diff --git a/2017/6xxx/CVE-2017-6225.json b/2017/6xxx/CVE-2017-6225.json index dfc9b78864a..70a4a6487b1 100644 --- a/2017/6xxx/CVE-2017-6225.json +++ b/2017/6xxx/CVE-2017-6225.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "sirt@brocade.com", + "DATE_PUBLIC" : "2018-01-31T00:00:00", "ID" : "CVE-2017-6225", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Brocade FABRIC OS", + "version" : { + "version_data" : [ + { + "version_value" : "all versions before 7.4.2b, v8.1.2 and 8.2.0" + } + ] + } + } + ] + }, + "vendor_name" : "Brocade Communications Systems, Inc." + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Cross-site scripting(XSS) vulnerability in the web-based management interface of Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 could allow remote attackers to execute arbitrary code or access sensitive browser-based information." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Cross-site scripting (XSS)" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2018-525.htm" } ] } diff --git a/2017/6xxx/CVE-2017-6227.json b/2017/6xxx/CVE-2017-6227.json index 855b557fca8..b8f520fc4a0 100644 --- a/2017/6xxx/CVE-2017-6227.json +++ b/2017/6xxx/CVE-2017-6227.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "sirt@brocade.com", + "DATE_PUBLIC" : "2018-01-31T00:00:00", "ID" : "CVE-2017-6227", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Brocade FABRIC OS", + "version" : { + "version_data" : [ + { + "version_value" : "all versions before 7.4.2b, 8.1.2 and 8.2.0" + } + ] + } + } + ] + }, + "vendor_name" : "Brocade Communications Systems, Inc." + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "A vulnerability in the IPv6 stack on Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 could allow an attacker to cause a denial of service (CPU consumption and device hang) condition by sending crafted Router Advertisement (RA) messages to a targeted system." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "DOS" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2018-526.htm" } ] }