mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
68 lines
1.8 KiB
JSON
68 lines
1.8 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "ics-cert@hq.dhs.gov",
|
|
"ID" : "CVE-2016-9344",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "Moxa MiiNePort",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "Moxa MiiNePort"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "An issue was discovered in Moxa MiiNePort E1 versions prior to 1.8, E2 versions prior to 1.4, and E3 versions prior to 1.1. An attacker may be able to brute force an active session cookie to be able to download configuration files."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Moxa MiiNePort Session Hijack"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-343-01",
|
|
"refsource" : "MISC",
|
|
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-343-01"
|
|
},
|
|
{
|
|
"name" : "94783",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/94783"
|
|
}
|
|
]
|
|
}
|
|
}
|