Skip to content
This repository was archived by the owner on May 14, 2024. It is now read-only.

Commit ce41dae

Browse files
committed
new vul reports since last update
1 parent e7707fd commit ce41dae

File tree

74 files changed

+4920
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

74 files changed

+4920
-0
lines changed

data/0/vu_369800/vu_369800.json

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
{
2+
"Impact": "By causing an application to process a malformed ICC profile, a remote, unauthenticated attacker may be able to cause arbitrary code execution with the privileges of the application that uses the Little CMS library. Exploitability of the vulnerability depends on how the application uses liblcms2 and what capabilities are exposed to an attacker.",
3+
"CVSS_SecurityRequirementsIR": "ND",
4+
"CVSS_EnvironmentalVector": "CDP:ND/TD:H/CR:ND/IR:ND/AR:ND",
5+
"Title": "Little CMS 2 DefaultICCintents double-free vulnerability",
6+
"DateFirstPublished": "2016-05-04T13:31:33-04:00",
7+
"CVSS_AccessVector": "N",
8+
"CAM_ScoreCurrentWidelyKnown": 0,
9+
"IDNumber": "369800",
10+
"SystemsAffectedPreamble": "",
11+
"CVSS_SecurityRequirementsCR": "ND",
12+
"CVSS_Authenication": "N",
13+
"CVSS_BaseScore": 10,
14+
"CAM_EaseOfExploitation": "0",
15+
"IPProtocol": "",
16+
"CERTAdvisory": "",
17+
"CVSS_CollateralDamagePotential": "ND",
18+
"Revision": 17,
19+
"CVEIDs": "CVE-2013-7455",
20+
"VRDA_D1_DirectReport": "1",
21+
"CAM_WidelyKnown": "0",
22+
"CAM_Population": "0",
23+
"Description": "Little CMS is an open-source color management engine that supports the International Color Consortium (ICC) standard. Little CMS 2.5 and earlier 2.x versions (liblcms2) contain a double-free vulnerability in the DefaultICCintents() function, which is provided in cmscnvrt.c. When the \"Lut\" cmsPipeline object is freed more than once, this can result in an exploitable memory corruption situation. Although this issue was addressed in 2013, it was not assigned a CVE identifier at that time. Because of this, some vendors may not have upgraded liblcms2 to a version that contains the fix for this vulnerability.",
24+
"CVSS_AccessComplexity": "L",
25+
"CVSS_SecurityRequirementsAR": "ND",
26+
"Resolution": "Apply an update This issue is resolved in Little CMS 2.6. Please check with your vendor for update availability.",
27+
"Author": "This document was written by Will Dormann.",
28+
"CAM_Exploitation": "0",
29+
"DateLastUpdated": "2016-05-10T09:38:00-04:00",
30+
"CVSS_IntegrityImpact": "C",
31+
"VRDA_D1_Population": "4",
32+
"CVSS_TemporalVector": "E:U/RL:OF/RC:C",
33+
"CVSS_ReportConfidence": "C",
34+
"CVSS_ConfidentialityImpact": "C",
35+
"CVSS_BaseVector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
36+
"VulnerabilityCount": 1,
37+
"CVSS_Exploitability": "U",
38+
"ThanksAndCredit": "This vulnerability was corrected in 2013 by Marti Maria, and was independently discovered by Will Dormann of the CERT/CC.",
39+
"US-CERTTechnicalAlert": "",
40+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
41+
"CVSS_TemporalScore": 7.4,
42+
"VRDA_D1_Impact": "4",
43+
"CVSS_TargetDistribution": "H",
44+
"CAM_InternetInfrastructure": "0",
45+
"CVSS_RemediationLevel": "OF",
46+
"Workarounds": "",
47+
"ID": "VU#369800",
48+
"CVSS_AvailabilityImpact": "C",
49+
"CAM_ScoreCurrent": 0,
50+
"Overview": "Little CMS 2 contains a double-free vulnerability in the DefaultICCintents function, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.",
51+
"CAM_Impact": "0",
52+
"DatePublic": "2013-07-10T00:00:00",
53+
"DateCreated": "2016-04-29T14:45:06-04:00",
54+
"References": [
55+
"http://www.littlecms.com/",
56+
"https://github.com/mm2/Little-CMS/commit/fefaaa43c382eee632ea3ad0cfa915335140e1db#diff-189a94f0a7a47efdd43f5567e27a973b",
57+
"https://penteston.com/OSVDB-105462",
58+
"http://www.ubuntu.com/usn/usn-2961-1/"
59+
],
60+
"Keywords": [
61+
"lcms2",
62+
"liblcms2",
63+
"icc"
64+
],
65+
"CVSS_EnvironmentalScore": 7.39092884544,
66+
"CAM_AttackerAccessRequired": "0"
67+
}

data/11/vu_117111/vu_117111.json

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
{
2+
"Impact": "A remote unauthenticated attacker may be able to gain root access to the device.",
3+
"CVSS_SecurityRequirementsIR": "ND",
4+
"CVSS_EnvironmentalVector": "CDP:ND/TD:L/CR:ND/IR:ND/AR:ND",
5+
"Title": "Nanometrics Taurus Digital Seismograph contains multiple vulnerabilities",
6+
"DateFirstPublished": "",
7+
"CVSS_AccessVector": "N",
8+
"CAM_ScoreCurrentWidelyKnown": 0,
9+
"IDNumber": "117111",
10+
"SystemsAffectedPreamble": "",
11+
"CVSS_SecurityRequirementsCR": "ND",
12+
"CVSS_Authenication": "N",
13+
"CVSS_BaseScore": 10,
14+
"CAM_EaseOfExploitation": "0",
15+
"IPProtocol": "",
16+
"CERTAdvisory": "",
17+
"CVSS_CollateralDamagePotential": "ND",
18+
"Revision": 18,
19+
"CVEIDs": [
20+
"CVE-2014-6271",
21+
"CVE-2016-5656"
22+
],
23+
"VRDA_D1_DirectReport": "1",
24+
"CAM_WidelyKnown": "0",
25+
"CAM_Population": "0",
26+
"Description": "CVE-2014-6271 - CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') According to the reporter, the Nanometrics Taurus Digital Seismograph contains an older version of bash that is vulnerable to the \"Shellshock\" vulnerability. An attacker may be able to use this vulnerability to execute arbitrary commands on the device. The reporter states it is possible to use custom shell commands to upload new firmware to the device. CVE-2016-5656 - CWE-798: Use of Hard-coded Credentials According to the reporter, the Nanometrics Taurus Digital Seismograph contains several hard-coded credentials, and a hard-coded root password. The CERT/CC has been unable to confirm this information with the vendor as of the publication date.",
27+
"CVSS_AccessComplexity": "L",
28+
"CVSS_SecurityRequirementsAR": "ND",
29+
"Resolution": "The CERT/CC is currently unaware of a full solution to this problem. Affected users may consider the following workaround:",
30+
"Author": "This document was written by Garret Wassermann.",
31+
"CAM_Exploitation": "0",
32+
"DateLastUpdated": "2016-07-19T15:10:00-04:00",
33+
"CVSS_IntegrityImpact": "C",
34+
"VRDA_D1_Population": "1",
35+
"CVSS_TemporalVector": "E:F/RL:U/RC:UR",
36+
"CVSS_ReportConfidence": "UR",
37+
"CVSS_ConfidentialityImpact": "C",
38+
"CVSS_BaseVector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
39+
"VulnerabilityCount": 2,
40+
"CVSS_Exploitability": "F",
41+
"ThanksAndCredit": "Thanks to Bertin Bervis for reporting this vulnerability.",
42+
"US-CERTTechnicalAlert": "",
43+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
44+
"CVSS_TemporalScore": 9,
45+
"VRDA_D1_Impact": "3",
46+
"CVSS_TargetDistribution": "L",
47+
"CAM_InternetInfrastructure": "0",
48+
"CVSS_RemediationLevel": "U",
49+
"Workarounds": "Restrict Network Access As a general good security practice, only allow connections from trusted hosts and networks. Consult your firewall product's manual for more information.",
50+
"ID": "VU#117111",
51+
"CVSS_AvailabilityImpact": "C",
52+
"CAM_ScoreCurrent": 0,
53+
"Overview": "The Nanometrics Taurus Digital Seismograph has been reported to be vulnerable to CVE-2014-6271 (the \"Shellshock\" vulnerability), and contain several hard-coded credentials.",
54+
"CAM_Impact": "0",
55+
"DatePublic": "2016-07-26T00:00:00",
56+
"DateCreated": "2016-07-06T14:45:06-04:00",
57+
"References": [
58+
"http://cwe.mitre.org/data/definitions/78.html",
59+
"http://cwe.mitre.org/data/definitions/798.html"
60+
],
61+
"Keywords": [
62+
"shellshock",
63+
"bash",
64+
"hard-coded"
65+
],
66+
"CVSS_EnvironmentalScore": 2.2550078712,
67+
"CAM_AttackerAccessRequired": "0"
68+
}

data/11/vu_696611/vu_696611.json

Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
{
2+
"Impact": "The complete impact of this vulnerability is not yet known.",
3+
"CVSS_SecurityRequirementsIR": "ND",
4+
"CVSS_EnvironmentalVector": "CDP:ND/TD:H/CR:ND/IR:ND/AR:ND",
5+
"Title": "TCP off-path info leak",
6+
"DateFirstPublished": "",
7+
"CVSS_AccessVector": "--",
8+
"CAM_ScoreCurrentWidelyKnown": 0,
9+
"IDNumber": "696611",
10+
"SystemsAffectedPreamble": "",
11+
"CVSS_SecurityRequirementsCR": "ND",
12+
"CVSS_Authenication": "--",
13+
"CVSS_BaseScore": 0,
14+
"CAM_EaseOfExploitation": "0",
15+
"IPProtocol": "",
16+
"CERTAdvisory": "",
17+
"CVSS_CollateralDamagePotential": "ND",
18+
"Revision": 3,
19+
"CVEIDs": "",
20+
"VRDA_D1_DirectReport": "0",
21+
"CAM_WidelyKnown": "0",
22+
"CAM_Population": "0",
23+
"Description": "",
24+
"CVSS_AccessComplexity": "--",
25+
"CVSS_SecurityRequirementsAR": "ND",
26+
"Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.",
27+
"Author": "This document was written by [Unassigned].",
28+
"CAM_Exploitation": "0",
29+
"DateLastUpdated": "2016-08-29T14:35:00-04:00",
30+
"CVSS_IntegrityImpact": "--",
31+
"VRDA_D1_Population": "4",
32+
"CVSS_TemporalVector": "E:ND/RL:ND/RC:ND",
33+
"CVSS_ReportConfidence": "ND",
34+
"CVSS_ConfidentialityImpact": "--",
35+
"CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--",
36+
"VulnerabilityCount": 1,
37+
"CVSS_Exploitability": "ND",
38+
"ThanksAndCredit": "",
39+
"US-CERTTechnicalAlert": "",
40+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
41+
"CVSS_TemporalScore": 0,
42+
"VRDA_D1_Impact": "4",
43+
"CVSS_TargetDistribution": "H",
44+
"CAM_InternetInfrastructure": "0",
45+
"CVSS_RemediationLevel": "ND",
46+
"Workarounds": "",
47+
"ID": "VU#696611",
48+
"CVSS_AvailabilityImpact": "--",
49+
"CAM_ScoreCurrent": 0,
50+
"Overview": "",
51+
"CAM_Impact": "0",
52+
"DatePublic": "",
53+
"DateCreated": "2016-08-16T17:29:58-04:00",
54+
"References": "",
55+
"Keywords": "",
56+
"CVSS_EnvironmentalScore": 0,
57+
"CAM_AttackerAccessRequired": "0"
58+
}

data/15/vu_332115/vu_332115.json

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
{
2+
"Impact": "This function allows a buffer overflow condition in which arbitrary code may be executed. The impact may vary depending on if the use case is local or remote.",
3+
"CVSS_SecurityRequirementsIR": "ND",
4+
"CVSS_EnvironmentalVector": "CDP:ND/TD:M/CR:ND/IR:ND/AR:ND",
5+
"Title": "D-Link routers contain buffer overflow vulnerability",
6+
"DateFirstPublished": "2016-08-11T13:49:56-04:00",
7+
"CVSS_AccessVector": "N",
8+
"CAM_ScoreCurrentWidelyKnown": 0,
9+
"IDNumber": "332115",
10+
"SystemsAffectedPreamble": "",
11+
"CVSS_SecurityRequirementsCR": "ND",
12+
"CVSS_Authenication": "N",
13+
"CVSS_BaseScore": 9.3,
14+
"CAM_EaseOfExploitation": "0",
15+
"IPProtocol": "",
16+
"CERTAdvisory": "",
17+
"CVSS_CollateralDamagePotential": "ND",
18+
"Revision": 17,
19+
"CVEIDs": "CVE-2016-5681",
20+
"VRDA_D1_DirectReport": "1",
21+
"CAM_WidelyKnown": "0",
22+
"CAM_Population": "0",
23+
"Description": "CWE-121: Stack-based Buffer Overflow - CVE-2016-5681 A stack-based buffer overflow occurs in the function within the cgibin binary which validates the session cookie. This function is used by a service which is exposed to the WAN network on port 8181 by default. CVE-2016-5681 has been confirmed to affect: DIR-850L B1\nDIR-822 A1\nDIR-823 A1\nDIR-895L A1\nDIR-890L A1\nDIR-885L A1\nDIR-880L A1\nDIR-868L B1\nDIR-868L C1\nDIR-817L(W)\nDIR-818L(W)",
24+
"CVSS_AccessComplexity": "M",
25+
"CVSS_SecurityRequirementsAR": "ND",
26+
"Resolution": "Apply Updates D-Link has provided firmware updates for the affected devices. Please see their public advisory for links to the updated firmware.",
27+
"Author": "This document was written by Trent Novelly.",
28+
"CAM_Exploitation": "0",
29+
"DateLastUpdated": "2016-08-29T14:38:00-04:00",
30+
"CVSS_IntegrityImpact": "C",
31+
"VRDA_D1_Population": "2",
32+
"CVSS_TemporalVector": "E:POC/RL:ND/RC:C",
33+
"CVSS_ReportConfidence": "C",
34+
"CVSS_ConfidentialityImpact": "C",
35+
"CVSS_BaseVector": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
36+
"VulnerabilityCount": 1,
37+
"CVSS_Exploitability": "POC",
38+
"ThanksAndCredit": "Thanks to Daniel Romero @daniel_rome (NCC Group) for reporting this vulnerability.",
39+
"US-CERTTechnicalAlert": "",
40+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
41+
"CVSS_TemporalScore": 8.4,
42+
"VRDA_D1_Impact": "2",
43+
"CVSS_TargetDistribution": "M",
44+
"CAM_InternetInfrastructure": "0",
45+
"CVSS_RemediationLevel": "ND",
46+
"Workarounds": "Restrict Access As a general good security practice, only allow connections from trusted hosts and networks",
47+
"ID": "VU#332115",
48+
"CVSS_AvailabilityImpact": "C",
49+
"CAM_ScoreCurrent": 0,
50+
"Overview": "D-Link DIR routers contain a stack-based buffer overflow vulnerability, which may allow a remote attack to execute arbitrary code.",
51+
"CAM_Impact": "0",
52+
"DatePublic": "2016-08-11T00:00:00",
53+
"DateCreated": "2016-08-05T15:39:43-04:00",
54+
"References": [
55+
"https://cwe.mitre.org/data/definitions/121.html",
56+
"http://support.dlink.com/",
57+
"http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10063"
58+
],
59+
"Keywords": [
60+
"dlink",
61+
"router",
62+
"stack buffer overflow",
63+
"CWE-121"
64+
],
65+
"CVSS_EnvironmentalScore": 6.299215776,
66+
"CAM_AttackerAccessRequired": "0"
67+
}

data/16/vu_735416/vu_735416.json

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
{
2+
"Impact": "A remote, unauthenticated attacker may induce a default-configured repeater to initiate connections to arbitrary hosts and services.",
3+
"CVSS_SecurityRequirementsIR": "ND",
4+
"CVSS_EnvironmentalVector": "CDP:ND/TD:L/CR:ND/IR:ND/AR:ND",
5+
"Title": "UltraVNC repeater does not restrict IP addresses or ports by default",
6+
"DateFirstPublished": "2016-08-08T10:01:36-04:00",
7+
"CVSS_AccessVector": "N",
8+
"CAM_ScoreCurrentWidelyKnown": 0,
9+
"IDNumber": "735416",
10+
"SystemsAffectedPreamble": "",
11+
"CVSS_SecurityRequirementsCR": "ND",
12+
"CVSS_Authenication": "N",
13+
"CVSS_BaseScore": 5,
14+
"CAM_EaseOfExploitation": "0",
15+
"IPProtocol": "",
16+
"CERTAdvisory": "",
17+
"CVSS_CollateralDamagePotential": "ND",
18+
"Revision": 22,
19+
"CVEIDs": "CVE-2016-5673",
20+
"VRDA_D1_DirectReport": "1",
21+
"CAM_WidelyKnown": "0",
22+
"CAM_Population": "0",
23+
"Description": "CWE-16: Configuration - CVE-2016-5673 UltraVNC repeater acts as a proxy to route remote desktop VNC connections. IP addresses are not restricted in default configurations, and ports cannot be selectively restricted. Consequently, in a default installation, a repeater can be caused to initiate connections to arbitrary hosts using any port. To initiate a connection to a common web service, for instance, an attacker may request a connection to <IP>::<80><padding>, where padding consists of null bytes and the request length is 250 bytes.",
24+
"CVSS_AccessComplexity": "L",
25+
"CVSS_SecurityRequirementsAR": "ND",
26+
"Resolution": "Update repeater configuration New installations of UltraVNC repeater now default to restricting access to all IP addresses and support more granular port restrictions. Existing installations should consider updating to ultravnc_repeater_1300, review the vendor's advisory, and make modifications as appropriate: \"WARNING:\u00a0 In MODE I the repeater works like a proxy.\u00a0 If you don't limit the destination and or ports your repeater can be used to connect to all ip adresses and all ports that can be reached from the repeater. You need to restrict the ip addreses and ports to prevent unwanted access.\"",
27+
"Author": "This document was written by Joel Land.",
28+
"CAM_Exploitation": "0",
29+
"DateLastUpdated": "2016-08-09T15:10:00-04:00",
30+
"CVSS_IntegrityImpact": "P",
31+
"VRDA_D1_Population": "1",
32+
"CVSS_TemporalVector": "E:POC/RL:OF/RC:C",
33+
"CVSS_ReportConfidence": "C",
34+
"CVSS_ConfidentialityImpact": "N",
35+
"CVSS_BaseVector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
36+
"VulnerabilityCount": 1,
37+
"CVSS_Exploitability": "POC",
38+
"ThanksAndCredit": "Thanks to Yonathan Klijnsma and Dan Tentler for reporting this vulnerability.",
39+
"US-CERTTechnicalAlert": "",
40+
"CAM_ScoreCurrentWidelyKnownExploited": 0,
41+
"CVSS_TemporalScore": 3.9,
42+
"VRDA_D1_Impact": "2",
43+
"CVSS_TargetDistribution": "L",
44+
"CAM_InternetInfrastructure": "0",
45+
"CVSS_RemediationLevel": "OF",
46+
"Workarounds": "",
47+
"ID": "VU#735416",
48+
"CVSS_AvailabilityImpact": "N",
49+
"CAM_ScoreCurrent": 0,
50+
"Overview": "UltraVNC repeater versions prior to ultravnc_repeater_1300 do not restrict usage by IP address by default and cannot restrict by ports, which may be leveraged to induce connections to arbitrary hosts using any port.",
51+
"CAM_Impact": "0",
52+
"DatePublic": "2016-08-06T00:00:00",
53+
"DateCreated": "2016-04-21T12:44:28-04:00",
54+
"References": [
55+
"https://cwe.mitre.org/data/definitions/16.html",
56+
"http://www.uvnc.com/products/uvnc-repeater.html",
57+
"http://www.uvnc.com/downloads/repeater/83-repeater-downloads.html"
58+
],
59+
"Keywords": [
60+
"ultravnc",
61+
"uvnc",
62+
"repeater",
63+
"default",
64+
"configuration"
65+
],
66+
"CVSS_EnvironmentalScore": 0.97061680674,
67+
"CAM_AttackerAccessRequired": "0"
68+
}

0 commit comments

Comments
 (0)