- Synchronized data.

This commit is contained in:
CVE Team 2018-11-02 14:06:44 -04:00
parent 6c3f93014a
commit 740353fca3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 55 additions and 1 deletions

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-18904",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-18905",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-18906",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -34,7 +34,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prior to V2.2.0, which could allow an attacker to execute arbitrary code on the targeted system when placing a specific DLL file. Schneider Electric Software Update (SESU) is installed by the following Schneider Electric software: Acti 9 Smart Test, AltivarATV320DtmLibrary, AltivarDTMLibrary, AltivarMachine340DTMLibrary, AltivarProcessATV6xxDTMLibrary, AltivarProcessATV9xxDTMLibrary, Blue, CompactNSX Firmware Update, Ecodial Advance Calculation, eConfigure, Ecoreach Software, EcoStruxure Modicon Builder, eXLhoist Configuration Software, Lexium 26 DTM Library, Lexium 28 DTM Library, Lexium 32 DTM Library, LV Motor Starter, PowerSCADA Expert, Schneider Electric Floating License Manager, Schneider Electric License Manager, Schneider Electric Motion Sizer, Schneider Electric SQL Gateway, SoMachine Basic, SoMachine Motion Software, SoMachine Motion Tools V4.3, SoMachine Software, SoMove, SoSafe Configurable, SoSafe Programmable V2.1, TeSysDTM, Unity Loader, Unity Pro, Vijeo Citect, Vijeo Designer, Vijeo Designer Opti 6.1, Vijeo XD, Web Gate Client Files"
"value" : "A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prior to V2.2.0, which could allow an attacker to execute arbitrary code on the targeted system when placing a specific DLL file."
}
]
},