VAR-201508-0342
Vulnerability from variot - Updated: 2023-12-18 13:24Buffer overflow in the HTTP administrative interface in TIBCO Rendezvous before 8.4.4, Rendezvous Network Server before 1.1.1, Substation ES before 2.9.0, and Messaging Appliance before 8.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors, related to the Rendezvous Daemon (rvd), Routing Daemon (rvrd), Secure Daemon (rvsd), Secure Routing Daemon (rvsrd), Gateway Daemon (rvgd), Daemon Adapter (rvda), Cache (rvcache), Agent (rva), and Relay Agent (rvrad) components. TIBCO Rendezvous and others are products of TIBCO Software Corporation of the United States. TIBCO Rendezvous is a middleware product that helps users quickly build and deploy large-scale distributed applications; Substation ES is a substation product that integrates communications software and provides real-time information exchange; Messaging Appliance is a set that reduces transmission delays and improves A messaging software that predicts capabilities and improves message throughput. A buffer overflow vulnerability exists in the HTTP management interface for several TIBCO products. A remote attacker could exploit the vulnerability to cause a denial of service or to execute arbitrary code. Multiple TIBCO products are prone to multiple buffer-overflow vulnerabilities. Failed exploit attempts will result in a denial-of-service condition. The following products are vulnerable: TIBCO Rendezvous 8.4.3 and prior TIBCO Rendezvous Network Server 1.1.0 and prior TIBCO Substation ES 2.8.1 and prior TIBCO Messaging Appliance 8.7.1 and prior
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201508-0342",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "rendezvous",
"scope": "lt",
"trust": 1.4,
"vendor": "tibco",
"version": "8.4.4"
},
{
"model": "substation es",
"scope": "lt",
"trust": 1.4,
"vendor": "tibco",
"version": "2.9.0"
},
{
"model": "substation es",
"scope": "lte",
"trust": 1.0,
"vendor": "tibco",
"version": "2.8.1"
},
{
"model": "messaging appliance",
"scope": "lte",
"trust": 1.0,
"vendor": "tibco",
"version": "8.7.1"
},
{
"model": "rendezvous network server",
"scope": "lte",
"trust": 1.0,
"vendor": "tibco",
"version": "1.1.0"
},
{
"model": "rendezvous",
"scope": "lte",
"trust": 1.0,
"vendor": "tibco",
"version": "8.4.3"
},
{
"model": "substation es",
"scope": "eq",
"trust": 0.9,
"vendor": "tibco",
"version": "2.8.1"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.9,
"vendor": "tibco",
"version": "8.4.3"
},
{
"model": "messaging appliance",
"scope": "eq",
"trust": 0.9,
"vendor": "tibco",
"version": "8.7.1"
},
{
"model": "messaging appliance software",
"scope": "lt",
"trust": 0.8,
"vendor": "tibco",
"version": "8.7.2"
},
{
"model": "rendezvous network server",
"scope": "lt",
"trust": 0.8,
"vendor": "tibco",
"version": "1.1.1"
},
{
"model": "messaging appliance",
"scope": "lt",
"trust": 0.6,
"vendor": "tibco",
"version": "8.7.2"
},
{
"model": "rendezvous network server",
"scope": "eq",
"trust": 0.6,
"vendor": "tibco",
"version": "1.1.0"
},
{
"model": "substation es",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "2.8"
},
{
"model": "rendezvous network server",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "1.1"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.4.2"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.4.1"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.3"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.2.9"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.2.8"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.2.7"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.2.6"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.2.5"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.2.4"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.2.3"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.2.2"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.2.1"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.0.1"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "7.5.4"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "7.5.3"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "7.5.2"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "7.5.1"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "7.4.11"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "5.6.3"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.3.1"
},
{
"model": "rendezvous",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.0"
},
{
"model": "messaging appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "tibco",
"version": "8.7"
},
{
"model": "substation es",
"scope": "ne",
"trust": 0.3,
"vendor": "tibco",
"version": "2.9"
},
{
"model": "rendezvous network server",
"scope": "ne",
"trust": 0.3,
"vendor": "tibco",
"version": "1.1.1"
},
{
"model": "rendezvous",
"scope": "ne",
"trust": 0.3,
"vendor": "tibco",
"version": "8.4.4"
},
{
"model": "messaging appliance",
"scope": "ne",
"trust": 0.3,
"vendor": "tibco",
"version": "8.7.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "messaging appliance",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "rendezvous",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "rendezvous network server",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "substation es",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f"
},
{
"db": "CNVD",
"id": "CNVD-2015-05790"
},
{
"db": "BID",
"id": "76492"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004504"
},
{
"db": "NVD",
"id": "CVE-2015-4555"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-569"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:tibco:rendezvous_network_server:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tibco:messaging_appliance:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.7.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tibco:rendezvous:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.4.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tibco:substation_es:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.8.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-4555"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "76492"
}
],
"trust": 0.3
},
"cve": "CVE-2015-4555",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": true,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2015-4555",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-05790",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-4555",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2015-05790",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201508-569",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f"
},
{
"db": "CNVD",
"id": "CNVD-2015-05790"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004504"
},
{
"db": "NVD",
"id": "CVE-2015-4555"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-569"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in the HTTP administrative interface in TIBCO Rendezvous before 8.4.4, Rendezvous Network Server before 1.1.1, Substation ES before 2.9.0, and Messaging Appliance before 8.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors, related to the Rendezvous Daemon (rvd), Routing Daemon (rvrd), Secure Daemon (rvsd), Secure Routing Daemon (rvsrd), Gateway Daemon (rvgd), Daemon Adapter (rvda), Cache (rvcache), Agent (rva), and Relay Agent (rvrad) components. TIBCO Rendezvous and others are products of TIBCO Software Corporation of the United States. TIBCO Rendezvous is a middleware product that helps users quickly build and deploy large-scale distributed applications; Substation ES is a substation product that integrates communications software and provides real-time information exchange; Messaging Appliance is a set that reduces transmission delays and improves A messaging software that predicts capabilities and improves message throughput. A buffer overflow vulnerability exists in the HTTP management interface for several TIBCO products. A remote attacker could exploit the vulnerability to cause a denial of service or to execute arbitrary code. Multiple TIBCO products are prone to multiple buffer-overflow vulnerabilities. Failed exploit attempts will result in a denial-of-service condition. \nThe following products are vulnerable:\nTIBCO Rendezvous 8.4.3 and prior\nTIBCO Rendezvous Network Server 1.1.0 and prior\nTIBCO Substation ES 2.8.1 and prior\nTIBCO Messaging Appliance 8.7.1 and prior",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-4555"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004504"
},
{
"db": "CNVD",
"id": "CNVD-2015-05790"
},
{
"db": "BID",
"id": "76492"
},
{
"db": "IVD",
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-4555",
"trust": 3.5
},
{
"db": "SECTRACK",
"id": "1033677",
"trust": 1.0
},
{
"db": "CNVD",
"id": "CNVD-2015-05790",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201508-569",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004504",
"trust": 0.8
},
{
"db": "BID",
"id": "76492",
"trust": 0.3
},
{
"db": "IVD",
"id": "185E6A3D-806B-4280-97A9-DDBA5D0CD26F",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f"
},
{
"db": "CNVD",
"id": "CNVD-2015-05790"
},
{
"db": "BID",
"id": "76492"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004504"
},
{
"db": "NVD",
"id": "CVE-2015-4555"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-569"
}
]
},
"id": "VAR-201508-0342",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f"
},
{
"db": "CNVD",
"id": "CNVD-2015-05790"
}
],
"trust": 0.08
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f"
},
{
"db": "CNVD",
"id": "CNVD-2015-05790"
}
]
},
"last_update_date": "2023-12-18T13:24:45.219000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "TIBCO Rendezvous vulnerability",
"trust": 0.8,
"url": "http://www.tibco.com/services/support/advisories"
},
{
"title": "Security Advisories for TIBCO Products (August 25, 2015)",
"trust": 0.8,
"url": "http://www.tibco.com/assets/blt18493dc775c50c09/2015-002-advisory.txt"
},
{
"title": "Patches for multiple TIBCO product buffer overflow vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/63516"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-05790"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004504"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-4555"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "http://www.tibco.com/mk/advisory.jsp"
},
{
"trust": 1.9,
"url": "http://www.tibco.com/assets/blt18493dc775c50c09/2015-002-advisory.txt"
},
{
"trust": 1.0,
"url": "http://www.securitytracker.com/id/1033677"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4555"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4555"
},
{
"trust": 0.3,
"url": "http://www.tibco.com/index.html"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-05790"
},
{
"db": "BID",
"id": "76492"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004504"
},
{
"db": "NVD",
"id": "CVE-2015-4555"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-569"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f"
},
{
"db": "CNVD",
"id": "CNVD-2015-05790"
},
{
"db": "BID",
"id": "76492"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004504"
},
{
"db": "NVD",
"id": "CVE-2015-4555"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-569"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-09-06T00:00:00",
"db": "IVD",
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f"
},
{
"date": "2015-09-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-05790"
},
{
"date": "2015-08-25T00:00:00",
"db": "BID",
"id": "76492"
},
{
"date": "2015-09-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-004504"
},
{
"date": "2015-08-30T14:59:02.047000",
"db": "NVD",
"id": "CVE-2015-4555"
},
{
"date": "2015-08-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201508-569"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-09-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-05790"
},
{
"date": "2015-08-25T00:00:00",
"db": "BID",
"id": "76492"
},
{
"date": "2015-09-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-004504"
},
{
"date": "2016-12-08T18:52:35.693000",
"db": "NVD",
"id": "CVE-2015-4555"
},
{
"date": "2015-08-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201508-569"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201508-569"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural TIBCO Product HTTP Management Interface Buffer Overflow Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-004504"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "185e6a3d-806b-4280-97a9-ddba5d0cd26f"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-569"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.