"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-07-03 15:00:58 +00:00
parent 486cafafb1
commit d7952deb7b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
7 changed files with 117 additions and 4 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11426",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-105.md",
"url": "https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-105.md"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11427",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-106.md",
"url": "https://github.com/klsecservices/Advisories/blob/master/KL-MOXA-2018-106.md"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "REDHAT",
"name": "RHBA-2019:1605",
"url": "https://access.redhat.com/errata/RHBA-2019:1605"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1636",
"url": "https://access.redhat.com/errata/RHSA-2019:1636"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "REDHAT",
"name": "RHBA-2019:1605",
"url": "https://access.redhat.com/errata/RHBA-2019:1605"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1636",
"url": "https://access.redhat.com/errata/RHSA-2019:1636"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "BID",
"name": "108747",
"url": "http://www.securityfocus.com/bid/108747"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1636",
"url": "https://access.redhat.com/errata/RHSA-2019:1636"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1690",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00004.html"
},
{
"refsource": "BID",
"name": "108998",
"url": "http://www.securityfocus.com/bid/108998"
}
]
}

View File

@ -63,6 +63,11 @@
"title": "X-Force Vulnerability Report",
"name": "ibm-guardium-cve20194292-file-upload (160698)",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/160698"
},
{
"refsource": "BID",
"name": "109005",
"url": "http://www.securityfocus.com/bid/109005"
}
]
},