From 2d524b713ab84d5f36adb46070890ec3ae4e8e77 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 30 Nov 2018 14:04:58 -0500 Subject: [PATCH] - Synchronized data. --- 2018/16xxx/CVE-2018-16476.json | 4 ++++ 2018/16xxx/CVE-2018-16477.json | 4 ++++ 2018/7xxx/CVE-2018-7806.json | 2 ++ 2018/7xxx/CVE-2018-7807.json | 2 ++ 2018/7xxx/CVE-2018-7809.json | 2 ++ 2018/7xxx/CVE-2018-7810.json | 4 +++- 2018/7xxx/CVE-2018-7811.json | 2 ++ 2018/7xxx/CVE-2018-7830.json | 2 ++ 2018/7xxx/CVE-2018-7831.json | 2 ++ 9 files changed, 23 insertions(+), 1 deletion(-) diff --git a/2018/16xxx/CVE-2018-16476.json b/2018/16xxx/CVE-2018-16476.json index bcaeaf15e35..2eed7490560 100644 --- a/2018/16xxx/CVE-2018-16476.json +++ b/2018/16xxx/CVE-2018-16476.json @@ -53,9 +53,13 @@ "references" : { "reference_data" : [ { + "name" : "https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ", + "refsource" : "MISC", "url" : "https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ" }, { + "name" : "https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/", + "refsource" : "MISC", "url" : "https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/" } ] diff --git a/2018/16xxx/CVE-2018-16477.json b/2018/16xxx/CVE-2018-16477.json index e8a780e07fa..67dcc4f41f1 100644 --- a/2018/16xxx/CVE-2018-16477.json +++ b/2018/16xxx/CVE-2018-16477.json @@ -53,9 +53,13 @@ "references" : { "reference_data" : [ { + "name" : "https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ", + "refsource" : "MISC", "url" : "https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ" }, { + "name" : "https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/", + "refsource" : "MISC", "url" : "https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/" } ] diff --git a/2018/7xxx/CVE-2018-7806.json b/2018/7xxx/CVE-2018-7806.json index 1ab9b199ee6..51b0454ce76 100644 --- a/2018/7xxx/CVE-2018-7806.json +++ b/2018/7xxx/CVE-2018-7806.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", + "refsource" : "MISC", "url" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" } ] diff --git a/2018/7xxx/CVE-2018-7807.json b/2018/7xxx/CVE-2018-7807.json index 14aace3a87f..6b67b61ed7f 100644 --- a/2018/7xxx/CVE-2018-7807.json +++ b/2018/7xxx/CVE-2018-7807.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", + "refsource" : "MISC", "url" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" } ] diff --git a/2018/7xxx/CVE-2018-7809.json b/2018/7xxx/CVE-2018-7809.json index 879a7e695f0..1b906de6a75 100644 --- a/2018/7xxx/CVE-2018-7809.json +++ b/2018/7xxx/CVE-2018-7809.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/" } ] diff --git a/2018/7xxx/CVE-2018-7810.json b/2018/7xxx/CVE-2018-7810.json index 74861270be9..ac28a70b108 100644 --- a/2018/7xxx/CVE-2018-7810.json +++ b/2018/7xxx/CVE-2018-7810.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A n Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 allowing an attacker to craft a URL containing JavaScript that will be executed within the userÕs browser, potentially impacting the machine the browser is running on." + "value" : "An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 allowing an attacker to craft a URL containing JavaScript that will be executed within the user's browser, potentially impacting the machine the browser is running on." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/" } ] diff --git a/2018/7xxx/CVE-2018-7811.json b/2018/7xxx/CVE-2018-7811.json index feccdf2c4b1..ad6ec9e549b 100644 --- a/2018/7xxx/CVE-2018-7811.json +++ b/2018/7xxx/CVE-2018-7811.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/" } ] diff --git a/2018/7xxx/CVE-2018-7830.json b/2018/7xxx/CVE-2018-7830.json index 044ad839862..6c627afb70b 100644 --- a/2018/7xxx/CVE-2018-7830.json +++ b/2018/7xxx/CVE-2018-7830.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/" } ] diff --git a/2018/7xxx/CVE-2018-7831.json b/2018/7xxx/CVE-2018-7831.json index 73846ebac33..b121bbc97a2 100644 --- a/2018/7xxx/CVE-2018-7831.json +++ b/2018/7xxx/CVE-2018-7831.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/" } ]