VAR-201506-0118
Vulnerability from variot - Updated: 2023-12-18 12:57Stack-based buffer overflow in AirTies Air 6372, 5760, 5750, 5650TT, 5453, 5444TT, 5443, 5442, 5343, 5342, 5341, and 5021 DSL modems with firmware 1.0.2.0 and earlier allows remote attackers to execute arbitrary code via a long string in the redirect parameter to cgi-bin/login. Airties Air 6372 and others are wireless modem products from Airties of Turkey. AirTiesAir 6372, 5760, 5750, 5650TT, 5453, 5444TT, 5443, 5442, 5343, 5342, 5341, 5021 DSL modems using firmware version 1.0.2.0 and earlier were affected by this vulnerability. Multiple AirTies Air products are prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. A remote attacker may exploit this issue to execute arbitrary code in the context of the affected device. Failed attempts will likely cause a denial-of-service condition
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201506-0118",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "air",
"scope": "lte",
"trust": 1.8,
"vendor": "airties",
"version": "1.0.2.0"
},
{
"model": "air 5650tt",
"scope": null,
"trust": 1.1,
"vendor": "airties",
"version": null
},
{
"model": "air 5444tt",
"scope": null,
"trust": 1.1,
"vendor": "airties",
"version": null
},
{
"model": "air",
"scope": "eq",
"trust": 0.9,
"vendor": "airties",
"version": "1.0.2.0"
},
{
"model": "air 5021",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5341",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5342",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5343",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5442",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5443",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5453",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5750",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 5760",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air 6372",
"scope": null,
"trust": 0.8,
"vendor": "airties",
"version": null
},
{
"model": "air6372",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5760",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5750",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5650tt",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5453",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5444tt",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5443",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5442",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5343",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5342",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5341",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air5021",
"scope": null,
"trust": 0.6,
"vendor": "airties",
"version": null
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "6372"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5760"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5750"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5453"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5443"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5442"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5343"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5342"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5341"
},
{
"model": "air",
"scope": "eq",
"trust": 0.3,
"vendor": "airties",
"version": "5021"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "BID",
"id": "75355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:airties:air_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.0.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:airties:air_5442:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_5443:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_5021:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_5341:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_5650tt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_5750:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_5342:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_5343:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_5760:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_6372:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_5444tt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:airties:air_5453:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2797"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Batuhan Burakcin",
"sources": [
{
"db": "BID",
"id": "75355"
}
],
"trust": 0.3
},
"cve": "CVE-2015-2797",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2015-2797",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-03975",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-80758",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-2797",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2015-03975",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201506-339",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-80758",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2015-2797",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in AirTies Air 6372, 5760, 5750, 5650TT, 5453, 5444TT, 5443, 5442, 5343, 5342, 5341, and 5021 DSL modems with firmware 1.0.2.0 and earlier allows remote attackers to execute arbitrary code via a long string in the redirect parameter to cgi-bin/login. Airties Air 6372 and others are wireless modem products from Airties of Turkey. AirTiesAir 6372, 5760, 5750, 5650TT, 5453, 5444TT, 5443, 5442, 5343, 5342, 5341, 5021 DSL modems using firmware version 1.0.2.0 and earlier were affected by this vulnerability. Multiple AirTies Air products are prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. \nA remote attacker may exploit this issue to execute arbitrary code in the context of the affected device. Failed attempts will likely cause a denial-of-service condition",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-2797"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "BID",
"id": "75355"
},
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
}
],
"trust": 2.61
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=37170",
"trust": 0.2,
"type": "exploit"
},
{
"reference": "https://www.scap.org.cn/vuln/vhn-80758",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-2797",
"trust": 3.5
},
{
"db": "BID",
"id": "75355",
"trust": 2.1
},
{
"db": "EXPLOIT-DB",
"id": "36577",
"trust": 1.8
},
{
"db": "EXPLOIT-DB",
"id": "37170",
"trust": 1.8
},
{
"db": "OSVDB",
"id": "120335",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-03975",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-80758",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-2797",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"db": "BID",
"id": "75355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
]
},
"id": "VAR-201506-0118",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "VULHUB",
"id": "VHN-80758"
}
],
"trust": 1.6835164823076922
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
}
]
},
"last_update_date": "2023-12-18T12:57:46.735000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.airties.com/"
},
{
"title": "having-fun-with-qiling",
"trust": 0.1,
"url": "https://github.com/echel0nn/having-fun-with-qiling "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.5,
"url": "http://www.bmicrosystems.com/blog/exploiting-the-airties-air-series/"
},
{
"trust": 1.9,
"url": "https://www.exploit-db.com/exploits/37170/"
},
{
"trust": 1.8,
"url": "https://www.exploit-db.com/exploits/36577/"
},
{
"trust": 1.8,
"url": "http://osvdb.org/show/osvdb/120335"
},
{
"trust": 1.3,
"url": "http://www.securityfocus.com/bid/75355"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2797"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2797"
},
{
"trust": 0.3,
"url": "http://www.airties.com/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/119.html"
},
{
"trust": 0.1,
"url": "https://github.com/echel0nn/having-fun-with-qiling"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.rapid7.com/db/modules/exploit/linux/http/airties_login_cgi_bof"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"db": "BID",
"id": "75355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"db": "VULHUB",
"id": "VHN-80758"
},
{
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"db": "BID",
"id": "75355"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"db": "NVD",
"id": "CVE-2015-2797"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"date": "2015-06-19T00:00:00",
"db": "VULHUB",
"id": "VHN-80758"
},
{
"date": "2015-06-19T00:00:00",
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"date": "2015-06-23T00:00:00",
"db": "BID",
"id": "75355"
},
{
"date": "2015-06-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"date": "2015-06-19T14:59:00.067000",
"db": "NVD",
"id": "CVE-2015-2797"
},
{
"date": "2015-06-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-03975"
},
{
"date": "2016-12-03T00:00:00",
"db": "VULHUB",
"id": "VHN-80758"
},
{
"date": "2016-12-03T00:00:00",
"db": "VULMON",
"id": "CVE-2015-2797"
},
{
"date": "2015-06-23T00:00:00",
"db": "BID",
"id": "75355"
},
{
"date": "2015-06-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-003224"
},
{
"date": "2016-12-03T03:06:27.040000",
"db": "NVD",
"id": "CVE-2015-2797"
},
{
"date": "2015-06-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural AirTies Air Product firmware stack-based buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-003224"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201506-339"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.