"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-06-20 19:01:42 +00:00
parent e120193cd3
commit 48b4b36b6d
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
13 changed files with 85 additions and 0 deletions

View File

@ -506,6 +506,11 @@
"refsource": "FULLDISC",
"name": "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
}
]
}

View File

@ -421,6 +421,11 @@
"refsource": "FULLDISC",
"name": "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
}
]
}

View File

@ -121,6 +121,11 @@
"refsource": "FULLDISC",
"name": "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
}
]
}

View File

@ -146,6 +146,11 @@
"refsource": "FULLDISC",
"name": "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
"url": "http://seclists.org/fulldisclosure/2022/Jun/36"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
"url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"
}
]
}

View File

@ -101,6 +101,16 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167500/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html",
"url": "http://packetstormsecurity.com/files/167500/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167532/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html",
"url": "http://packetstormsecurity.com/files/167532/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167528/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html",
"url": "http://packetstormsecurity.com/files/167528/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html"
}
]
}

View File

@ -101,6 +101,16 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167508/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Missing-Trust.html",
"url": "http://packetstormsecurity.com/files/167508/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Missing-Trust.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167535/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Missing-Trust.html",
"url": "http://packetstormsecurity.com/files/167535/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Missing-Trust.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167539/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Missing-Trust.html",
"url": "http://packetstormsecurity.com/files/167539/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Missing-Trust.html"
}
]
}

View File

@ -71,6 +71,16 @@
"refsource": "FULLDISC",
"name": "20220610 [SYSS-2022-017]: Verbatim Fingerprint Secure Portable Hard Drive - Insufficient Verification of Data Authenticity (CWE-345) (CVE-2022-28385)",
"url": "http://seclists.org/fulldisclosure/2022/Jun/26"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167546/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Insufficient-Verification.html",
"url": "http://packetstormsecurity.com/files/167546/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Insufficient-Verification.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167536/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Insufficient-Verification.html",
"url": "http://packetstormsecurity.com/files/167536/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Insufficient-Verification.html"
}
]
}

View File

@ -71,6 +71,16 @@
"refsource": "FULLDISC",
"name": "20220610 [SYSS-2022-014]: Verbatim Fingerprint Secure Portable Hard Drive - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28387)",
"url": "http://seclists.org/fulldisclosure/2022/Jun/13"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167527/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html",
"url": "http://packetstormsecurity.com/files/167527/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167531/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html",
"url": "http://packetstormsecurity.com/files/167531/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "FULLDISC",
"name": "20220614 SEC Consult SA-20220614-0 :: Reflected Cross Site Scripting in SIEMENS-SINEMA Remote Connect",
"url": "http://seclists.org/fulldisclosure/2022/Jun/35"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167554/SIEMENS-SINEMA-Remote-Connect-3.0.1.0-01.01.00.02-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/167554/SIEMENS-SINEMA-Remote-Connect-3.0.1.0-01.01.00.02-Cross-Site-Scripting.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "FULLDISC",
"name": "20220610 Hidden Functionality (Backdoor) (CWE-912) / CVE-2022-29854, CVE-2022-29855",
"url": "http://seclists.org/fulldisclosure/2022/Jun/32"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html",
"url": "http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "FULLDISC",
"name": "20220610 Hidden Functionality (Backdoor) (CWE-912) / CVE-2022-29854, CVE-2022-29855",
"url": "http://seclists.org/fulldisclosure/2022/Jun/32"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html",
"url": "http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "FULLDISC",
"name": "20220610 [SYSS-2022-024]: Lepin EP-KP001 - Violation of Secure Design Principles (CWE-657) (CVE-2022-29948)",
"url": "http://seclists.org/fulldisclosure/2022/Jun/27"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167550/Lepin-EP-KP001-KP001_V19-Authentication-Bypass.html",
"url": "http://packetstormsecurity.com/files/167550/Lepin-EP-KP001-KP001_V19-Authentication-Bypass.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/50962",
"url": "https://www.exploit-db.com/exploits/50962"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/167522/TP-Link-AX50-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/167522/TP-Link-AX50-Remote-Code-Execution.html"
}
]
}