diff --git a/2018/20xxx/CVE-2018-20191.json b/2018/20xxx/CVE-2018-20191.json new file mode 100644 index 00000000000..da1a4ad94be --- /dev/null +++ b/2018/20xxx/CVE-2018-20191.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20191", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20192.json b/2018/20xxx/CVE-2018-20192.json new file mode 100644 index 00000000000..ec0b69710cf --- /dev/null +++ b/2018/20xxx/CVE-2018-20192.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20192", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/7xxx/CVE-2018-7797.json b/2018/7xxx/CVE-2018-7797.json index 8fe5b48ca85..25e0aa9306f 100644 --- a/2018/7xxx/CVE-2018-7797.json +++ b/2018/7xxx/CVE-2018-7797.json @@ -52,7 +52,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A URL redirection vulnerability exists in Power Monitoring Expert, Energy Expert (formerly Power Manager) - EcoStruxureª Power Monitoring Expert (PME) v8.2 (all editions), EcoStruxureª Energy Expert 1.3 (formerly Power Manager), EcoStruxureª Power SCADA Operation (PSO) 8.2 Advanced Reports and Dashboards Module, EcoStruxureª Power Monitoring Expert (PME) v9.0, EcoStruxureª Energy Expert v2.0, and EcoStruxureªPower SCADA Operation (PSO) 9.0 Advanced Reports and Dashboards Module which could cause a phishing attack when redirected to a malicious site." + "value" : "A URL redirection vulnerability exists in Power Monitoring Expert, Energy Expert (formerly Power Manager) - EcoStruxure Power Monitoring Expert (PME) v8.2 (all editions), EcoStruxure Energy Expert 1.3 (formerly Power Manager), EcoStruxure Power SCADA Operation (PSO) 8.2 Advanced Reports and Dashboards Module, EcoStruxure Power Monitoring Expert (PME) v9.0, EcoStruxure Energy Expert v2.0, and EcoStruxure Power SCADA Operation (PSO) 9.0 Advanced Reports and Dashboards Module which could cause a phishing attack when redirected to a malicious site." } ] }, @@ -71,6 +71,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-347-01/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-347-01/" } ] diff --git a/2018/7xxx/CVE-2018-7804.json b/2018/7xxx/CVE-2018-7804.json index c799e5f386d..cb4e0380d5f 100644 --- a/2018/7xxx/CVE-2018-7804.json +++ b/2018/7xxx/CVE-2018-7804.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A URL Redirection to Untrusted Site vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where a user clicking on a specially crafted link can be redirected to a URL of the attackerÕs choosing." + "value" : "A URL Redirection to Untrusted Site vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where a user clicking on a specially crafted link can be redirected to a URL of the attacker's choosing." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/" } ] diff --git a/2018/7xxx/CVE-2018-7812.json b/2018/7xxx/CVE-2018-7812.json index 0807e06390c..86ccfb9e80e 100644 --- a/2018/7xxx/CVE-2018-7812.json +++ b/2018/7xxx/CVE-2018-7812.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/" } ] diff --git a/2018/7xxx/CVE-2018-7833.json b/2018/7xxx/CVE-2018-7833.json index b4dccac580c..c471a1acaa0 100644 --- a/2018/7xxx/CVE-2018-7833.json +++ b/2018/7xxx/CVE-2018-7833.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/" } ]