- Synchronized data.

This commit is contained in:
CVE Team 2018-11-02 13:06:33 -04:00
parent cef00a66e9
commit 6c3f93014a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
10 changed files with 26 additions and 1 deletions

View File

@ -53,6 +53,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0565",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0565"
}
]

View File

@ -53,6 +53,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0566",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0566"
}
]

View File

@ -53,6 +53,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0567",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0567"
}
]

View File

@ -53,6 +53,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0571",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0571"
}
]

View File

@ -53,6 +53,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0571",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0571"
}
]

View File

@ -53,6 +53,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0584",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0584"
}
]

View File

@ -53,6 +53,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0601",
"refsource" : "MISC",
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0601"
}
]

View File

@ -53,6 +53,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0602",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0602"
}
]

View File

@ -53,6 +53,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-270-01/",
"refsource" : "CONFIRM",
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-270-01/"
}
]

View File

@ -34,7 +34,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prior to V2.2.0, which could allow an attacker to execute arbitrary code on the targeted system when placing a specific DLL file.Schneider Electric Software Update (SESU) is installed by the following Schneider Electric software: Acti 9 Smart Test, AltivarATV320DtmLibrary, AltivarDTMLibrary, AltivarMachine340DTMLibrary, AltivarProcessATV6xxDTMLibrar, AltivarProcessATV9xxDTMLibrary, Blue, CompactNSX Firmware Update, Ecodial Advance Calculation, eConfigure, Ecoreach Software, EcoStruxure Modicon Builder, eXLhoist Configuration Software, Lexium 26 DTM Library, Lexium 28 DTM Library, Lexium 32 DTM Library, LV Motor Starter, PowerSCADA Expert, Schneider Electric Floating License Manager, Schneider Electric License Manager, Schneider Electric Motion Sizer, Schneider Electric SQL Gateway, SoMachine Basic, SoMachine Motion Software, SoMachine Motion Tools V4.3, SoMachine Software, SoMove, SoSafe Configurable, SoSafe Programmable V2.1, TeSysDTM, Unity Loader, Unity Pro, Vijeo Citect, Vijeo Designer, Vijeo Designer Opti 6.1, Vijeo XD, Web Gate Client Files"
"value" : "A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prior to V2.2.0, which could allow an attacker to execute arbitrary code on the targeted system when placing a specific DLL file. Schneider Electric Software Update (SESU) is installed by the following Schneider Electric software: Acti 9 Smart Test, AltivarATV320DtmLibrary, AltivarDTMLibrary, AltivarMachine340DTMLibrary, AltivarProcessATV6xxDTMLibrary, AltivarProcessATV9xxDTMLibrary, Blue, CompactNSX Firmware Update, Ecodial Advance Calculation, eConfigure, Ecoreach Software, EcoStruxure Modicon Builder, eXLhoist Configuration Software, Lexium 26 DTM Library, Lexium 28 DTM Library, Lexium 32 DTM Library, LV Motor Starter, PowerSCADA Expert, Schneider Electric Floating License Manager, Schneider Electric License Manager, Schneider Electric Motion Sizer, Schneider Electric SQL Gateway, SoMachine Basic, SoMachine Motion Software, SoMachine Motion Tools V4.3, SoMachine Software, SoMove, SoSafe Configurable, SoSafe Programmable V2.1, TeSysDTM, Unity Loader, Unity Pro, Vijeo Citect, Vijeo Designer, Vijeo Designer Opti 6.1, Vijeo XD, Web Gate Client Files"
}
]
},
@ -53,6 +53,13 @@
"references" : {
"reference_data" : [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-305-02",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-305-02"
},
{
"name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-298-01/",
"refsource" : "CONFIRM",
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-298-01/"
}
]