mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 22:18:26 +00:00
- Synchronized data.
This commit is contained in:
parent
0a9e958355
commit
2d524b713a
@ -53,9 +53,13 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ"
|
"url" : "https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"name" : "https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/"
|
"url" : "https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,9 +53,13 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ"
|
"url" : "https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"name" : "https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/"
|
"url" : "https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
|
"url" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
|
"url" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/"
|
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "A n Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 allowing an attacker to craft a URL containing JavaScript that will be executed within the userÕs browser, potentially impacting the machine the browser is running on."
|
"value" : "An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 allowing an attacker to craft a URL containing JavaScript that will be executed within the user's browser, potentially impacting the machine the browser is running on."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/"
|
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/"
|
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/"
|
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/"
|
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
Loading…
x
Reference in New Issue
Block a user