ID SECURITYVULNS:VULN:3031
Type securityvulns
Reporter BUGTRAQ
Modified 2003-08-04T00:00:00
Description
Multiple buffer overflows.
{"id": "SECURITYVULNS:VULN:3031", "bulletinFamily": "software", "title": "Multiple atari800 bugs", "description": "Multiple buffer overflows.", "published": "2003-08-04T00:00:00", "modified": "2003-08-04T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:3031", "reporter": "BUGTRAQ", "references": ["https://vulners.com/securityvulns/securityvulns:doc:4944"], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:09:17", "edition": 1, "viewCount": 0, "enchantments": {"score": {"value": 7.0, "vector": "NONE", "modified": "2018-08-31T11:09:17", "rev": 2}, "dependencies": {"references": [{"type": "nessus", "idList": ["VIRTUALBOX_6_0_14.NASL", "GENTOO_GLSA-202004-02.NASL", "MACOSX_VIRTUALBOX_6_0_14.NASL"]}, {"type": "gentoo", "idList": ["GLSA-202004-02"]}, {"type": "cve", "idList": ["CVE-2019-3031", "CVE-2018-3031"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310812572", "OPENVAS:1361412562310812568", "OPENVAS:1361412562310815648", "OPENVAS:1361412562310815646", "OPENVAS:1361412562310815647", "OPENVAS:1361412562310812571"]}, {"type": "oracle", "idList": ["ORACLE:CPUJUL2018-4258247", "ORACLE:CPUOCT2019-5072832"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:147843", "PACKETSTORM:153498"]}, {"type": "openbugbounty", "idList": ["OBB:673664"]}, {"type": "seebug", "idList": ["SSV:97332"]}, {"type": "exploitdb", "idList": ["EDB-ID:44759"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:844BD05A26343BD9033C57C745E104A0"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:4944"]}], "modified": "2018-08-31T11:09:17", "rev": 2}, "vulnersScore": 7.0}, "affectedSoftware": [{"name": "atari800", "operator": "eq", "version": "1.2"}]}
{"rst": [{"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **burnkilos[.]com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **2**.\n First seen: 2019-12-15T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **spam**.\nDomain has DNS A records: 3[.]223.115.185 and CNAME records: HDRedirect-LB7-5a03e1c2772e1c9c.elb.us-east-1.amazonaws.com.\nWhois:\n Created: 2019-09-08 18:28:03, \n Registrar: TurnCommerce Inc DBA NameBrightcom, \n Registrant: unknown.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-12-15T00:00:00", "id": "RST:34681934-27D2-3031-9928-61A673567150", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: burnkilos.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **boxberry[.]pay-ukr.pp.ua** in [RST Threat Feed](https://rstcloud.net/profeed) with score **46**.\n First seen: 2021-02-06T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **phishing**.\nDomain has DNS A records: 45[.]147.197.110,190.115.18.100,116.202.0.200\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-06T00:00:00", "id": "RST:3CAACCA6-80F4-3031-9111-75D4AA210B57", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: boxberry.pay-ukr.pp.ua", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **backfeliminator[.]rest** in [RST Threat Feed](https://rstcloud.net/profeed) with score **2**.\n First seen: 2020-01-07T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **spam**.\nDomain has DNS A records: 198[.]54.117.197,198.54.117.198,198.54.117.199,198.54.117.200\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-01-07T00:00:00", "id": "RST:635D248C-D181-3031-A5DB-B357E7BC81BC", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: backfeliminator.rest", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **beste-angebote-ever[.]com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **2**.\n First seen: 2019-12-15T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **spam**.\nDomain has DNS A records: 209[.]99.64.52\nWhois:\n Created: 2019-01-30 20:01:26, \n Registrar: Domaincom LLC, \n Registrant: unknown.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-12-15T00:00:00", "id": "RST:0436DCF0-4D26-3031-8D6F-B69B3B6545BF", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: beste-angebote-ever.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **cdek-forms[.]com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **61**.\n First seen: 2021-02-22T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **phishing**.\nDomain has DNS A records: 151[.]139.128.10\nWhois:\n Created: 2021-02-22 12:31:46, \n Registrar: Registrar of domain names REGRU LLC, \n Registrant: Private Person.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-22T00:00:00", "id": "RST:A0EBA80B-3031-367C-B0C7-303569C8A3CD", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: cdek-forms.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **accustaffingjob[.]com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **23**.\n First seen: 2020-12-25T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **malware**.\nDomain has DNS A records: 192[.]187.111.221\nWhois:\n Created: 2020-12-23 13:15:38, \n Registrar: Media Elite Holdings Limited, \n Registrant: unknown.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-25T00:00:00", "id": "RST:E79EE5EC-3A22-3031-BA35-0E824D97288E", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: accustaffingjob.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **airsnuchina[.]net** in [RST Threat Feed](https://rstcloud.net/profeed) with score **25**.\n First seen: 2021-01-03T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **malware**.\nDomain has DNS A records: 193[.]239.84.207\nWhois:\n Created: 2020-12-31 16:13:24, \n Registrar: PDR Ltd dba PublicDomainRegistrycom, \n Registrant: unknown.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-01-03T00:00:00", "id": "RST:124830C4-306B-3031-81C1-7FFC7FAAD656", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: airsnuchina.net", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **amazinghotwomen[.]pro** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2019-12-15T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **spam**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-12-15T00:00:00", "id": "RST:BAD15445-2830-3031-AA87-3A9FB1DB11BB", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: amazinghotwomen.pro", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 www.taonacoin.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **48**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nDomain has DNS A records: 52[.]1.161.122\nWhois:\n Created: 2019-05-30 16:30:35, \n Registrar: unknown, \n Registrant: NameCheap Inc.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:9783FA85-3C47-3031-9041-71EE8040F64A", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 www.taonacoin.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 www.sense.minandoando.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **20**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nWhois:\n Created: 2017-03-25 22:12:37, \n Registrar: Wild West Domains LLC, \n Registrant: Not Available From Registry.\nIOC could be a **False Positive** (Domain not resolved, but Whois records found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:46783C0C-0DF3-3031-AEDF-45930DE88C69", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 www.sense.minandoando.com", "type": "rst", "cvss": {}}]}