderman.pixar.com/product/tractor"
55+
],
56+
"Resolution": "Apply an update\nPixar has released an updated version of this software that addresses this vulnerability, Tractor version 2.3 (build 1923604). Affected users should update to this version.",
57+
"Revision": 55,
58+
"SystemsAffectedPreamble": "",
59+
"ThanksAndCredit": "Thanks to the reporter who wishes to remain anonymous.",
60+
"Title": "Pixar Tractor contains a stored cross-site scripting vulnerability",
61+
"US-CERTTechnicalAlert": "",
62+
"VRDA_D1_DirectReport": "1",
63+
"VRDA_D1_Impact": "",
64+
"VRDA_D1_Population": "1",
65+
"VulnerabilityCount": 1,
66+
"Workarounds": ""
67+
}

data/15/vu_171515/vu_171515.json

Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
{
2+
"Author": "This document was written by [Unassigned].",
3+
"CAM_AttackerAccessRequired": "0",
4+
"CAM_EaseOfExploitation": "0",
5+
"CAM_Exploitation": "0",
6+
"CAM_Impact": "0",
7+
"CAM_InternetInfrastructure": "0",
8+
"CAM_Population": "0",
9+
"CAM_ScoreCurrent": 0,
10+
"CAM_ScoreCurrentWidelyKnown": 0,
11+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
12+
"CAM_WidelyKnown": "0",
13+
"CERTAdvisory": "",
14+
"CVEIDs": "CVE-2019-8563",
15+
"CVSS_AccessComplexity": "--",
16+
"CVSS_AccessVector": "--",
17+
"CVSS_Authenication": "--",
18+
"CVSS_AvailabilityImpact": "--",
19+
"CVSS_BaseScore": 0,
20+
"CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--",
21+
"CVSS_CollateralDamagePotential": "ND",
22+
"CVSS_ConfidentialityImpact": "--",
23+
"CVSS_EnvironmentalScore": 0,
24+
"CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND",
25+
"CVSS_Exploitability": "ND",
26+
"CVSS_IntegrityImpact": "--",
27+
"CVSS_RemediationLevel": "ND",
28+
"CVSS_ReportConfidence": "ND",
29+
"CVSS_SecurityRequirementsAR": "ND",
30+
"CVSS_SecurityRequirementsCR": "ND",
31+
"CVSS_SecurityRequirementsIR": "ND",
32+
"CVSS_TargetDistribution": "ND",
33+
"CVSS_TemporalScore": 0,
34+
"CVSS_TemporalVector": "E:ND/RL:ND/RC:ND",
35+
"DateCreated": "2019-03-08T11:02:41-05:00",
36+
"DateFirstPublished": "",
37+
"DateLastUpdated": "2019-03-28T11:32:00-04:00",
38+
"DatePublic": "",
39+
"Description": "",
40+
"ID": "VU#171515",
41+
"IDNumber": "171515",
42+
"IPProtocol": "",
43+
"Impact": "The complete impact of this vulnerability is not yet known.",
44+
"Keywords": "",
45+
"Overview": "",
46+
"References": "",
47+
"Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.",
48+
"Revision": 6,
49+
"SystemsAffectedPreamble": "",
50+
"ThanksAndCredit": "",
51+
"Title": "Array unshift/shift should not race against the AI in the compiler thread",
52+
"US-CERTTechnicalAlert": "",
53+
"VRDA_D1_DirectReport": "0",
54+
"VRDA_D1_Impact": "",
55+
"VRDA_D1_Population": "",
56+
"VulnerabilityCount": 1,
57+
"Workarounds": ""
58+
}
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"Addendum": "",
3+
"DateLastUpdated": "2019-04-08T17:39:00-04:00",
4+
"DateNotified": "2019-01-25T14:32:49-05:00",
5+
"DateResponded": "",
6+
"ID": "VU#174715",
7+
"Revision": 5,
8+
"Status": "Affected",
9+
"Vendor": "AutoMobility Distribution Inc",
10+
"VendorInformation": "MyCar is one of AutoMobility Distribution's brands.",
11+
"VendorRecordID": "TNOY-BADKZB",
12+
"VendorReferences": "https://mycarcontrols.com/",
13+
"VendorStatement": "On behalf of the ownership of MyCar Controls, We have been made aware of a vulnerability issue in our systems late in January 2019. Since then, all the resources at our disposal have been used to promptly address the situation, and we have fully resolved the issue. During this vulnerability period, no actual incident or issue with compromised privacy or functionality has been reported to us or detected by our systems. Rest assured, the entire organization is focused on making our product the most secure and versatile product in the remote starter industry. Passion, hard work and accountability will always be the hallmarks of our organization. We thank you for your understanding and continued support. The AutoMobility Management Team"
14+
}

data/15/vu_174715/vu_174715.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"Author": "This document was written by Trent Novelly.",
3+
"CAM_AttackerAccessRequired": "0",
4+
"CAM_EaseOfExploitation": "0",
5+
"CAM_Exploitation": "0",
6+
"CAM_Impact": "0",
7+
"CAM_InternetInfrastructure": "0",
8+
"CAM_Population": "0",
9+
"CAM_ScoreCurrent": 0,
10+
"CAM_ScoreCurrentWidelyKnown": 0,
11+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
12+
"CAM_WidelyKnown": "0",
13+
"CERTAdvisory": "",
14+
"CVEIDs": "CVE-2019-9493 ",
15+
"CVSS_AccessComplexity": "L",
16+
"CVSS_AccessVector": "N",
17+
"CVSS_Authenication": "N",
18+
"CVSS_AvailabilityImpact": "P",
19+
"CVSS_BaseScore": 7.5,
20+
"CVSS_BaseVector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
21+
"CVSS_CollateralDamagePotential": "L",
22+
"CVSS_ConfidentialityImpact": "P",
23+
"CVSS_EnvironmentalScore": 1.56860981566523,
24+
"CVSS_EnvironmentalVector": "CDP:L/TD:L/CR:ND/IR:ND/AR:ND",
25+
"CVSS_Exploitability": "POC",
26+
"CVSS_IntegrityImpact": "P",
27+
"CVSS_RemediationLevel": "OF",
28+
"CVSS_ReportConfidence": "C",
29+
"CVSS_SecurityRequirementsAR": "ND",
30+
"CVSS_SecurityRequirementsCR": "ND",
31+
"CVSS_SecurityRequirementsIR": "ND",
32+
"CVSS_TargetDistribution": "L",
33+
"CVSS_TemporalScore": 5.9,
34+
"CVSS_TemporalVector": "E:POC/RL:OF/RC:C",
35+
"DateCreated": "2019-01-23T14:06:13-05:00",
36+
"DateFirstPublished": "2019-04-08T17:16:02-04:00",
37+
"DateLastUpdated": "2019-04-12T10:05:00-04:00",
38+
"DatePublic": "2019-04-08T00:00:00",
39+
"Description": "MyCar is a small aftermarket telematics unit from AutoMobility Distribution Inc. MyCar add smartphone-controlled geolocation, remote start/stop and lock/unlock capabilities to a vehicle with a compatible remote start unit. The MyCar Controls mobile application contains hard-coded admin credentials (CWE-798) which can be used in place of a user's username and password to communicate with the server endpoint for a target user's account. This vulnerability affects versions prior to 3.4.24 on iOS and prior to 4.1.2 on Android.",
40+
"ID": "VU#174715",
41+
"IDNumber": "174715",
42+
"IPProtocol": "",
43+
"Impact": "A remote un-authenticated attacker may be able to send commands to and retrieve data from a target MyCar unit. This may allow the attacker to learn the location of a target, or gain unauthorized physical access to a vehicle.",
44+
"Keywords": "IoT",
45+
"Overview": "The MyCar Controls mobile applications prior to v3.4.24 on iOS and prior to v4.1.2 on Android contains hard-coded admin credentials.",
46+
"References": [
47+
"https://mycarcontrols.com/",
48+
"https://cwe.mitre.org/data/definitions/798.html",
49+
"https://itunes.apple.com/us/app/mycar-controls/id1126511815",
50+
"https://play.google.com/store/apps/details?id=app.com.automobility.mycar.control"
51+
],
52+
"Resolution": "Update Phone App\nAutoMobility has updated their mobile apps to remove the hard coded credentials. On iOS the updated version is v3.4.24, and on Android the updated version is v4.1.2. Additionally the admin credentials in old versions of the mobile application have been revoked.",
53+
"Revision": 19,
54+
"SystemsAffectedPreamble": "The MyCar unit and corresponding mobile application may be rebranded and sold by other vendors as something other than MyCar. Other brands include: Carlink\nLinkr\nVisions MyCar\nMyCar Kia\nThese brands have also been updated.",
55+
"ThanksAndCredit": "Thanks to Jmaxxz for reporting this vulnerability.",
56+
"Title": "MyCar Controls uses hard-coded credentials",
57+
"US-CERTTechnicalAlert": "",
58+
"VRDA_D1_DirectReport": "1",
59+
"VRDA_D1_Impact": "",
60+
"VRDA_D1_Population": "",
61+
"VulnerabilityCount": 1,
62+
"Workarounds": ""
63+
}
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"Addendum": "There are no additional comments at this time.",
3+
"DateLastUpdated": "2018-12-20T10:11:00-05:00",
4+
"DateNotified": "2018-12-19T00:00:00",
5+
"DateResponded": "",
6+
"ID": "VU#741315",
7+
"Revision": 2,
8+
"Status": "Affected",
9+
"Vendor": "MooseFS",
10+
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
11+
"VendorRecordID": "MOLR-B7MKS6",
12+
"VendorReferences": "None",
13+
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
14+
}
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"Addendum": "There are no additional comments at this time.",
3+
"DateLastUpdated": "2018-12-20T10:12:00-05:00",
4+
"DateNotified": "2018-12-19T00:00:00",
5+
"DateResponded": "",
6+
"ID": "VU#741315",
7+
"Revision": 1,
8+
"Status": "Affected",
9+
"Vendor": "Atmo O",
10+
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
11+
"VendorRecordID": "MOLR-B7MKTW",
12+
"VendorReferences": "None",
13+
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
14+
}
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"Addendum": "There are no additional comments at this time.",
3+
"DateLastUpdated": "2018-12-20T10:12:00-05:00",
4+
"DateNotified": "2018-12-19T00:00:00",
5+
"DateResponded": "",
6+
"ID": "VU#741315",
7+
"Revision": 1,
8+
"Status": "Affected",
9+
"Vendor": "fuse-nfs",
10+
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
11+
"VendorRecordID": "MOLR-B7MKU8",
12+
"VendorReferences": "None",
13+
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
14+
}
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"Addendum": "There are no additional comments at this time.",
3+
"DateLastUpdated": "2018-12-20T10:13:00-05:00",
4+
"DateNotified": "2018-12-19T00:00:00",
5+
"DateResponded": "",
6+
"ID": "VU#741315",
7+
"Revision": 1,
8+
"Status": "Affected",
9+
"Vendor": "RedFS",
10+
"VendorInformation": "We are not aware of further vendor information regarding this vulnerability.",
11+
"VendorRecordID": "MOLR-B7MKUJ",
12+
"VendorReferences": "None",
13+
"VendorStatement": "No statement is currently available from the vendor regarding this vulnerability."
14+
}

0 commit comments

Comments
 (0)