From 59ba611363cf0aaa328beb292c8fa9685c2601d9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 17 Sep 2019 20:00:57 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/7xxx/CVE-2018-7820.json | 58 ++++++++-- 2019/11xxx/CVE-2019-11665.json | 89 ++++++++++++++- 2019/13xxx/CVE-2019-13538.json | 62 +++++++++++ 2019/4xxx/CVE-2019-4086.json | 174 ++++++++++++++--------------- 2019/4xxx/CVE-2019-4171.json | 190 ++++++++++++++++---------------- 2019/4xxx/CVE-2019-4175.json | 192 ++++++++++++++++---------------- 2019/4xxx/CVE-2019-4183.json | 180 +++++++++++++++--------------- 2019/4xxx/CVE-2019-4268.json | 194 ++++++++++++++++----------------- 2019/4xxx/CVE-2019-4270.json | 192 ++++++++++++++++---------------- 2019/4xxx/CVE-2019-4271.json | 192 ++++++++++++++++---------------- 2019/4xxx/CVE-2019-4342.json | 178 +++++++++++++++--------------- 2019/4xxx/CVE-2019-4442.json | 194 ++++++++++++++++----------------- 2019/4xxx/CVE-2019-4477.json | 194 ++++++++++++++++----------------- 2019/6xxx/CVE-2019-6809.json | 88 +++++++++++++-- 2019/6xxx/CVE-2019-6810.json | 58 ++++++++-- 2019/6xxx/CVE-2019-6811.json | 58 ++++++++-- 2019/6xxx/CVE-2019-6813.json | 73 +++++++++++-- 2019/6xxx/CVE-2019-6826.json | 58 ++++++++-- 2019/6xxx/CVE-2019-6828.json | 88 +++++++++++++-- 2019/6xxx/CVE-2019-6829.json | 68 ++++++++++-- 2019/6xxx/CVE-2019-6830.json | 58 ++++++++-- 2019/6xxx/CVE-2019-6831.json | 58 ++++++++-- 2019/6xxx/CVE-2019-6832.json | 68 ++++++++++-- 2019/6xxx/CVE-2019-6833.json | 88 +++++++++++++-- 2019/6xxx/CVE-2019-6835.json | 73 +++++++++++-- 2019/6xxx/CVE-2019-6836.json | 73 +++++++++++-- 2019/6xxx/CVE-2019-6837.json | 73 +++++++++++-- 2019/6xxx/CVE-2019-6838.json | 73 +++++++++++-- 2019/6xxx/CVE-2019-6839.json | 73 +++++++++++-- 2019/6xxx/CVE-2019-6840.json | 73 +++++++++++-- 30 files changed, 2221 insertions(+), 1069 deletions(-) create mode 100644 2019/13xxx/CVE-2019-13538.json diff --git a/2018/7xxx/CVE-2018-7820.json b/2018/7xxx/CVE-2018-7820.json index c2683073f81..7515e037247 100644 --- a/2018/7xxx/CVE-2018-7820.json +++ b/2018/7xxx/CVE-2018-7820.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-7820", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-7820", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "APC UPS Network Management Card 2 AOS", + "version": { + "version_data": [ + { + "version_value": "v6.5.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-255:Credentials Management" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.apc.com/salestools/CCON-BFQMXC/CCON-BFQMXC_R0_EN.pdf", + "url": "https://www.apc.com/salestools/CCON-BFQMXC/CCON-BFQMXC_R0_EN.pdf" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Credentials Management CWE-255 vulnerability exists in the APC UPS Network Management Card 2 AOS v6.5.6, which could cause Remote Monitoring Credentials to be viewed in plaintext when Remote Monitoring is enabled, and then disabled." } ] } diff --git a/2019/11xxx/CVE-2019-11665.json b/2019/11xxx/CVE-2019-11665.json index 4bc298e5241..b33b2959890 100644 --- a/2019/11xxx/CVE-2019-11665.json +++ b/2019/11xxx/CVE-2019-11665.json @@ -4,14 +4,97 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-11665", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@suse.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Micro Focus", + "product": { + "product_data": [ + { + "product_name": "Service Manager", + "version": { + "version_data": [ + { + "version_value": "9.30" + }, + { + "version_value": "9.31" + }, + { + "version_value": "9.32" + }, + { + "version_value": "9.33" + }, + { + "version_value": "9.34" + }, + { + "version_value": "9.35" + }, + { + "version_value": "9.40" + }, + { + "version_value": "9.41" + }, + { + "version_value": "9.50" + }, + { + "version_value": "9.51" + }, + { + "version_value": "9.52" + }, + { + "version_value": "9.60" + }, + { + "version_value": "9.61" + }, + { + "version_value": "9.62" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Data exposure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://softwaresupport.softwaregrp.com/doc/KM03518316", + "url": "https://softwaresupport.softwaregrp.com/doc/KM03518316" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Data exposure in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. The vulnerability could be exploited to allow sensitive data exposure." } ] } diff --git a/2019/13xxx/CVE-2019-13538.json b/2019/13xxx/CVE-2019-13538.json new file mode 100644 index 00000000000..afe03aefd14 --- /dev/null +++ b/2019/13xxx/CVE-2019-13538.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-13538", + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GmbH", + "product": { + "product_data": [ + { + "product_name": "3S-Smart Software Solutions GmbH CODESYS V3 Library Manager", + "version": { + "version_data": [ + { + "version_value": "all versions prior to 3.5.15.0" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.us-cert.gov/ics/advisories/icsa-19-255-02", + "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-02" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.15.0, allows the system to display active library content without checking its validity, which may allow the contents of manipulated libraries to be displayed or executed. The issue also exists for source libraries, but 3S-Smart Software Solutions GmbH strongly recommends distributing compiled libraries only." + } + ] + } +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4086.json b/2019/4xxx/CVE-2019-4086.json index cc53935c1cd..ce931806102 100644 --- a/2019/4xxx/CVE-2019-4086.json +++ b/2019/4xxx/CVE-2019-4086.json @@ -1,90 +1,90 @@ { - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/security-bulletin-ibm-application-performance-management-could-allow-remote-attacker-hijack-clicking-action-victim-cve-2019-4086", - "title" : "IBM Security Bulletin 1071760 (Cloud Application Performance Management)", - "url" : "https://www.ibm.com/support/pages/security-bulletin-ibm-application-performance-management-could-allow-remote-attacker-hijack-clicking-action-victim-cve-2019-4086", - "refsource" : "CONFIRM" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/157509", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-apm-cve20194086-clickjacking (157509)", - "refsource" : "XF" - } - ] - }, - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Cloud Application Performance Management 8.1.4 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 157509." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Gain Access" - } - ] - } - ] - }, - "data_version" : "4.0", - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - }, - "BM" : { - "UI" : "R", - "SCORE" : "6.100", - "A" : "N", - "AV" : "N", - "AC" : "L", - "S" : "C", - "PR" : "N", - "I" : "L", - "C" : "L" - } - } - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "references": { + "reference_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "8.1.4" - } - ] - }, - "product_name" : "Cloud Application Performance Management" - } - ] - }, - "vendor_name" : "IBM" + "name": "https://www.ibm.com/support/pages/security-bulletin-ibm-application-performance-management-could-allow-remote-attacker-hijack-clicking-action-victim-cve-2019-4086", + "title": "IBM Security Bulletin 1071760 (Cloud Application Performance Management)", + "url": "https://www.ibm.com/support/pages/security-bulletin-ibm-application-performance-management-could-allow-remote-attacker-hijack-clicking-action-victim-cve-2019-4086", + "refsource": "CONFIRM" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/157509", + "title": "X-Force Vulnerability Report", + "name": "ibm-apm-cve20194086-clickjacking (157509)", + "refsource": "XF" } - ] - } - }, - "CVE_data_meta" : { - "ID" : "CVE-2019-4086", - "DATE_PUBLIC" : "2019-09-04T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC" - }, - "data_type" : "CVE" -} + ] + }, + "data_format": "MITRE", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Cloud Application Performance Management 8.1.4 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 157509." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Gain Access" + } + ] + } + ] + }, + "data_version": "4.0", + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + }, + "BM": { + "UI": "R", + "SCORE": "6.100", + "A": "N", + "AV": "N", + "AC": "L", + "S": "C", + "PR": "N", + "I": "L", + "C": "L" + } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "8.1.4" + } + ] + }, + "product_name": "Cloud Application Performance Management" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "CVE_data_meta": { + "ID": "CVE-2019-4086", + "DATE_PUBLIC": "2019-09-04T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" + }, + "data_type": "CVE" +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4171.json b/2019/4xxx/CVE-2019-4171.json index 69fd1d30a60..15714b508ae 100644 --- a/2019/4xxx/CVE-2019-4171.json +++ b/2019/4xxx/CVE-2019-4171.json @@ -1,99 +1,99 @@ { - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/security-bulletin-security-vulnerabilties-exist-ibm-cognos-controller", - "name" : "https://www.ibm.com/support/pages/security-bulletin-security-vulnerabilties-exist-ibm-cognos-controller", - "title" : "IBM Security Bulletin 1072744 (Cognos Controller)" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/158876", - "name" : "ibm-cognos-cve20194171-info-disc (158876)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF" - } - ] - }, - "data_format" : "MITRE", - "affects" : { - "vendor" : { - "vendor_data" : [ + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Cognos Controller", - "version" : { - "version_data" : [ - { - "version_value" : "10.3.1" - }, - { - "version_value" : "10.3.0" - }, - { - "version_value" : "10.4.0" - }, - { - "version_value" : "10.4.1" - } - ] - } - } - ] - } + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/security-bulletin-security-vulnerabilties-exist-ibm-cognos-controller", + "name": "https://www.ibm.com/support/pages/security-bulletin-security-vulnerabilties-exist-ibm-cognos-controller", + "title": "IBM Security Bulletin 1072744 (Cognos Controller)" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/158876", + "name": "ibm-cognos-cve20194171-info-disc (158876)", + "title": "X-Force Vulnerability Report", + "refsource": "XF" } - ] - } - }, - "data_type" : "CVE", - "CVE_data_meta" : { - "DATE_PUBLIC" : "2019-09-09T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "ID" : "CVE-2019-4171" - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Cognos Controller 10.3.0, 10.3.1, 10.4.0, and 10.4.1 does not set the secure attribute on authorization tokens or session cookies. This could allow an attacker to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 158876." - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - }, - "BM" : { - "SCORE" : "3.700", - "UI" : "N", - "A" : "N", - "AC" : "H", - "S" : "U", - "AV" : "N", - "C" : "L", - "I" : "N", - "PR" : "N" - } - } - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } + ] + }, + "data_format": "MITRE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Cognos Controller", + "version": { + "version_data": [ + { + "version_value": "10.3.1" + }, + { + "version_value": "10.3.0" + }, + { + "version_value": "10.4.0" + }, + { + "version_value": "10.4.1" + } + ] + } + } + ] + } + } ] - } - ] - } -} + } + }, + "data_type": "CVE", + "CVE_data_meta": { + "DATE_PUBLIC": "2019-09-09T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "ID": "CVE-2019-4171" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM Cognos Controller 10.3.0, 10.3.1, 10.4.0, and 10.4.1 does not set the secure attribute on authorization tokens or session cookies. This could allow an attacker to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 158876." + } + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + }, + "BM": { + "SCORE": "3.700", + "UI": "N", + "A": "N", + "AC": "H", + "S": "U", + "AV": "N", + "C": "L", + "I": "N", + "PR": "N" + } + } + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4175.json b/2019/4xxx/CVE-2019-4175.json index 8ff7cb9f44d..91346d37e9b 100644 --- a/2019/4xxx/CVE-2019-4175.json +++ b/2019/4xxx/CVE-2019-4175.json @@ -1,99 +1,99 @@ { - "data_format" : "MITRE", - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/security-bulletin-security-vulnerabilties-exist-ibm-cognos-controller", - "title" : "IBM Security Bulletin 1072744 (Cognos Controller)", - "name" : "https://www.ibm.com/support/pages/security-bulletin-security-vulnerabilties-exist-ibm-cognos-controller" - }, - { - "title" : "X-Force Vulnerability Report", - "name" : "ibm-cognos-cve20194175-info-disc (158880)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/158880", - "refsource" : "XF" - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "E" : "U", - "RC" : "C", - "RL" : "O" - }, - "BM" : { - "A" : "N", - "SCORE" : "5.900", - "UI" : "N", - "C" : "H", - "I" : "N", - "PR" : "N", - "AC" : "H", - "S" : "U", - "AV" : "N" - } - } - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } - ] - } - ] - }, - "description" : { - "description_data" : [ - { - "value" : "IBM Cognos Controller 10.3.0, 10.3.1, 10.4.0, and 10.4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158880.", - "lang" : "eng" - } - ] - }, - "data_type" : "CVE", - "CVE_data_meta" : { - "ID" : "CVE-2019-4175", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2019-09-09T00:00:00", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "references": { + "reference_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "10.3.1" - }, - { - "version_value" : "10.3.0" - }, - { - "version_value" : "10.4.0" - }, - { - "version_value" : "10.4.1" - } - ] - }, - "product_name" : "Cognos Controller" - } - ] - }, - "vendor_name" : "IBM" + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/security-bulletin-security-vulnerabilties-exist-ibm-cognos-controller", + "title": "IBM Security Bulletin 1072744 (Cognos Controller)", + "name": "https://www.ibm.com/support/pages/security-bulletin-security-vulnerabilties-exist-ibm-cognos-controller" + }, + { + "title": "X-Force Vulnerability Report", + "name": "ibm-cognos-cve20194175-info-disc (158880)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/158880", + "refsource": "XF" } - ] - } - } -} + ] + }, + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + }, + "BM": { + "A": "N", + "SCORE": "5.900", + "UI": "N", + "C": "H", + "I": "N", + "PR": "N", + "AC": "H", + "S": "U", + "AV": "N" + } + } + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "description": { + "description_data": [ + { + "value": "IBM Cognos Controller 10.3.0, 10.3.1, 10.4.0, and 10.4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158880.", + "lang": "eng" + } + ] + }, + "data_type": "CVE", + "CVE_data_meta": { + "ID": "CVE-2019-4175", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2019-09-09T00:00:00", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "10.3.1" + }, + { + "version_value": "10.3.0" + }, + { + "version_value": "10.4.0" + }, + { + "version_value": "10.4.1" + } + ] + }, + "product_name": "Cognos Controller" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + } +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4183.json b/2019/4xxx/CVE-2019-4183.json index 30040ae41ce..1fdc4cd0c05 100644 --- a/2019/4xxx/CVE-2019-4183.json +++ b/2019/4xxx/CVE-2019-4183.json @@ -1,93 +1,93 @@ { - "description" : { - "description_data" : [ - { - "value" : "IBM Cognos Analytics 11.0, and 11.1 is vulnerable to a denial of service attack that could allow a remote user to send specially crafted requests that would consume all available CPU and memory resources. IBM X-Force ID: 158973.", - "lang" : "eng" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Denial of Service", - "lang" : "eng" - } - ] - } - ] - }, - "data_version" : "4.0", - "impact" : { - "cvssv3" : { - "BM" : { - "AV" : "N", - "AC" : "H", - "S" : "U", - "PR" : "N", - "I" : "N", - "C" : "N", - "UI" : "N", - "SCORE" : "5.900", - "A" : "H" - }, - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - } - } - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "description": { + "description_data": [ { - "product" : { - "product_data" : [ - { - "product_name" : "Cognos Analytics", - "version" : { - "version_data" : [ - { - "version_value" : "11.0" - }, - { - "version_value" : "11.1" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "value": "IBM Cognos Analytics 11.0, and 11.1 is vulnerable to a denial of service attack that could allow a remote user to send specially crafted requests that would consume all available CPU and memory resources. IBM X-Force ID: 158973.", + "lang": "eng" } - ] - } - }, - "CVE_data_meta" : { - "ID" : "CVE-2019-4183", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2019-09-13T00:00:00", - "STATE" : "PUBLIC" - }, - "data_type" : "CVE", - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/1073530", - "title" : "IBM Security Bulletin 1073530 (Cognos Analytics)", - "name" : "https://www.ibm.com/support/pages/node/1073530", - "refsource" : "CONFIRM" - }, - { - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/158973", - "name" : "ibm-cognos-cve20194183-dos (158973)", - "title" : "X-Force Vulnerability Report" - } - ] - }, - "data_format" : "MITRE" -} + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Denial of Service", + "lang": "eng" + } + ] + } + ] + }, + "data_version": "4.0", + "impact": { + "cvssv3": { + "BM": { + "AV": "N", + "AC": "H", + "S": "U", + "PR": "N", + "I": "N", + "C": "N", + "UI": "N", + "SCORE": "5.900", + "A": "H" + }, + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cognos Analytics", + "version": { + "version_data": [ + { + "version_value": "11.0" + }, + { + "version_value": "11.1" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "CVE_data_meta": { + "ID": "CVE-2019-4183", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2019-09-13T00:00:00", + "STATE": "PUBLIC" + }, + "data_type": "CVE", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/1073530", + "title": "IBM Security Bulletin 1073530 (Cognos Analytics)", + "name": "https://www.ibm.com/support/pages/node/1073530", + "refsource": "CONFIRM" + }, + { + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/158973", + "name": "ibm-cognos-cve20194183-dos (158973)", + "title": "X-Force Vulnerability Report" + } + ] + }, + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4268.json b/2019/4xxx/CVE-2019-4268.json index a9b60fdf3df..dd4fe2e44c5 100644 --- a/2019/4xxx/CVE-2019-4268.json +++ b/2019/4xxx/CVE-2019-4268.json @@ -1,99 +1,99 @@ { - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - }, - "BM" : { - "I" : "N", - "PR" : "N", - "C" : "L", - "AV" : "N", - "AC" : "L", - "S" : "U", - "A" : "N", - "UI" : "N", - "SCORE" : "5.300" - } - } - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } - ] - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 160201." - } - ] - }, - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2019-09-16T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2019-4268" - }, - "data_type" : "CVE", - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "8.0" - }, - { - "version_value" : "8.5" - }, - { - "version_value" : "9.0" - } - ] - }, - "product_name" : "WebSphere Application Server" - } - ] - }, - "vendor_name" : "IBM" + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + }, + "BM": { + "I": "N", + "PR": "N", + "C": "L", + "AV": "N", + "AC": "L", + "S": "U", + "A": "N", + "UI": "N", + "SCORE": "5.300" } - ] - } - }, - "data_format" : "MITRE", - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 884030 (WebSphere Application Server)", - "name" : "https://www.ibm.com/support/pages/node/884030", - "url" : "https://www.ibm.com/support/pages/node/884030" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/160201", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-websphere-cve20194268-info-disc (160201)", - "refsource" : "XF" - } - ] - } -} + } + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 160201." + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "DATE_PUBLIC": "2019-09-16T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2019-4268" + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "8.0" + }, + { + "version_value": "8.5" + }, + { + "version_value": "9.0" + } + ] + }, + "product_name": "WebSphere Application Server" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "data_format": "MITRE", + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 884030 (WebSphere Application Server)", + "name": "https://www.ibm.com/support/pages/node/884030", + "url": "https://www.ibm.com/support/pages/node/884030" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/160201", + "title": "X-Force Vulnerability Report", + "name": "ibm-websphere-cve20194268-info-disc (160201)", + "refsource": "XF" + } + ] + } +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4270.json b/2019/4xxx/CVE-2019-4270.json index f6adebd81c3..5e807780c35 100644 --- a/2019/4xxx/CVE-2019-4270.json +++ b/2019/4xxx/CVE-2019-4270.json @@ -1,99 +1,99 @@ { - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin Console is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 160203." - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "H", - "RL" : "O" - }, - "BM" : { - "AV" : "N", - "AC" : "L", - "S" : "C", - "I" : "L", - "PR" : "L", - "C" : "L", - "UI" : "R", - "SCORE" : "5.400", - "A" : "N" - } - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Cross-Site Scripting" - } - ] - } - ] - }, - "data_version" : "4.0", - "affects" : { - "vendor" : { - "vendor_data" : [ + "description": { + "description_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "WebSphere Application Server", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "8.0" - }, - { - "version_value" : "8.5" - }, - { - "version_value" : "9.0" - } - ] - } - } - ] - } + "lang": "eng", + "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin Console is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 160203." } - ] - } - }, - "data_type" : "CVE", - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2019-09-16T00:00:00", - "STATE" : "PUBLIC", - "ID" : "CVE-2019-4270" - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/884036", - "name" : "https://www.ibm.com/support/pages/node/884036", - "title" : "IBM Security Bulletin 884036 (WebSphere Application Server)" - }, - { - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/160203", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-websphere-cve20194270-xss (160203)" - } - ] - }, - "data_format" : "MITRE" -} + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "H", + "RL": "O" + }, + "BM": { + "AV": "N", + "AC": "L", + "S": "C", + "I": "L", + "PR": "L", + "C": "L", + "UI": "R", + "SCORE": "5.400", + "A": "N" + } + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "WebSphere Application Server", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "8.0" + }, + { + "version_value": "8.5" + }, + { + "version_value": "9.0" + } + ] + } + } + ] + } + } + ] + } + }, + "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2019-09-16T00:00:00", + "STATE": "PUBLIC", + "ID": "CVE-2019-4270" + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/884036", + "name": "https://www.ibm.com/support/pages/node/884036", + "title": "IBM Security Bulletin 884036 (WebSphere Application Server)" + }, + { + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/160203", + "title": "X-Force Vulnerability Report", + "name": "ibm-websphere-cve20194270-xss (160203)" + } + ] + }, + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4271.json b/2019/4xxx/CVE-2019-4271.json index 674280ceb04..be40efdfde4 100644 --- a/2019/4xxx/CVE-2019-4271.json +++ b/2019/4xxx/CVE-2019-4271.json @@ -1,99 +1,99 @@ { - "data_format" : "MITRE", - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/884040", - "title" : "IBM Security Bulletin 884040 (WebSphere Application Server)", - "name" : "https://www.ibm.com/support/pages/node/884040", - "refsource" : "CONFIRM" - }, - { - "name" : "ibm-websphere-cve20194271-http-pollution (160243)", - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/160243", - "refsource" : "XF" - } - ] - }, - "impact" : { - "cvssv3" : { - "BM" : { - "AC" : "L", - "S" : "U", - "AV" : "N", - "C" : "N", - "PR" : "L", - "I" : "L", - "SCORE" : "3.500", - "UI" : "R", - "A" : "N" - }, - "TM" : { - "RL" : "O", - "E" : "U", - "RC" : "C" - } - } - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Gain Access", - "lang" : "eng" - } - ] - } - ] - }, - "description" : { - "description_data" : [ - { - "value" : "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin console is vulnerable to a Client-side HTTP parameter pollution vulnerability. IBM X-Force ID: 160243.", - "lang" : "eng" - } - ] - }, - "data_type" : "CVE", - "CVE_data_meta" : { - "ID" : "CVE-2019-4271", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2019-09-03T00:00:00" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "references": { + "reference_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "8.0" - }, - { - "version_value" : "8.5" - }, - { - "version_value" : "9.0" - } - ] - }, - "product_name" : "WebSphere Application Server" - } - ] - }, - "vendor_name" : "IBM" + "url": "https://www.ibm.com/support/pages/node/884040", + "title": "IBM Security Bulletin 884040 (WebSphere Application Server)", + "name": "https://www.ibm.com/support/pages/node/884040", + "refsource": "CONFIRM" + }, + { + "name": "ibm-websphere-cve20194271-http-pollution (160243)", + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/160243", + "refsource": "XF" } - ] - } - } -} + ] + }, + "impact": { + "cvssv3": { + "BM": { + "AC": "L", + "S": "U", + "AV": "N", + "C": "N", + "PR": "L", + "I": "L", + "SCORE": "3.500", + "UI": "R", + "A": "N" + }, + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + } + } + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Gain Access", + "lang": "eng" + } + ] + } + ] + }, + "description": { + "description_data": [ + { + "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin console is vulnerable to a Client-side HTTP parameter pollution vulnerability. IBM X-Force ID: 160243.", + "lang": "eng" + } + ] + }, + "data_type": "CVE", + "CVE_data_meta": { + "ID": "CVE-2019-4271", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2019-09-03T00:00:00" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "8.0" + }, + { + "version_value": "8.5" + }, + { + "version_value": "9.0" + } + ] + }, + "product_name": "WebSphere Application Server" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + } +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4342.json b/2019/4xxx/CVE-2019-4342.json index 1d1e2f68558..a628b34a0fa 100644 --- a/2019/4xxx/CVE-2019-4342.json +++ b/2019/4xxx/CVE-2019-4342.json @@ -1,93 +1,93 @@ { - "data_format" : "MITRE", - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "name" : "https://www.ibm.com/support/pages/node/1073530", - "title" : "IBM Security Bulletin 1073530 (Cognos Analytics)", - "url" : "https://www.ibm.com/support/pages/node/1073530" - }, - { - "refsource" : "XF", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-cognos-cve20194342-xss (161421)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/161421" - } - ] - }, - "data_type" : "CVE", - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2019-09-13T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2019-4342" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "references": { + "reference_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Cognos Analytics", - "version" : { - "version_data" : [ - { - "version_value" : "11.0" - }, - { - "version_value" : "11.1" - } - ] - } - } - ] - } + "refsource": "CONFIRM", + "name": "https://www.ibm.com/support/pages/node/1073530", + "title": "IBM Security Bulletin 1073530 (Cognos Analytics)", + "url": "https://www.ibm.com/support/pages/node/1073530" + }, + { + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-cognos-cve20194342-xss (161421)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/161421" } - ] - } - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "H", - "RL" : "O" - }, - "BM" : { - "AV" : "N", - "AC" : "L", - "S" : "C", - "I" : "L", - "PR" : "L", - "C" : "L", - "UI" : "R", - "SCORE" : "5.400", - "A" : "N" - } - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Cross-Site Scripting" - } + ] + }, + "data_type": "CVE", + "CVE_data_meta": { + "STATE": "PUBLIC", + "DATE_PUBLIC": "2019-09-13T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2019-4342" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Cognos Analytics", + "version": { + "version_data": [ + { + "version_value": "11.0" + }, + { + "version_value": "11.1" + } + ] + } + } + ] + } + } ] - } - ] - }, - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "value" : "IBM Cognos Analytics 11.0 and 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 161421.", - "lang" : "eng" - } - ] - } -} + } + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "H", + "RL": "O" + }, + "BM": { + "AV": "N", + "AC": "L", + "S": "C", + "I": "L", + "PR": "L", + "C": "L", + "UI": "R", + "SCORE": "5.400", + "A": "N" + } + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "data_version": "4.0", + "description": { + "description_data": [ + { + "value": "IBM Cognos Analytics 11.0 and 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 161421.", + "lang": "eng" + } + ] + } +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4442.json b/2019/4xxx/CVE-2019-4442.json index c8316793159..55217efd40e 100644 --- a/2019/4xxx/CVE-2019-4442.json +++ b/2019/4xxx/CVE-2019-4442.json @@ -1,99 +1,99 @@ { - "data_type" : "CVE", - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2019-09-16T00:00:00", - "STATE" : "PUBLIC", - "ID" : "CVE-2019-4442" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "WebSphere Application Server", - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "8.0" - }, - { - "version_value" : "8.5" - }, - { - "version_value" : "9.0" - } - ] - } - } - ] - } - } - ] - } - }, - "data_version" : "4.0", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } + "data_type": "CVE", + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2019-09-16T00:00:00", + "STATE": "PUBLIC", + "ID": "CVE-2019-4442" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "WebSphere Application Server", + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "8.0" + }, + { + "version_value": "8.5" + }, + { + "version_value": "9.0" + } + ] + } + } + ] + } + } ] - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "E" : "U", - "RC" : "C", - "RL" : "O" - }, - "BM" : { - "PR" : "L", - "I" : "N", - "C" : "L", - "AV" : "N", - "S" : "U", - "AC" : "L", - "A" : "N", - "UI" : "N", - "SCORE" : "4.300" - } - } - }, - "description" : { - "description_data" : [ - { - "value" : "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9,0 could allow a remote attacker to traverse directories on the file system. An attacker could send a specially-crafted URL request to view arbitrary files on the system but not content. IBM X-Force ID: 163226.", - "lang" : "eng" - } - ] - }, - "data_format" : "MITRE", - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/pages/node/959021", - "title" : "IBM Security Bulletin 959021 (WebSphere Application Server)", - "name" : "https://www.ibm.com/support/pages/node/959021", - "refsource" : "CONFIRM" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/163226", - "name" : "ibm-websphere-cve20194442-info-disc (163226)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF" - } - ] - } -} + } + }, + "data_version": "4.0", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + }, + "BM": { + "PR": "L", + "I": "N", + "C": "L", + "AV": "N", + "S": "U", + "AC": "L", + "A": "N", + "UI": "N", + "SCORE": "4.300" + } + } + }, + "description": { + "description_data": [ + { + "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9,0 could allow a remote attacker to traverse directories on the file system. An attacker could send a specially-crafted URL request to view arbitrary files on the system but not content. IBM X-Force ID: 163226.", + "lang": "eng" + } + ] + }, + "data_format": "MITRE", + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/959021", + "title": "IBM Security Bulletin 959021 (WebSphere Application Server)", + "name": "https://www.ibm.com/support/pages/node/959021", + "refsource": "CONFIRM" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/163226", + "name": "ibm-websphere-cve20194442-info-disc (163226)", + "title": "X-Force Vulnerability Report", + "refsource": "XF" + } + ] + } +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4477.json b/2019/4xxx/CVE-2019-4477.json index 42e0ebe0d96..9153d544825 100644 --- a/2019/4xxx/CVE-2019-4477.json +++ b/2019/4xxx/CVE-2019-4477.json @@ -1,99 +1,99 @@ { - "CVE_data_meta" : { - "ID" : "CVE-2019-4477", - "DATE_PUBLIC" : "2019-09-16T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC" - }, - "data_type" : "CVE", - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0" - }, - { - "version_value" : "8.0" - }, - { - "version_value" : "8.5" - }, - { - "version_value" : "9.0" - } - ] - }, - "product_name" : "WebSphere Application Server" - } - ] - } - } - ] - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } + "CVE_data_meta": { + "ID": "CVE-2019-4477", + "DATE_PUBLIC": "2019-09-16T00:00:00", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "7.0" + }, + { + "version_value": "8.0" + }, + { + "version_value": "8.5" + }, + { + "version_value": "9.0" + } + ] + }, + "product_name": "WebSphere Application Server" + } + ] + } + } ] - } - ] - }, - "data_version" : "4.0", - "impact" : { - "cvssv3" : { - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - }, - "BM" : { - "AC" : "H", - "S" : "U", - "AV" : "N", - "C" : "H", - "PR" : "L", - "I" : "N", - "SCORE" : "5.300", - "UI" : "N", - "A" : "N" - } - } - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a user with access to audit logs to obtain sensitive information, caused by improper handling of command line options. IBM X-Force ID: 163997." - } - ] - }, - "data_format" : "MITRE", - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/pages/node/960290", - "name" : "https://www.ibm.com/support/pages/node/960290", - "title" : "IBM Security Bulletin 960290 (WebSphere Application Server)" - }, - { - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/163997", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-was-cve20194477-info-disc (163997)" - } - ] - } -} + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "data_version": "4.0", + "impact": { + "cvssv3": { + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + }, + "BM": { + "AC": "H", + "S": "U", + "AV": "N", + "C": "H", + "PR": "L", + "I": "N", + "SCORE": "5.300", + "UI": "N", + "A": "N" + } + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a user with access to audit logs to obtain sensitive information, caused by improper handling of command line options. IBM X-Force ID: 163997." + } + ] + }, + "data_format": "MITRE", + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/pages/node/960290", + "name": "https://www.ibm.com/support/pages/node/960290", + "title": "IBM Security Bulletin 960290 (WebSphere Application Server)" + }, + { + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/163997", + "title": "X-Force Vulnerability Report", + "name": "ibm-was-cve20194477-info-disc (163997)" + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6809.json b/2019/6xxx/CVE-2019-6809.json index b963218512a..2f1776164d1 100644 --- a/2019/6xxx/CVE-2019-6809.json +++ b/2019/6xxx/CVE-2019-6809.json @@ -1,17 +1,91 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6809", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6809", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "Modicon M580", + "version": { + "version_data": [ + { + "version_value": "firmware version prior to V2.90" + } + ] + } + }, + { + "product_name": "Modicon M340", + "version": { + "version_data": [ + { + "version_value": "firmware version prior to V3.10" + } + ] + } + }, + { + "product_name": "Modicon Premium", + "version": { + "version_data": [ + { + "version_value": "all versions" + } + ] + } + }, + { + "product_name": "Modicon Quantum", + "version": { + "version_data": [ + { + "version_value": "all versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-248: Uncaught Exception" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-248: Uncaught Exception vulnerability exists in Modicon M580 (firmware versions prior to V2.90), Modicon M340 (firmware versions prior to V3.10), Modicon Premium (all versions), Modicon Quantum (all versions), which could cause a possible denial of service when reading invalid data from the controller." } ] } diff --git a/2019/6xxx/CVE-2019-6810.json b/2019/6xxx/CVE-2019-6810.json index 8e797af56c6..b69949a3eae 100644 --- a/2019/6xxx/CVE-2019-6810.json +++ b/2019/6xxx/CVE-2019-6810.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6810", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6810", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "BMXNOR0200H Ethernet / Serial RTU module", + "version": { + "version_data": [ + { + "version_value": "all firmware versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284: Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-03/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-03/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CWE-284: Improper Access Control vulnerability exists in BMXNOR0200H Ethernet / Serial RTU module (all firmware versions), which could cause the execution of commands by unauthorized users when using IEC 60870-5-104 protocol." } ] } diff --git a/2019/6xxx/CVE-2019-6811.json b/2019/6xxx/CVE-2019-6811.json index 8e265baa252..4750022bba7 100644 --- a/2019/6xxx/CVE-2019-6811.json +++ b/2019/6xxx/CVE-2019-6811.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6811", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6811", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "Modicon Quantum 140 NOE771x1", + "version": { + "version_data": [ + { + "version_value": "version 6.9 and earlier" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Check for Unusual or Exceptional Conditions (CWE-754) " + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-253-02/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-253-02/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Check for Unusual or Exceptional Conditions (CWE-754) vulnerability exists in Modicon Quantum 140 NOE771x1 version 6.9 and earlier, which could cause denial of service when the module receives an IP fragmented packet with a length greater than 65535 bytes. The module then requires a power cycle to recover." } ] } diff --git a/2019/6xxx/CVE-2019-6813.json b/2019/6xxx/CVE-2019-6813.json index fec2455024e..95c1b0bc0ce 100644 --- a/2019/6xxx/CVE-2019-6813.json +++ b/2019/6xxx/CVE-2019-6813.json @@ -1,17 +1,76 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6813", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6813", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "CVE-2019-6813", + "product": { + "product_data": [ + { + "product_name": "BMXNOR0200H Ethernet / Serial RTU module", + "version": { + "version_data": [ + { + "version_value": "all firmware versions" + } + ] + } + }, + { + "product_name": "Modicon M340 controller", + "version": { + "version_data": [ + { + "version_value": "all firmware versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-754: Improper Check for Unusual or Exceptional Conditions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-03/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-03/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-02/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-02/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in BMXNOR0200H Ethernet / Serial RTU module (all firmware versions) and Modicon M340 controller (all firmware versions), which could cause denial of service when truncated SNMP packets on port 161/UDP are received by the device." } ] } diff --git a/2019/6xxx/CVE-2019-6826.json b/2019/6xxx/CVE-2019-6826.json index 71feaec0d0e..8f3581c3bda 100644 --- a/2019/6xxx/CVE-2019-6826.json +++ b/2019/6xxx/CVE-2019-6826.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6826", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6826", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "SoMachine HVAC", + "version": { + "version_data": [ + { + "version_value": "v2.4.1 and earlier versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-426: Untrusted Search Path" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-04/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product." } ] } diff --git a/2019/6xxx/CVE-2019-6828.json b/2019/6xxx/CVE-2019-6828.json index 7118d153fe6..d7518b8c10a 100644 --- a/2019/6xxx/CVE-2019-6828.json +++ b/2019/6xxx/CVE-2019-6828.json @@ -1,17 +1,91 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6828", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6828", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "Modicon M580", + "version": { + "version_data": [ + { + "version_value": "firmware version prior to V2.90" + } + ] + } + }, + { + "product_name": "Modicon M340", + "version": { + "version_data": [ + { + "version_value": "firmware version prior to V3.10" + } + ] + } + }, + { + "product_name": "Modicon Premium", + "version": { + "version_data": [ + { + "version_value": "all versions" + } + ] + } + }, + { + "product_name": "Modicon Quantum", + "version": { + "version_data": [ + { + "version_value": "all versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-248: Uncaught Exception" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-248: Uncaught Exception vulnerability exists Modicon M580 (firmware version prior to V2.90), Modicon M340 (firmware version prior to V3.10), Modicon Premium (all versions), and Modicon Quantum (all versions), which could cause a possible denial of service when reading specific coils and registers in the controller over Modbus." } ] } diff --git a/2019/6xxx/CVE-2019-6829.json b/2019/6xxx/CVE-2019-6829.json index c1695b0300b..3b3f51686e3 100644 --- a/2019/6xxx/CVE-2019-6829.json +++ b/2019/6xxx/CVE-2019-6829.json @@ -1,17 +1,71 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6829", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6829", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "Modicon M580", + "version": { + "version_data": [ + { + "version_value": "firmware version prior to V2.90" + } + ] + } + }, + { + "product_name": "Modicon M340", + "version": { + "version_data": [ + { + "version_value": "firmware version prior to V3.10" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A CWE-248: Uncaught Exception" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-248: Uncaught Exception vulnerability exists in Modicon M580 (firmware version prior to V2.90) and Modicon M340 (firmware version prior to V3.10), which could cause a possible denial of service when writing to specific memory addresses in the controller over Modbus." } ] } diff --git a/2019/6xxx/CVE-2019-6830.json b/2019/6xxx/CVE-2019-6830.json index c0317674024..2d96c1b7722 100644 --- a/2019/6xxx/CVE-2019-6830.json +++ b/2019/6xxx/CVE-2019-6830.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6830", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6830", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "Modicon M580", + "version": { + "version_data": [ + { + "version_value": "all versions prior to V2.80" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-248: Uncaught Exception" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-248: Uncaught Exception vulnerability exists IN Modicon M580 all versions prior to V2.80, which could cause a possible denial of service when sending an appropriately timed HTTP request to the controller." } ] } diff --git a/2019/6xxx/CVE-2019-6831.json b/2019/6xxx/CVE-2019-6831.json index 6834e084399..88753a56adc 100644 --- a/2019/6xxx/CVE-2019-6831.json +++ b/2019/6xxx/CVE-2019-6831.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6831", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6831", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "BMXNOR0200H Ethernet / Serial RTU module", + "version": { + "version_data": [ + { + "version_value": "all firmware versions" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-754: Improper Check for Unusual or Exceptional Conditions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-03/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-03/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in BMXNOR0200H Ethernet / Serial RTU module (all firmware versions), which could cause disconnection of active connections when an unusually high number of IEC 60870- 5-104 packets are received by the module on port 2404/TCP." } ] } diff --git a/2019/6xxx/CVE-2019-6832.json b/2019/6xxx/CVE-2019-6832.json index a747df4cf15..2bc7cee5db3 100644 --- a/2019/6xxx/CVE-2019-6832.json +++ b/2019/6xxx/CVE-2019-6832.json @@ -1,17 +1,71 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6832", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6832", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "spaceLYnk", + "version": { + "version_data": [ + { + "version_value": "all versions before 2.4.0" + } + ] + } + }, + { + "product_name": "Wiser for KNX", + "version": { + "version_data": [ + { + "version_value": "all versions before 2.4.0 - formerly known as homeLYnk" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-07/", + "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-225-07/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-287: Authentication vulnerability exists in spaceLYnk (all versions before 2.4.0) and Wiser for KNX (all versions before 2.4.0 - formerly known as homeLYnk), which could cause loss of control when an attacker bypasses the authentication." } ] } diff --git a/2019/6xxx/CVE-2019-6833.json b/2019/6xxx/CVE-2019-6833.json index 11194d6279c..8f43ec55087 100644 --- a/2019/6xxx/CVE-2019-6833.json +++ b/2019/6xxx/CVE-2019-6833.json @@ -1,17 +1,91 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6833", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6833", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "Magelis HMI Panels", + "version": { + "version_data": [ + { + "version_value": "all versions of HMIGTO" + }, + { + "version_value": "all versions of HMISTO" + }, + { + "version_value": "all versions of XBTGH" + }, + { + "version_value": "all versions of HMIGTU" + }, + { + "version_value": "all versions of HMIGTUX" + }, + { + "version_value": "all versions of HMISCU" + }, + { + "version_value": "all versions of HMISTU" + }, + { + "version_value": "all versions of XBTGT" + }, + { + "version_value": "all versions of XBTGT" + }, + { + "version_value": "all versions of HMIGXO" + }, + { + "version_value": "all versions of HMIGXU" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01", + "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel." } ] } diff --git a/2019/6xxx/CVE-2019-6835.json b/2019/6xxx/CVE-2019-6835.json index 4ddf075a27d..cbcd72b0a71 100644 --- a/2019/6xxx/CVE-2019-6835.json +++ b/2019/6xxx/CVE-2019-6835.json @@ -1,17 +1,76 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6835", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6835", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "U.motion Server", + "version": { + "version_data": [ + { + "version_value": "MEG6501-0001 - U.motion KNX server" + }, + { + "version_value": "MEG6501-0002 - U.motion KNX Server Plus" + }, + { + "version_value": "MEG6260-0410 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 10" + }, + { + "version_value": "MEG6260-0415 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 15" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "\u00a0Cross-Site Scripting (XSS) CWE-79\u00a0" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01", + "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cross-Site Scripting (XSS) CWE-79 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow an attacker to inject client-side script when a user visits a web page." } ] } diff --git a/2019/6xxx/CVE-2019-6836.json b/2019/6xxx/CVE-2019-6836.json index b35203c3915..04e52d6f317 100644 --- a/2019/6xxx/CVE-2019-6836.json +++ b/2019/6xxx/CVE-2019-6836.json @@ -1,17 +1,76 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6836", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6836", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "U.motion Server", + "version": { + "version_data": [ + { + "version_value": "MEG6501-0001 - U.motion KNX server" + }, + { + "version_value": "MEG6501-0002 - U.motion KNX Server Plus" + }, + { + "version_value": "MEG6260-0410 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 10" + }, + { + "version_value": "MEG6260-0415 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 15" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control: CWE-284\u00a0" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01", + "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Access Control: CWE-284 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow the file system to access the wrong file." } ] } diff --git a/2019/6xxx/CVE-2019-6837.json b/2019/6xxx/CVE-2019-6837.json index 48b3791d45a..d02627da318 100644 --- a/2019/6xxx/CVE-2019-6837.json +++ b/2019/6xxx/CVE-2019-6837.json @@ -1,17 +1,76 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6837", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6837", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "CVE-2019-6837", + "product": { + "product_data": [ + { + "product_name": "U.motion Server", + "version": { + "version_data": [ + { + "version_value": "MEG6501-0001 - U.motion KNX server" + }, + { + "version_value": "MEG6501-0002 - U.motion KNX Server Plus" + }, + { + "version_value": "MEG6260-0410 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 10" + }, + { + "version_value": "MEG6260-0415 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 15" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Server-Side Request Forgery (SSRF): CWE-918" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01", + "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Server-Side Request Forgery (SSRF): CWE-918 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could cause server configuration data to be exposed when an attacker modifies a URL." } ] } diff --git a/2019/6xxx/CVE-2019-6838.json b/2019/6xxx/CVE-2019-6838.json index 158b825927e..955525b636a 100644 --- a/2019/6xxx/CVE-2019-6838.json +++ b/2019/6xxx/CVE-2019-6838.json @@ -1,17 +1,76 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6838", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6838", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "U.motion Server", + "version": { + "version_data": [ + { + "version_value": "MEG6501-0001 - U.motion KNX server" + }, + { + "version_value": "MEG6501-0002 - U.motion KNX Server Plus" + }, + { + "version_value": "MEG6260-0410 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 10" + }, + { + "version_value": "MEG6260-0415 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 15" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control: CWE-284" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01", + "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Access Control: CWE-284 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow a user with low privileges to delete a critical file." } ] } diff --git a/2019/6xxx/CVE-2019-6839.json b/2019/6xxx/CVE-2019-6839.json index 4118928292a..c98a70e5517 100644 --- a/2019/6xxx/CVE-2019-6839.json +++ b/2019/6xxx/CVE-2019-6839.json @@ -1,17 +1,76 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6839", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6839", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "U.motion Server", + "version": { + "version_data": [ + { + "version_value": "MEG6501-0001 - U.motion KNX server" + }, + { + "version_value": "MEG6501-0002 - U.motion KNX Server Plus" + }, + { + "version_value": "MEG6260-0410 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 10" + }, + { + "version_value": "MEG6260-0415 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 15" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control: CWE-284" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01", + "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Access Control: CWE-284 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow a user with low privileges to upload a rogue file." } ] } diff --git a/2019/6xxx/CVE-2019-6840.json b/2019/6xxx/CVE-2019-6840.json index 1059724ff81..57580dc6650 100644 --- a/2019/6xxx/CVE-2019-6840.json +++ b/2019/6xxx/CVE-2019-6840.json @@ -1,17 +1,76 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6840", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6840", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric SE", + "product": { + "product_data": [ + { + "product_name": "U.motion Server", + "version": { + "version_data": [ + { + "version_value": "MEG6501-0001 - U.motion KNX server" + }, + { + "version_value": "MEG6501-0002 - U.motion KNX Server Plus" + }, + { + "version_value": "MEG6260-0410 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 10" + }, + { + "version_value": "MEG6260-0415 - U.motion KNX Server Plus" + }, + { + "version_value": "Touch 15" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Format String: CWE-134\u00a0" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01", + "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Format String: CWE-134 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow an attacker to send a crafted message to the target server, thereby causing arbitrary commands to be executed." } ] }