Coder Social home page Coder Social logo

disclose / research-threats Goto Github PK

View Code? Open in Web Editor NEW
281.0 281.0 19.0 6.51 MB

Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started by @attritionorg

Home Page: https://threats.disclose.io/

License: Creative Commons Zero v1.0 Universal

CSS 100.00%
advisories cybersecurity legal news security vulnerability

research-threats's Introduction

The disclose.io Database (diodb)

A true, community-powered, vendor agnostic directory of all known VDP and BBPs, contact details, policy location, preferred languages, and the status of:

  • Safeharbor
  • Availability rewards, hall of fame, swag
  • Disclosure policy

Disclose.io Vulnerability, VDP, and Bug Bounty Program Database

Quick links

Purpose Link
Search through the database front-end https://disclose.io/programs
Download the raw database in .json format https://github.com/disclose/diodb/raw/master/program-list.json
Generate your own Vulnerability Disclosure Program https://policymaker.disclose.io/
Join disclose.io Community Forum https://community.disclose.io
Learn more about Vulnerability Disclosure Programs (VDP) https://github.com/disclose/dioterms

Why does diodb exist?

diodb exists to drive the adoption of Safe Harbor for hackers and promote the cybersecurity posture of early adopters, simplify the process of finding the right contacts and channel at an organization, and help both finders and vendors align around the expectations of engagement. It also provides a simple, vendor-agnostic point of engagement for program operators, potential program operators, and the security community to maintain updates to their program.

How to Contribute

Contributions are very welcome! You may add a new program or update an existing one by either opening an issue or a pull request.

Open an Issue

or

Follow the contribution guidelines to prepare and open a Pull Request

License

Creative Commons License
disclose by disclose.io is licensed under a Creative Commons Attribution 4.0 International License.

research-threats's People

Contributors

attritionorg avatar calabashsquash avatar robdyke avatar sickcodes avatar yesnet0 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

research-threats's Issues

Ian Linkletter & Proctorio

Remove VLC from the repo

As much as I appreciate you compiling and shaming companies that threaten researchers, it is clear that the research team at Secunia were mostly interested to prop their brand than actually researching and helping the open source project.

I understand that lawyering up is not the most optimal solution, but here, it is clearly a case where they are not actually pointing out a vulnerability, just trying to get a nice trophy and holding on to it as long as possible.

Giorgio Grigolo, Michael Debono, Luke Bjorn Scerri, Luke Collins -vs- FreeHour

https://timesofmalta.com/articles/view/we-wanted-help-students-arrested-exposing-freehour-security-flaw.1024757
'We wanted to help': Students arrested after exposing FreeHour security flaw
Police investigate four students who discovered vulnerability in application

Giorgio Grigolo, Michael Debono, Luke Bjorn Scerri and Luke Collins were scanning through the software of the app when they found a vulnerability they say could be exploited by malicious hackers.

They emailed their findings to FreeHour’s owner and asked for a reward – or ‘bug bounty’ – for spotting the mistake.

But, instead of a payoff, the University of Malta students were arrested, strip-searched and had their computer equipment seized.
[..]

enhancements to intro

I made some enhancements to the intro but would like second eyes. Fix or revert as needed.

Table format transposition

The table is a big awkward on mobile and limits the horizontal field length, I will work on adding rows instead and see how it looks that was each submission can go into greater details and the words would wrap properly. Just a suggestion at this stage :)

Radiodity Open GD77 firmware

Posting here for reference, as this may qualify for inclusion pending more details.

https://twitter.com/BryanSmart/status/1384243611110285321

URGENT! If you, or someone you know, is using the Open GD77 firmware for Radiodity ham radios, the only talking handheld FM/DMR radio, the author is being forced to take it down due to some licensing issue. Not much details yet. He's leaving it up for 48 hours, then it's gone.

Researcher "AmmonRa" discloses unresolved bus fare card vulnerability, police informed

At Kiwicon 7 (2013-11-09), researcher "AmmonRa" disclosed a series of vulnerabilities regarding Christchurch's "Metro Card" bus fare system. He previously reported the security flaw to Environment Canterbury, the group that oversees the bus network, three months prior, but nothing had been done.

After disclosing the vulnerability publicly, Environment Canterbury director operations Wayne Holton-Jeffreys had called the police (but was unsure if any charges would be laid).

Update Henrik Høyer

Digging through old Errata mails:

The case against Henrik Høyer listed 3rd in the list of legal threats was finally resolved this spring.
He was originally found guilty in local court but was found not guilty on appeal to a higher court based on lack of evidence.
Below articles are in Danish but describe the situation. Worth adding to the entry I think.

https://www.version2.dk/artikel/dom-faldet-i-kontroversiel-boernehave-hackersag-709985
https://www.version2.dk/artikel/derfor-blev-henrik-hoeyer-frifundet-1074649

Blue Coat talk

Hi,
regarding my Blue Coat talk, I could present it (almost unchanged) months later at Ruxcon and Black Hat Europe
see https://syscall.eu/ for slides and video link

MIT threatened to sue after I reported a security vulnerability

Thought I'd open a new issue regarding my experiences with the Massachusetts Institute of Technology four years ago. I had found an exposed WordPress debug log that had been recording for about a year when I found it (4GB+ of data). All PII has been removed except my own, which is already publicly available.

The legal threat:
image
image

My email to the head of MIT's IT department:
image

MIT's IT Head response:
image

Follow-up from original staff member encouraging that I stay away from security:
image
image

Broken link to C&D letter for 2015 Impero Software incident

There's a broken link to the C&D letter for the 2015-07-13 Impero Software incident. The original link (https://pdf.yt/d/fRcZ1TWHaDkwz-Ea) is not resolving for me. There are a few choices to fix this:

I'd be happy to make a PR, just let me know what's preferred. And if it's adding it to this repo in the goodies directory, which version is preferred? The original or the OCR, searchable, screen reader friendly version that archive.org automatically created?

How to reach out in private/anonymous?

Recently found a critical vulnerability. Reserved a CVE for it.

However the vendor is threatening my client with breach of contract and tells me not to publish CVE.

I would like to warn about this vendor. However because of this hostile behaviour I want to discuss this in private with someone. How can I reach out to the maintainers?

Good Technology & modzero

https://www.modzero.com/modlog/archives/2015/09/24/on_responsible_full_disclosure/index.html

[..]
The reason for this blog-posting is Good Technology. In June 2013 we identified a remotely exploitable vulnerability in Good's Mobile Device Management (MDM) Suite "Good For Enterprise" that allowed remote attackers to hijack administrative accounts. We followed common responsible disclosure principles and contacted Good, providing a timeframe of 45 days to fix a simple, persistent Cross Site Scripting related vulnerability. They asked for another 60 days and said they would like to provide "updates or corrections" to the final version of our advisory. However, Good used the remaining 50% of the E-mail to express their understanding of their certain license conditions and provided their legal standpoint "just FYI".
[..]

Including here for records and/or digging into it more to determine if it warrants inclusion.

Keeper Security threatens Fox It

https://blog.fox-it.com/2013/04/05/security-advisory-unencrypted-storage-of-confidential-information-in-keeper-password-data-vault-v5-3-for-ios/

Vendor response
Fox-IT has reported the vulnerability in Keeper® Password & Data Vault to Keeper Security Inc. within 24 hours of its initial discovery. Unfortunately, Keeper Security Inc. has refused to constructively engage in a responsible disclosure procedure and has requested all further communication to be addressed to the company’s legal counsel.

Keeper Security Inc’s legal counsel has since notified Fox-IT that “that the issue raised […] has been addressed and resolved in the new version of Keeper (Version 6.0) which is available on the App Store”. However, the description of the update on the App Store does not specify this version resolves any security issues. Fox-IT was also notified that the public disclosure of the issues that are described in this advisory may be met with swift legal action.

Our mission at Fox-IT is to make technical and innovative contributions for a more secure society. Given the lack of public information regarding the risks that are associated with the previous version of the application, we regard it as our responsibility to publish a detailed advisory. This will allow the affected users to take protective measures to prevent their confidential data from being compromised (further).

Reported: 18-March-2013 17:12 CET
Resolved: 04-April-2013, according to the vendor’s legal counsel
Published: 05-April-2013 16:33 CET

Possible addition: Facial recognition technology is being used for multiple purposes from law enforcement. Lawsuit (India)

https://therecord.media/meet-the-man-who-sued-an-indian-state-over-facial-recognition-technology/

This application was created for the Telangana State Police in 2018 and is equipped with facial recognition technology. It can compare the pictures of people with India’s national Crime and Criminal Tracking Network & Systems (CCTNS) in real-time—a nationwide database that contains millions of images of known and arrested offenders, wanted people and missing people.

FireEye & RazorEQX

There are two FireEye incidents already. In the HTML comments I have had this for a while and tried to get more details on Twitter:

https://twitter.com/RazorEQX/status/642124276573859841
I came under fire from [FireEye] just over a year ago for disclosing a bug they didn.t seem important to fix.
https://twitter.com/RazorEQX/status/642125189904470016
Let me talk to the attorney that defended me. I lost a job over it.

Here's where I asked if it was one of the incidents:
https://twitter.com/securityerrata/status/643246845922250754
https://www.forbes.com/sites/thomasbrewster/2014/07/09/researcher-i-was-suspended-for-finding-flaws-in-fireeye-security-kit/?sh=6368bb336f77

Kind of surprised people still report vulns to FireEye after the other known incidents.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.