var-201506-0118
Vulnerability from variot
Stack-based buffer overflow in AirTies Air 6372, 5760, 5750, 5650TT, 5453, 5444TT, 5443, 5442, 5343, 5342, 5341, and 5021 DSL modems with firmware 1.0.2.0 and earlier allows remote attackers to execute arbitrary code via a long string in the redirect parameter to cgi-bin/login. Airties Air 6372 and others are wireless modem products from Airties of Turkey. AirTiesAir 6372, 5760, 5750, 5650TT, 5453, 5444TT, 5443, 5442, 5343, 5342, 5341, 5021 DSL modems using firmware version 1.0.2.0 and earlier were affected by this vulnerability. Multiple AirTies Air products are prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. A remote attacker may exploit this issue to execute arbitrary code in the context of the affected device. Failed attempts will likely cause a denial-of-service condition
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201506-0118",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "air",
"scope": "lte",
"trust": 1.8,
"vendor": "airties",
"version": "1.0.2.0"
},
{
"model": "air 5650tt",
"scope": null,
"trust": 1.1,
"vendor": "airties",
"version": null
},
{
"model": "air 5444tt",
"scope": null,
"trust": 1.1,
"vendor": "airties",
"version": null
},
{
"model": "air",
"scope": "eq",
"trust": 0.9,
"vendor": "airties",
"version": "1.0.2.0"
},
{
"model": "air 5021",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5341",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5342",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5343",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5442",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5443",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5453",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5750",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5760",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 6372",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air6372",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5760",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5750",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5650tt",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5453",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5444tt",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5443",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5442",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5343",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5342",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5341",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5021",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "6372"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5760"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5750"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5453"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5443"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5442"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5343"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5342"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5341"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5021"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "BID",
"id": "75355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:airties:air_5021",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_5341",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_5342",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_5343",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_5442",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_5443",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_5444tt",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_5453",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_5650tt",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_5750",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_5760",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:airties:air_6372",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:airties:air_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Batuhan Burakcin",
"sources": [
{
"db": "BID",
"id": "75355"
}
],
"trust": 0.3
},
"cve": "CVE-2015-2797",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2015-2797",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-03975",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-80758",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-2797",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-2797",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2015-03975",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201506-339",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-80758",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2015-2797",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in AirTies Air 6372, 5760, 5750, 5650TT, 5453, 5444TT, 5443, 5442, 5343, 5342, 5341, and 5021 DSL modems with firmware 1.0.2.0 and earlier allows remote attackers to execute arbitrary code via a long string in the redirect parameter to cgi-bin/login. Airties Air 6372 and others are wireless modem products from Airties of Turkey. AirTiesAir 6372, 5760, 5750, 5650TT, 5453, 5444TT, 5443, 5442, 5343, 5342, 5341, 5021 DSL modems using firmware version 1.0.2.0 and earlier were affected by this vulnerability. Multiple AirTies Air products are prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. \nA remote attacker may exploit this issue to execute arbitrary code in the context of the affected device. Failed attempts will likely cause a denial-of-service condition",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2797"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "BID",
"id": "75355"
},
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
}
],
"trust": 2.61
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=37170",
"trust": 0.2,
"type": "exploit"
},
{
"reference": "https://www.scap.org.cn/vuln/vhn-80758",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-2797",
"trust": 3.5
},
{
"db": "BID",
"id": "75355",
"trust": 2.1
},
{
"db": "EXPLOIT-DB",
"id": "36577",
"trust": 1.8
},
{
"db": "EXPLOIT-DB",
"id": "37170",
"trust": 1.8
},
{
"db": "OSVDB",
"id": "120335",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-03975",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-80758",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-2797",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"db": "BID",
"id": "75355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
}
]
},
"id": "VAR-201506-0118",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "VULHUB",
"id": "VHN-80758"
}
],
"trust": 1.6835164823076922
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
}
]
},
"last_update_date": "2024-11-23T23:05:39.128000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.airties.com/"
},
{
"title": "having-fun-with-qiling",
"trust": 0.1,
"url": "https://github.com/echel0nn/having-fun-with-qiling "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.5,
"url": "http://www.bmicrosystems.com/blog/exploiting-the-airties-air-series/"
},
{
"trust": 1.9,
"url": "https://www.exploit-db.com/exploits/37170/"
},
{
"trust": 1.8,
"url": "https://www.exploit-db.com/exploits/36577/"
},
{
"trust": 1.8,
"url": "http://osvdb.org/show/osvdb/120335"
},
{
"trust": 1.3,
"url": "http://www.securityfocus.com/bid/75355"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2797"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2797"
},
{
"trust": 0.3,
"url": "http://www.airties.com/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/119.html"
},
{
"trust": 0.1,
"url": "https://github.com/echel0nn/having-fun-with-qiling"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.rapid7.com/db/modules/exploit/linux/http/airties_login_cgi_bof"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"db": "BID",
"id": "75355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"db": "BID",
"id": "75355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"date": "2015-06-19T00:00:00",
"db": "VULHUB",
"id": "VHN-80758"
},
{
"date": "2015-06-19T00:00:00",
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"date": "2015-06-23T00:00:00",
"db": "BID",
"id": "75355"
},
{
"date": "2015-06-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"date": "2015-06-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201506-339"
},
{
"date": "2015-06-19T14:59:00.067000",
"db": "NVD",
"id": "CVE-2015-2797"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"date": "2016-12-03T00:00:00",
"db": "VULHUB",
"id": "VHN-80758"
},
{
"date": "2016-12-03T00:00:00",
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"date": "2015-06-23T00:00:00",
"db": "BID",
"id": "75355"
},
{
"date": "2015-06-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"date": "2015-06-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201506-339"
},
{
"date": "2024-11-21T02:28:05.803000",
"db": "NVD",
"id": "CVE-2015-2797"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural AirTies Air Product firmware stack-based buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.