Refine your search
7 vulnerabilities found for WNC01WH firmware by BUFFALO INC.
jvndb-2017-000072
Vulnerability from jvndb
Published
2017-04-21 13:44
Modified
2017-06-01 13:53
Severity ?
Summary
WNC01WH vulnerable to OS command injection
Details
WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains an OS command injection vulnerability (CWE-78).
Kiyotaka ATSUMI of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000072.html",
"dc:date": "2017-06-01T13:53+09:00",
"dcterms:issued": "2017-04-21T13:44+09:00",
"dcterms:modified": "2017-06-01T13:53+09:00",
"description": "WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains an OS command injection vulnerability (CWE-78).\r\n\r\nKiyotaka ATSUMI of LAC Co., Ltd. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000072.html",
"sec:cpe": {
"#text": "cpe:/o:buffalo_inc:wnc01wh_firmware",
"@product": "WNC01WH firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
"sec:cvss": [
{
"@score": "5.2",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
"@version": "2.0"
},
{
"@score": "6.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2017-000072",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN48790793/index.html",
"@id": "JVN#48790793",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2152",
"@id": "CVE-2017-2152",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-2152",
"@id": "CVE-2017-2152",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-78",
"@title": "OS Command Injection(CWE-78)"
}
],
"title": "WNC01WH vulnerable to OS command injection"
}
jvndb-2016-000241
Vulnerability from jvndb
Published
2016-12-02 14:46
Modified
2017-11-27 17:11
Severity ?
Summary
WNC01WH vulnerable to directory traversal due to an issue in processing POST request
Details
WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains a directory traversal vulnerability due to an issue in processing POST request.
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000241.html",
"dc:date": "2017-11-27T17:11+09:00",
"dcterms:issued": "2016-12-02T14:46+09:00",
"dcterms:modified": "2017-11-27T17:11+09:00",
"description": "WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains a directory traversal vulnerability due to an issue in processing POST request.\r\n\r\nToshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000241.html",
"sec:cpe": {
"#text": "cpe:/o:buffalo_inc:wnc01wh_firmware",
"@product": "WNC01WH firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
"sec:cvss": [
{
"@score": "6.2",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:A/AC:L/Au:S/C:N/I:P/A:C",
"@version": "2.0"
},
{
"@score": "6.1",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2016-000241",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN40613060/index.html",
"@id": "JVN#40613060",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7826",
"@id": "CVE-2016-7826",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-7826",
"@id": "CVE-2016-7826",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-22",
"@title": "Path Traversal(CWE-22)"
}
],
"title": "WNC01WH vulnerable to directory traversal due to an issue in processing POST request"
}
jvndb-2016-000240
Vulnerability from jvndb
Published
2016-12-02 14:45
Modified
2017-11-27 16:27
Severity ?
Summary
WNC01WH vulnerable to directory traversal due to an issue in processing commands
Details
WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains a directory traversal vulnerability due to an issue in processing commands.
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000240.html",
"dc:date": "2017-11-27T16:27+09:00",
"dcterms:issued": "2016-12-02T14:45+09:00",
"dcterms:modified": "2017-11-27T16:27+09:00",
"description": "WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains a directory traversal vulnerability due to an issue in processing commands.\r\n\r\nToshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000240.html",
"sec:cpe": {
"#text": "cpe:/o:buffalo_inc:wnc01wh_firmware",
"@product": "WNC01WH firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
"sec:cvss": [
{
"@score": "1.4",
"@severity": "Low",
"@type": "Base",
"@vector": "AV:A/AC:H/Au:S/C:P/I:N/A:N",
"@version": "2.0"
},
{
"@score": "2.0",
"@severity": "Low",
"@type": "Base",
"@vector": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2016-000240",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN40613060/index.html",
"@id": "JVN#40613060",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7825",
"@id": "CVE-2016-7825",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-7825",
"@id": "CVE-2016-7825",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-22",
"@title": "Path Traversal(CWE-22)"
}
],
"title": "WNC01WH vulnerable to directory traversal due to an issue in processing commands"
}
jvndb-2016-000239
Vulnerability from jvndb
Published
2016-12-02 14:44
Modified
2017-11-27 16:27
Severity ?
Summary
WNC01WH vulnerable to enabling debug option
Details
WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains an enabling debug option vulnerability.
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000239.html",
"dc:date": "2017-11-27T16:27+09:00",
"dcterms:issued": "2016-12-02T14:44+09:00",
"dcterms:modified": "2017-11-27T16:27+09:00",
"description": "WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains an enabling debug option vulnerability.\r\n\r\nToshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000239.html",
"sec:cpe": {
"#text": "cpe:/o:buffalo_inc:wnc01wh_firmware",
"@product": "WNC01WH firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
"sec:cvss": [
{
"@score": "2.7",
"@severity": "Low",
"@type": "Base",
"@vector": "AV:A/AC:L/Au:S/C:N/I:P/A:N",
"@version": "2.0"
},
{
"@score": "6.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2016-000239",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN40613060/index.html",
"@id": "JVN#40613060",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7824",
"@id": "CVE-2016-7824",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-7824",
"@id": "CVE-2016-7824",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "WNC01WH vulnerable to enabling debug option"
}
jvndb-2016-000238
Vulnerability from jvndb
Published
2016-12-02 14:43
Modified
2017-11-27 16:27
Severity ?
Summary
WNC01WH vulnerable to stored cross-site scripting
Details
WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains a stored cross-site scripting vulnerability.
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000238.html",
"dc:date": "2017-11-27T16:27+09:00",
"dcterms:issued": "2016-12-02T14:43+09:00",
"dcterms:modified": "2017-11-27T16:27+09:00",
"description": "WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains a stored cross-site scripting vulnerability.\r\n\r\nToshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000238.html",
"sec:cpe": {
"#text": "cpe:/o:buffalo_inc:wnc01wh_firmware",
"@product": "WNC01WH firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
"sec:cvss": [
{
"@score": "2.7",
"@severity": "Low",
"@type": "Base",
"@vector": "AV:A/AC:L/Au:S/C:N/I:P/A:N",
"@version": "2.0"
},
{
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2016-000238",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN40613060/index.html",
"@id": "JVN#40613060",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7823",
"@id": "CVE-2016-7823",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-7823",
"@id": "CVE-2016-7823",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
}
],
"title": "WNC01WH vulnerable to stored cross-site scripting"
}
jvndb-2016-000236
Vulnerability from jvndb
Published
2016-12-02 14:43
Modified
2017-11-27 16:27
Severity ?
Summary
WNC01WH vulnerable to denial-of-service (DoS)
Details
WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains a denial-of-service (DoS) vulnerability.
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000236.html",
"dc:date": "2017-11-27T16:27+09:00",
"dcterms:issued": "2016-12-02T14:43+09:00",
"dcterms:modified": "2017-11-27T16:27+09:00",
"description": "WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains a denial-of-service (DoS) vulnerability.\r\n\r\nToshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000236.html",
"sec:cpe": {
"#text": "cpe:/o:buffalo_inc:wnc01wh_firmware",
"@product": "WNC01WH firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
"sec:cvss": [
{
"@score": "5.4",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"@version": "2.0"
},
{
"@score": "6.5",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2016-000236",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN40613060/index.html",
"@id": "JVN#40613060",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7821",
"@id": "CVE-2016-7821",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-7821",
"@id": "CVE-2016-7821",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-20",
"@title": "Improper Input Validation(CWE-20)"
}
],
"title": "WNC01WH vulnerable to denial-of-service (DoS)"
}
jvndb-2016-000237
Vulnerability from jvndb
Published
2016-12-02 14:43
Modified
2017-11-27 16:27
Severity ?
Summary
WNC01WH vulnerable to cross-site request forgery
Details
WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains a cross-site request forgery vulnerability.
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000237.html",
"dc:date": "2017-11-27T16:27+09:00",
"dcterms:issued": "2016-12-02T14:43+09:00",
"dcterms:modified": "2017-11-27T16:27+09:00",
"description": "WNC01WH provided by BUFFALO INC. is a network camera. WNC01WH contains a cross-site request forgery vulnerability.\r\n\r\nToshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000237.html",
"sec:cpe": {
"#text": "cpe:/o:buffalo_inc:wnc01wh_firmware",
"@product": "WNC01WH firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
"sec:cvss": [
{
"@score": "4.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"@version": "2.0"
},
{
"@score": "7.1",
"@severity": "High",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2016-000237",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN40613060/index.html",
"@id": "JVN#40613060",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7822",
"@id": "CVE-2016-7822",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2016-7822",
"@id": "CVE-2016-7822",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-352",
"@title": "Cross-Site Request Forgery(CWE-352)"
}
],
"title": "WNC01WH vulnerable to cross-site request forgery"
}