- Synchronized data.

This commit is contained in:
CVE Team 2018-06-14 17:05:23 -04:00
parent 57671ada33
commit b9b6de43c3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
5 changed files with 132 additions and 87 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "productcert@siemens.com",
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2016-7165",
"STATE" : "PUBLIC"
},
@ -11,96 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Primary Setup Tool (PST), SIMATIC IT Production Suite, SIMATIC NET PC-Software, SIMATIC PCS 7 V7.1, SIMATIC PCS 7 V8.0, SIMATIC PCS 7 V8.1, SIMATIC PCS 7 V8.2, SIMATIC STEP 7 (TIA Portal) V13, SIMATIC STEP 7 V5.X, SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced, SIMATIC WinCC (TIA Portal) Professional V13, SIMATIC WinCC (TIA Portal) Professional V14, SIMATIC WinCC Runtime Professional V13, SIMATIC WinCC Runtime Professional V14, SIMATIC WinCC V7.0 SP2 and earlier versions, SIMATIC WinCC V7.0 SP3, SIMATIC WinCC V7.2, SIMATIC WinCC V7.3, SIMATIC WinCC V7.4, SIMIT V9.0, SINEMA Remote Connect Client, SINEMA Server, SOFTNET Security Client V5.0, Security Configuration Tool (SCT), TeleControl Server Basic, WinAC RTX 2010 SP2, WinAC RTX F 2010 SP2",
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "Primary Setup Tool (PST) : All versions < V4.2 HF1"
},
{
"version_value" : "SIMATIC IT Production Suite : All versions < V7.0 SP1 HFX 2"
},
{
"version_value" : "SIMATIC NET PC-Software : All versions < V14"
},
{
"version_value" : "SIMATIC PCS 7 V7.1 : All versions"
},
{
"version_value" : "SIMATIC PCS 7 V8.0 : All versions"
},
{
"version_value" : "SIMATIC PCS 7 V8.1 : All versions"
},
{
"version_value" : "SIMATIC PCS 7 V8.2 : All versions < V8.2 SP1"
},
{
"version_value" : "SIMATIC STEP 7 (TIA Portal) V13 : All versions < V13 SP2"
},
{
"version_value" : "SIMATIC STEP 7 V5.X : All versions < V5.5 SP4 HF11"
},
{
"version_value" : "SIMATIC WinCC (TIA Portal) Basic, Comfort, Advanced : All versions < V14"
},
{
"version_value" : "SIMATIC WinCC (TIA Portal) Professional V13 : All versions < V13 SP2"
},
{
"version_value" : "SIMATIC WinCC (TIA Portal) Professional V14 : All versions < V14 SP1"
},
{
"version_value" : "SIMATIC WinCC Runtime Professional V13 : All versions < V13 SP2"
},
{
"version_value" : "SIMATIC WinCC Runtime Professional V14 : All versions < V14 SP1"
},
{
"version_value" : "SIMATIC WinCC V7.0 SP2 and earlier versions : All versions < V7.0 SP2 Upd 12"
},
{
"version_value" : "SIMATIC WinCC V7.0 SP3 : All versions < V7.0 SP3 Upd 8"
},
{
"version_value" : "SIMATIC WinCC V7.2 : All versions < V7.2 Upd 14"
},
{
"version_value" : "SIMATIC WinCC V7.3 : All versions < V7.3 Upd 11"
},
{
"version_value" : "SIMATIC WinCC V7.4 : All versions < V7.4 SP1"
},
{
"version_value" : "SIMIT V9.0 : All versions < V9.0 SP1"
},
{
"version_value" : "SINEMA Remote Connect Client : All versions < V1.0 SP3"
},
{
"version_value" : "SINEMA Server : All versions < V13 SP2"
},
{
"version_value" : "SOFTNET Security Client V5.0 : All versions"
},
{
"version_value" : "Security Configuration Tool (SCT) : All versions < V4.3 HF1"
},
{
"version_value" : "TeleControl Server Basic : All versions < V3.0 SP2"
},
{
"version_value" : "WinAC RTX 2010 SP2 : All versions"
},
{
"version_value" : "WinAC RTX F 2010 SP2 : All versions"
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "Siemens AG"
"vendor_name" : "n/a"
}
]
}
@ -122,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "CWE-284: Improper Access Control"
"value" : "n/a"
}
]
}

View File

@ -98,7 +98,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC Automation Tool (All versions < V3.0), SIMATIC NET PC-Software (All versions < V14 SP1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1), SIMATIC STEP 7 V5.X (All versions < V5.6), SIMATIC WinAC RTX 2010 SP2 (All versions), SIMATIC WinAC RTX F 2010 SP2 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1), SIMATIC WinCC V7.2 and prior (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Update 15), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd1), SIMATIC WinCC flexible 2008 (All versions < flexible 2008 SP5), SINAUT ST7CC (All versions), SINEMA Server (All versions < V14), SINUMERIK 808D Programming Tool (All versions < V4.7 SP4 HF2), SMART PC Access (All versions < V2.3), STEP 7 - Micro/WIN SMART (All versions < V2.3), Security Configuration Tool (SCT) (All versions < V5.0). Specially crafted PROFINET DCP broadcast packets sent to the affected products on alocal Ethernet segment (Layer 2) could cause a Denial-of-Service condition of someservices. The services require manual restart to recover."
"value" : "A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC Automation Tool (All versions < V3.0), SIMATIC NET PC-Software (All versions < V14 SP1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1), SIMATIC STEP 7 V5.X (All versions < V5.6), SIMATIC WinAC RTX 2010 SP2 (All versions), SIMATIC WinAC RTX F 2010 SP2 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1), SIMATIC WinCC V7.2 and prior (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Update 15), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd1), SIMATIC WinCC flexible 2008 (All versions < flexible 2008 SP5), SINAUT ST7CC (All versions), SINEMA Server (All versions < V14), SINUMERIK 808D Programming Tool (All versions < V4.7 SP4 HF2), SMART PC Access (All versions < V2.3), STEP 7 - Micro/WIN SMART (All versions < V2.3), Security Configuration Tool (SCT) (All versions < V5.0). Specially crafted PROFINET DCP broadcast packets sent to the affected products on a local Ethernet segment (Layer 2) could cause a Denial-of-Service condition of some services. The services require manual restart to recover."
}
]
},

View File

@ -2,7 +2,30 @@
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-12420",
"STATE" : "RESERVED"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,33 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "IceHrm before 23.0.1.OS has a risky usage of a hashed password in a request."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/gamonoid/icehrm/commit/025a8283ab5d679ff99a6b82398e4c8efed1ad9d",
"refsource" : "CONFIRM",
"url" : "https://github.com/gamonoid/icehrm/commit/025a8283ab5d679ff99a6b82398e4c8efed1ad9d"
},
{
"name" : "https://github.com/gamonoid/icehrm/releases/tag/v23.0.1.OS",
"refsource" : "CONFIRM",
"url" : "https://github.com/gamonoid/icehrm/releases/tag/v23.0.1.OS"
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-12423",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "In Synapse before 0.31.2, unauthorised users can hijack rooms when there is no m.room.power_levels event in force."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://bugs.debian.org/901549",
"refsource" : "MISC",
"url" : "https://bugs.debian.org/901549"
},
{
"name" : "https://github.com/matrix-org/matrix-doc/issues/1304",
"refsource" : "MISC",
"url" : "https://github.com/matrix-org/matrix-doc/issues/1304"
},
{
"name" : "https://matrix.org/blog/2018/06/14/security-update-synapse-0-31-2/",
"refsource" : "MISC",
"url" : "https://matrix.org/blog/2018/06/14/security-update-synapse-0-31-2/"
}
]
}
}

View File

@ -41,7 +41,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "On Windows only, with a specifically crafted configuration file an attacker could get PE client tools to load arbitrary code with privilege escalation."
"value" : "On Windows only, with a specifically crafted configuration file an attacker could get Puppet PE client tools (aka pe-client-tools) 16.4.x prior to 16.4.6, 17.3.x prior to 17.3.6, and 18.1.x prior to 18.1.2 to load arbitrary code with privilege escalation."
}
]
},
@ -60,6 +60,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://puppet.com/security/cve/CVE-2018-6516",
"refsource" : "CONFIRM",
"url" : "https://puppet.com/security/cve/CVE-2018-6516"
}
]