diff --git a/LICENSE.md b/LICENSE.md index c7d2135d7c..51d9ed194d 100644 --- a/LICENSE.md +++ b/LICENSE.md @@ -1,4 +1,4 @@ -Copyright ©2018 Carnegie Mellon University. +Copyright ©2019 Carnegie Mellon University. This archive is funded and supported by Department of Homeland Security under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for diff --git a/README.md b/README.md index 58ee7133d4..23e92d4ae9 100644 --- a/README.md +++ b/README.md @@ -1,10 +1,12 @@ # CERT Coordination Center Vulnerability Data Archive -Release 2018-11-06 +Release 2019-05-14 ### Change Log ### +2019-05-14 Updated data + 2018-11-06 Updated data 2018-01-30 Updated data diff --git a/data/0/vu_990900/vu_990900.json b/data/0/vu_990900/vu_990900.json index 2edd9117a7..df8355d4e7 100644 --- a/data/0/vu_990900/vu_990900.json +++ b/data/0/vu_990900/vu_990900.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "CVE-2003-0702", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2003-09-05T13:30:06-04:00", "DateFirstPublished": "", "DateLastUpdated": "2003-11-19T11:44:00-05:00", diff --git a/data/1/vu_176301/vu_176301.json b/data/1/vu_176301/vu_176301.json index 2d95c2323e..d6aa331507 100644 --- a/data/1/vu_176301/vu_176301.json +++ b/data/1/vu_176301/vu_176301.json @@ -39,7 +39,7 @@ "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", "DateCreated": "2018-09-10T10:06:43-04:00", "DateFirstPublished": "2018-10-06T19:34:55-04:00", - "DateLastUpdated": "2018-10-16T14:52:00-04:00", + "DateLastUpdated": "2018-12-11T09:21:00-05:00", "DatePublic": "2018-10-06T00:00:00", "Description": "CWE 798: \u200bUse of Hard-Coded Credentials - CVE\u20132018-5399\nThe DCU 210E firmware contains an undocumented Dropbear SSH server with a hardcoded username and password. The password is easily susceptible to cracking. CWE-346:\u200bOrigin Validation Error - CVE\u20132018-5400\nThe Auto-Maskin products utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices. CWE-319:\u200b Cleartext Transmission of Sensitive Information - CVE\u20132018-5401\nThe devices transmit process control information via unencrypted Modbus communications. CWE-319:\u200b Cleartext Transmission of Sensitive Information - CVE\u20132018-5402\nThe embedded webserver uses unencrypted plaintext for the transmission of the administrator PIN.", "ID": "VU#176301", @@ -50,7 +50,7 @@ "Overview": "Auto-Maskin RP remote panels and DCU controls units are used to monitor and control ship engines. The units have several authentication and encryption vulnerabilities which can allow attackers to access the units and control connected engines.", "References": "", "Resolution": "CERT/CC is currently unaware of an update to address the vulnerabilities.", - "Revision": 14, + "Revision": 16, "SystemsAffectedPreamble": "", "ThanksAndCredit": "Thanks to Brian Satira and Brian Olson for reporting this vulnerability.", "Title": "Auto-Maskin DCU 210E RP 210E and Marine Pro Observer App", diff --git a/data/11/vu_581311/vu_581311.json b/data/11/vu_581311/vu_581311.json index ae4527d5f5..69c07b28e6 100644 --- a/data/11/vu_581311/vu_581311.json +++ b/data/11/vu_581311/vu_581311.json @@ -37,7 +37,7 @@ "CVSS_TemporalVector": "E:POC/RL:OF/RC:C", "DateCreated": "2018-06-28T11:57:32-04:00", "DateFirstPublished": "2018-09-26T09:07:40-04:00", - "DateLastUpdated": "2018-10-30T08:43:00-04:00", + "DateLastUpdated": "2018-11-08T13:58:00-05:00", "DatePublic": "2018-09-18T00:00:00", "Description": "CWE-306: Missing Authentication for Critical Function - CVE-2018-5393 EAP Controller for Linux utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode. CWE-502: Deserialization of Untrusted Data - CVE-2015-6420 EAP Controller for Linux bundles a vulnerable version of Apache commons-collections v3.2.1 with the software, which appears to be the root cause of the vulnerability. Therefore, EAP Controller v2.5.3 and earlier are vulnerable to CVE-2015-6420 as documented in VU#576313. EAP Controller v2.5.3 and earlier for Linux are affected by both vulnerabilities.", "ID": "VU#581311", @@ -59,8 +59,8 @@ "http://cwe.mitre.org/data/definitions/306.html", "http://cwe.mitre.org/data/definitions/502.html" ], - "Resolution": "There is currently no available update to EAP Controller to fully address the vulnerability. However, affected users may take the following actions to help mitigate and reduce risk. As described in VU#576313, updating the vulnerable libraries does not necessarily eliminate the vulnerability in all scenarios.", - "Revision": 97, + "Resolution": "The Omada Controller software v3.0.2 and later are not affected by this issue. Software download is available on the TP-Link support website. If older software must be used, users can help mitigate and reduce risk by updating the vulnerable libraries does not necessarily eliminate the vulnerability in all scenarios, as described in As described in VU#576313.", + "Revision": 103, "SystemsAffectedPreamble": "", "ThanksAndCredit": "Thanks to Liu Zhu, of Huawei Weiran Lab for reporting this vulnerability.", "Title": "TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks", diff --git a/data/11/vu_991211/vu_991211.json b/data/11/vu_991211/vu_991211.json index 26ce382f71..33455ee506 100644 --- a/data/11/vu_991211/vu_991211.json +++ b/data/11/vu_991211/vu_991211.json @@ -15,26 +15,26 @@ "CVE-2008-5077", "CVE-2009-0021" ], - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2009-01-08T10:50:49-05:00", "DateFirstPublished": "", "DateLastUpdated": "2009-01-09T10:20:00-05:00", diff --git a/data/13/vu_608413/vu_608413.json b/data/13/vu_608413/vu_608413.json new file mode 100644 index 0000000000..c58454b0f3 --- /dev/null +++ b/data/13/vu_608413/vu_608413.json @@ -0,0 +1,62 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-05-09T09:06:37-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-09T14:58:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#608413", + "IDNumber": "608413", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": [ + "Jay Angus", + "ICS-CERT", + "Report #15" + ], + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 5, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Neptune web page suffers from broken authentication", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/13/vu_756913/vendor_molr-b7ehxb.json b/data/13/vu_756913/vendor_molr-b7ehxb.json new file mode 100644 index 0000000000..c075d44da4 --- /dev/null +++ b/data/13/vu_756913/vendor_molr-b7ehxb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-13T08:35:00-05:00", + "DateNotified": "2018-12-05T00:00:00", + "DateResponded": "", + "ID": "VU#756913", + "Revision": 1, + "Status": "Affected", + "Vendor": "Pixar Animation Studios", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7EHXB", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/13/vu_756913/vu_756913.json b/data/13/vu_756913/vu_756913.json new file mode 100644 index 0000000000..c6688b0a5d --- /dev/null +++ b/data/13/vu_756913/vu_756913.json @@ -0,0 +1,67 @@ +{ + "Author": "This document was written by Madison Oliver.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2018-5411", + "CVSS_AccessComplexity": "L", + "CVSS_AccessVector": "L", + "CVSS_Authenication": "S", + "CVSS_AvailabilityImpact": "P", + "CVSS_BaseScore": 3.2, + "CVSS_BaseVector": "AV:L/AC:L/Au:S/C:N/I:P/A:P", + "CVSS_CollateralDamagePotential": "L", + "CVSS_ConfidentialityImpact": "N", + "CVSS_EnvironmentalScore": 0.81340236580705, + "CVSS_EnvironmentalVector": "CDP:L/TD:L/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "POC", + "CVSS_IntegrityImpact": "P", + "CVSS_RemediationLevel": "OF", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "L", + "CVSS_TemporalScore": 2.5, + "CVSS_TemporalVector": "E:POC/RL:OF/RC:C", + "DateCreated": "2018-08-20T08:47:03-04:00", + "DateFirstPublished": "2018-12-13T09:12:46-05:00", + "DateLastUpdated": "2019-01-28T12:04:00-05:00", + "DatePublic": "2018-12-12T00:00:00", + "Description": "Pixar's Tractor software, versions 2.2 and earlier, contain a stored cross-site scripting vulnerability (CWE-79) in the field that allows a user to add a note to an existing node. The stored information is displayed when a user requests information about the node. An attacker could insert JavaScript into this note field that is then saved and displayed to the end user.", + "ID": "VU#756913", + "IDNumber": "756913", + "IPProtocol": "", + "Impact": "An authenticated attacker might include JavaScript that could execute on an authenticated user's system, which could lead to website redirects, session cookie hijacking, social engineering, and other impacts. Since the attacker's script is stored with the information about the node, all other users with access to this data are also vulnerable.", + "Keywords": [ + "Pixar", + "Tractor", + "rendering software", + "stored XSS", + "CVE-2018-5411" + ], + "Overview": "Pixar's Tractor network rendering software is vulnerable to stored cross-site scripting which may allow an attacker to execute arbitrary JavaScript.", + "References": [ + "https://cwe.mitre.org/data/definitions/79.html", + "https://renderman.pixar.com/product/tractor" + ], + "Resolution": "Apply an update\nPixar has released an updated version of this software that addresses this vulnerability, Tractor version 2.3 (build 1923604). Affected users should update to this version.", + "Revision": 55, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to the reporter who wishes to remain anonymous.", + "Title": "Pixar Tractor contains a stored cross-site scripting vulnerability", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "1", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/13/vu_990913/vu_990913.json b/data/13/vu_990913/vu_990913.json index e0cbdfa02f..3e4b50b0dc 100644 --- a/data/13/vu_990913/vu_990913.json +++ b/data/13/vu_990913/vu_990913.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2007-06-04T07:26:19-04:00", "DateFirstPublished": "", "DateLastUpdated": "2007-06-04T07:29:00-04:00", diff --git a/data/15/vu_171515/vu_171515.json b/data/15/vu_171515/vu_171515.json new file mode 100644 index 0000000000..610eb61465 --- /dev/null +++ b/data/15/vu_171515/vu_171515.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2019-8563", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-03-08T11:02:41-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-03-28T11:32:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#171515", + "IDNumber": "171515", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 6, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Array unshift/shift should not race against the AI in the compiler thread", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/15/vu_174715/vendor_tnoy-badkzb.json b/data/15/vu_174715/vendor_tnoy-badkzb.json new file mode 100644 index 0000000000..aff2917943 --- /dev/null +++ b/data/15/vu_174715/vendor_tnoy-badkzb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-08T17:39:00-04:00", + "DateNotified": "2019-01-25T14:32:49-05:00", + "DateResponded": "", + "ID": "VU#174715", + "Revision": 5, + "Status": "Affected", + "Vendor": "AutoMobility Distribution Inc", + "VendorInformation": "MyCar is one of AutoMobility Distribution's brands.", + "VendorRecordID": "TNOY-BADKZB", + "VendorReferences": "https://mycarcontrols.com/", + "VendorStatement": "On behalf of the ownership of MyCar Controls, We have been made aware of a vulnerability issue in our systems late in January 2019. Since then, all the resources at our disposal have been used to promptly address the situation, and we have fully resolved the issue. During this vulnerability period, no actual incident or issue with compromised privacy or functionality has been reported to us or detected by our systems. Rest assured, the entire organization is focused on making our product the most secure and versatile product in the remote starter industry. Passion, hard work and accountability will always be the hallmarks of our organization. We thank you for your understanding and continued support. The AutoMobility Management Team" +} \ No newline at end of file diff --git a/data/15/vu_174715/vu_174715.json b/data/15/vu_174715/vu_174715.json new file mode 100644 index 0000000000..6adcf1d7ea --- /dev/null +++ b/data/15/vu_174715/vu_174715.json @@ -0,0 +1,63 @@ +{ + "Author": "This document was written by Trent Novelly.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2019-9493 ", + "CVSS_AccessComplexity": "L", + "CVSS_AccessVector": "N", + "CVSS_Authenication": "N", + "CVSS_AvailabilityImpact": "P", + "CVSS_BaseScore": 7.5, + "CVSS_BaseVector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "CVSS_CollateralDamagePotential": "L", + "CVSS_ConfidentialityImpact": "P", + "CVSS_EnvironmentalScore": 1.56860981566523, + "CVSS_EnvironmentalVector": "CDP:L/TD:L/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "POC", + "CVSS_IntegrityImpact": "P", + "CVSS_RemediationLevel": "OF", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "L", + "CVSS_TemporalScore": 5.9, + "CVSS_TemporalVector": "E:POC/RL:OF/RC:C", + "DateCreated": "2019-01-23T14:06:13-05:00", + "DateFirstPublished": "2019-04-08T17:16:02-04:00", + "DateLastUpdated": "2019-04-12T10:05:00-04:00", + "DatePublic": "2019-04-08T00:00:00", + "Description": "MyCar is a small aftermarket telematics unit from AutoMobility Distribution Inc. MyCar add smartphone-controlled geolocation, remote start/stop and lock/unlock capabilities to a vehicle with a compatible remote start unit. The MyCar Controls mobile application contains hard-coded admin credentials (CWE-798) which can be used in place of a user's username and password to communicate with the server endpoint for a target user's account. This vulnerability affects versions prior to 3.4.24 on iOS and prior to 4.1.2 on Android.", + "ID": "VU#174715", + "IDNumber": "174715", + "IPProtocol": "", + "Impact": "A remote un-authenticated attacker may be able to send commands to and retrieve data from a target MyCar unit. This may allow the attacker to learn the location of a target, or gain unauthorized physical access to a vehicle.", + "Keywords": "IoT", + "Overview": "The MyCar Controls mobile applications prior to v3.4.24 on iOS and prior to v4.1.2 on Android contains hard-coded admin credentials.", + "References": [ + "https://mycarcontrols.com/", + "https://cwe.mitre.org/data/definitions/798.html", + "https://itunes.apple.com/us/app/mycar-controls/id1126511815", + "https://play.google.com/store/apps/details?id=app.com.automobility.mycar.control" + ], + "Resolution": "Update Phone App\nAutoMobility has updated their mobile apps to remove the hard coded credentials. On iOS the updated version is v3.4.24, and on Android the updated version is v4.1.2. Additionally the admin credentials in old versions of the mobile application have been revoked.", + "Revision": 19, + "SystemsAffectedPreamble": "The MyCar unit and corresponding mobile application may be rebranded and sold by other vendors as something other than MyCar. Other brands include: Carlink\nLinkr\nVisions MyCar\nMyCar Kia\nThese brands have also been updated.", + "ThanksAndCredit": "Thanks to Jmaxxz for reporting this vulnerability.", + "Title": "MyCar Controls uses hard-coded credentials", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7mks6.json b/data/15/vu_741315/vendor_molr-b7mks6.json new file mode 100644 index 0000000000..db386c03f0 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7mks6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T10:11:00-05:00", + "DateNotified": "2018-12-19T00:00:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 2, + "Status": "Affected", + "Vendor": "MooseFS", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MKS6", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7mktw.json b/data/15/vu_741315/vendor_molr-b7mktw.json new file mode 100644 index 0000000000..a74b5eb45d --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7mktw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T10:12:00-05:00", + "DateNotified": "2018-12-19T00:00:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Affected", + "Vendor": "Atmo O", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MKTW", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7mku8.json b/data/15/vu_741315/vendor_molr-b7mku8.json new file mode 100644 index 0000000000..2f82628682 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7mku8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T10:12:00-05:00", + "DateNotified": "2018-12-19T00:00:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Affected", + "Vendor": "fuse-nfs", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MKU8", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7mkuj.json b/data/15/vu_741315/vendor_molr-b7mkuj.json new file mode 100644 index 0000000000..ee69b9f4bc --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7mkuj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T10:13:00-05:00", + "DateNotified": "2018-12-19T00:00:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Affected", + "Vendor": "RedFS", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MKUJ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7mkuq.json b/data/15/vu_741315/vendor_molr-b7mkuq.json new file mode 100644 index 0000000000..47e64965fe --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7mkuq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T10:13:00-05:00", + "DateNotified": "2018-12-19T00:00:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Affected", + "Vendor": "OpenDedup", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MKUQ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7mkuy.json b/data/15/vu_741315/vendor_molr-b7mkuy.json new file mode 100644 index 0000000000..6f87cabfb9 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7mkuy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T10:13:00-05:00", + "DateNotified": "2018-12-19T00:00:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Affected", + "Vendor": "SrcDemo2", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MKUY", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7mkvq.json b/data/15/vu_741315/vendor_molr-b7mkvq.json new file mode 100644 index 0000000000..d4c592a5f5 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7mkvq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T10:15:00-05:00", + "DateNotified": "2018-12-10T00:00:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Affected", + "Vendor": "Google", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MKVQ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7ml6k.json b/data/15/vu_741315/vendor_molr-b7ml6k.json new file mode 100644 index 0000000000..772e1d8d0e --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7ml6k.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T10:29:00-05:00", + "DateNotified": "2018-12-19T14:28:56-05:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Affected", + "Vendor": "FtpUse", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7ML6K", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7ms8r.json b/data/15/vu_741315/vendor_molr-b7ms8r.json new file mode 100644 index 0000000000..b7a9a2fcf0 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7ms8r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T15:40:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Cuemounter", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MS8R", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7ms99.json b/data/15/vu_741315/vendor_molr-b7ms99.json new file mode 100644 index 0000000000..12d6ae93b1 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7ms99.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T15:58:00-05:00", + "DateNotified": "2018-12-20T00:00:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 3, + "Status": "Affected", + "Vendor": "encfs4win", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MS99", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7msb4.json b/data/15/vu_741315/vendor_molr-b7msb4.json new file mode 100644 index 0000000000..95a8aa7632 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7msb4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-01-15T11:31:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 3, + "Status": "Affected", + "Vendor": "Keybase", + "VendorInformation": "See Keybase security advisory 003 for more details: https://keybase.io/docs/secadv/kb003", + "VendorRecordID": "MOLR-B7MSB4", + "VendorReferences": "https://keybase.io/docs/secadv/kb003", + "VendorStatement": "After Dokan released a version containing this fix, Keybase added the upgraded package version 1.2.1.2000 and added a check to not mount to older drivers, and included these in a hotfix update, version 2.12.3-20181221135356+d161abd500." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7msbc.json b/data/15/vu_741315/vendor_molr-b7msbc.json new file mode 100644 index 0000000000..8abfcb8f43 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7msbc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T15:54:00-05:00", + "DateNotified": "2018-12-20T00:00:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 3, + "Status": "Affected", + "Vendor": "MLV Filesystem", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MSBC", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7msbj.json b/data/15/vu_741315/vendor_molr-b7msbj.json new file mode 100644 index 0000000000..9212f26427 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7msbj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T15:44:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Affected", + "Vendor": "MSSQLFS", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MSBJ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7msbn.json b/data/15/vu_741315/vendor_molr-b7msbn.json new file mode 100644 index 0000000000..476dc2f81a --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7msbn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T15:57:00-05:00", + "DateNotified": "2018-12-20T00:00:00", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 2, + "Status": "Affected", + "Vendor": "Ninefs", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MSBN", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7msbz.json b/data/15/vu_741315/vendor_molr-b7msbz.json new file mode 100644 index 0000000000..ccdaa3fb3d --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7msbz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T15:45:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "Peonefs", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MSBZ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7mscb.json b/data/15/vu_741315/vendor_molr-b7mscb.json new file mode 100644 index 0000000000..1d2211c5d3 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7mscb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T15:51:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "Shaman.Dokan.Warc", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MSCB", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7mscq.json b/data/15/vu_741315/vendor_molr-b7mscq.json new file mode 100644 index 0000000000..b4d961a33e --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7mscq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T15:46:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Affected", + "Vendor": "WinUnionFS", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MSCQ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vendor_molr-b7mscy.json b/data/15/vu_741315/vendor_molr-b7mscy.json new file mode 100644 index 0000000000..68f9ac8c83 --- /dev/null +++ b/data/15/vu_741315/vendor_molr-b7mscy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T15:46:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#741315", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Win-SSHFS", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B7MSCY", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/15/vu_741315/vu_741315.json b/data/15/vu_741315/vu_741315.json new file mode 100644 index 0000000000..88e8d15dc5 --- /dev/null +++ b/data/15/vu_741315/vu_741315.json @@ -0,0 +1,69 @@ +{ + "Author": "This document was written by Madison Oliver.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2018-5410", + "CVSS_AccessComplexity": "L", + "CVSS_AccessVector": "L", + "CVSS_Authenication": "S", + "CVSS_AvailabilityImpact": "N", + "CVSS_BaseScore": 5.2, + "CVSS_BaseVector": "AV:L/AC:L/Au:S/C:C/I:P/A:N", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 4.337658584028, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "F", + "CVSS_IntegrityImpact": "P", + "CVSS_RemediationLevel": "OF", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 4.3, + "CVSS_TemporalVector": "E:F/RL:OF/RC:C", + "DateCreated": "2018-11-30T16:25:17-05:00", + "DateFirstPublished": "2018-12-20T15:49:53-05:00", + "DateLastUpdated": "2019-01-15T11:39:00-05:00", + "DatePublic": "2018-12-21T00:00:00", + "Description": "CWE-121: Stack-based Buffer Overflow - CVE-2018-5410 Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.", + "ID": "VU#741315", + "IDNumber": "741315", + "IPProtocol": "", + "Impact": "An attacker could corrupt the kernel memory and elevate their system privileges to gain control of the system.", + "Keywords": [ + "Dokan", + "stack-based buffer overflow", + "CWE-121", + "CVE-2018-5410" + ], + "Overview": "A system driver in the Dokan Open Source File System contains a stack-based buffer overflow, which could allow an attacker to gain elevated privileges on the host machine.", + "References": [ + "https://cwe.mitre.org/data/definitions/121.html", + "https://github.com/dokan-dev/dokany", + "https://github.com/dokan-dev/dokany/commit/4954cc0a3299b20274ac64bf52d6c285a1f40b0f", + "https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000", + "https://keybase.io/docs/secadv/kb003" + ], + "Resolution": "Update to the newest version\nDokan developers have released a new version, 1.2.1, that fixes this vulnerability by validating the user input. Please see the update here.", + "Revision": 27, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to Parvez Anwar for reporting this vulnerability.", + "Title": "Dokan file system driver contains a stack-based buffer overflow", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/15/vu_990715/vu_990715.json b/data/15/vu_990715/vu_990715.json index 4f5b4b9977..05d335c62e 100644 --- a/data/15/vu_990715/vu_990715.json +++ b/data/15/vu_990715/vu_990715.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2001-08-01T11:38:08-04:00", "DateFirstPublished": "", "DateLastUpdated": "2001-08-01T11:42:00-04:00", diff --git a/data/17/vu_369317/vu_369317.json b/data/17/vu_369317/vu_369317.json new file mode 100644 index 0000000000..f195d804aa --- /dev/null +++ b/data/17/vu_369317/vu_369317.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-05-08T14:15:03-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-08T14:41:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#369317", + "IDNumber": "369317", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 5, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "INTEL side channel attack", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/2/vu_990902/vu_990902.json b/data/2/vu_990902/vu_990902.json index 71f72ea83f..32fb361eb5 100644 --- a/data/2/vu_990902/vu_990902.json +++ b/data/2/vu_990902/vu_990902.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2004-04-23T10:20:45-04:00", "DateFirstPublished": "", "DateLastUpdated": "2004-04-23T10:56:00-04:00", diff --git a/data/20/vu_540520/vu_540520.json b/data/20/vu_540520/vu_540520.json new file mode 100644 index 0000000000..954924bd74 --- /dev/null +++ b/data/20/vu_540520/vu_540520.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2018-15982", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-12-06T11:03:10-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2018-12-06T11:37:00-05:00", + "DatePublic": "", + "Description": "", + "ID": "VU#540520", + "IDNumber": "540520", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "https://ti.360.net/blog/articles/flash-0day-hacking-team-rat-activities-of-exploiting-latest-flash-0day-vulnerability-and-correlation-analysis-en/", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 3, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Flash use-after-free vulnerability", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/21/vu_551621/vu_551621.json b/data/21/vu_551621/vu_551621.json new file mode 100644 index 0000000000..6479b6ada7 --- /dev/null +++ b/data/21/vu_551621/vu_551621.json @@ -0,0 +1,61 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-12-05T12:13:52-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-01-08T12:37:00-05:00", + "DatePublic": "", + "Description": "", + "ID": "VU#551621", + "IDNumber": "551621", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": [ + "https://github.com/gravitational/cve-2018-1002105", + "https://github.com/evict/poc_CVE-2018-1002105" + ], + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 6, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Kubernetes Node Hacking vulnerability", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/21/vu_990821/vu_990821.json b/data/21/vu_990821/vu_990821.json index d08f4b26b9..fe2e25579e 100644 --- a/data/21/vu_990821/vu_990821.json +++ b/data/21/vu_990821/vu_990821.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2005-03-03T10:37:37-05:00", "DateFirstPublished": "", "DateLastUpdated": "2005-03-03T17:05:00-05:00", diff --git a/data/23/vu_991123/vu_991123.json b/data/23/vu_991123/vu_991123.json index 7e5c62c33d..f943993578 100644 --- a/data/23/vu_991123/vu_991123.json +++ b/data/23/vu_991123/vu_991123.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "CVE-2008-2960", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2008-06-25T08:24:36-04:00", "DateFirstPublished": "", "DateLastUpdated": "2008-07-07T08:14:00-04:00", diff --git a/data/24/vu_990724/vu_990724.json b/data/24/vu_990724/vu_990724.json index db4def77d5..d629f79b20 100644 --- a/data/24/vu_990724/vu_990724.json +++ b/data/24/vu_990724/vu_990724.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2003-07-28T16:25:26-04:00", "DateFirstPublished": "", "DateLastUpdated": "2003-07-28T16:28:00-04:00", diff --git a/data/24/vu_991124/vu_991124.json b/data/24/vu_991124/vu_991124.json index c5d3f789e8..8f03a7a221 100644 --- a/data/24/vu_991124/vu_991124.json +++ b/data/24/vu_991124/vu_991124.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2008-06-13T08:52:18-04:00", "DateFirstPublished": "", "DateLastUpdated": "2008-06-13T08:56:00-04:00", diff --git a/data/25/vu_733725/vu_733725.json b/data/25/vu_733725/vu_733725.json new file mode 100644 index 0000000000..89ef0f2f86 --- /dev/null +++ b/data/25/vu_733725/vu_733725.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-04-29T09:59:20-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-07T09:53:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#733725", + "IDNumber": "733725", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "[VRF#19-04-YQYWY]", + "Overview": "", + "References": "https://www.flir.com/products/latitude/", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 4, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "FLIR Latitude Video Management System VMS", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/27/vu_990627/vu_990627.json b/data/27/vu_990627/vu_990627.json index 8072edcf41..2c76c7f09a 100644 --- a/data/27/vu_990627/vu_990627.json +++ b/data/27/vu_990627/vu_990627.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2001-11-28T16:46:33-05:00", "DateFirstPublished": "", "DateLastUpdated": "2001-11-28T16:50:00-05:00", diff --git a/data/28/vu_332928/vendor_cheu-b3ukq3.json b/data/28/vu_332928/vendor_cheu-b3ukq3.json index b028e5eee8..756a30a2ab 100644 --- a/data/28/vu_332928/vendor_cheu-b3ukq3.json +++ b/data/28/vu_332928/vendor_cheu-b3ukq3.json @@ -1,14 +1,14 @@ { "Addendum": "There are no additional comments at this time.", - "DateLastUpdated": "2018-08-21T13:39:00-04:00", + "DateLastUpdated": "2019-03-13T15:59:00-04:00", "DateNotified": "2018-08-21T10:57:32-04:00", "DateResponded": "", "ID": "VU#332928", - "Revision": 1, + "Revision": 2, "Status": "Affected", "Vendor": "Ubuntu", "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", "VendorRecordID": "CHEU-B3UKQ3", - "VendorReferences": "None", + "VendorReferences": "https://usn.ubuntu.com/3768-1/", "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." } \ No newline at end of file diff --git a/data/28/vu_332928/vu_332928.json b/data/28/vu_332928/vu_332928.json index b0c54b868f..525c25c6d5 100644 --- a/data/28/vu_332928/vu_332928.json +++ b/data/28/vu_332928/vu_332928.json @@ -34,7 +34,7 @@ "CVSS_TemporalVector": "E:F/RL:W/RC:C", "DateCreated": "2018-08-21T10:15:38-04:00", "DateFirstPublished": "2018-08-21T10:33:40-04:00", - "DateLastUpdated": "2018-10-01T15:38:00-04:00", + "DateLastUpdated": "2019-03-13T16:00:00-04:00", "DatePublic": "2018-02-21T00:00:00", "Description": "Ghostscript contains an optional -dSAFER option, which is supposed to prevent unsafe PostScript operations. Multiple PostScript operations bypass the protections provided by -dSAFER, which can allow an attacker to execute arbitrary commands with arbitrary arguments. This vulnerability can also be exploited in applications that leverage Ghostscript, such as ImageMagick, GraphicsMagick, evince, Okular, Nautilus, and others. Exploit code for this vulnerability is publicly available.", "ID": "VU#332928", @@ -77,7 +77,7 @@ "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=520bb0ea7519aa3e79db78aaf0589dae02103764" ], "Resolution": "Apply an update This issue is addressed in Ghostscript version 9.24. Please also consider the following workarounds:", - "Revision": 58, + "Revision": 59, "SystemsAffectedPreamble": "", "ThanksAndCredit": "This vulnerability was publicly disclosed by Tavis Ormandy.", "Title": "Ghostscript contains multiple -dSAFER sandbox bypass vulnerabilities", diff --git a/data/29/vu_797129/vu_797129.json b/data/29/vu_797129/vu_797129.json new file mode 100644 index 0000000000..59f05c4e5d --- /dev/null +++ b/data/29/vu_797129/vu_797129.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-12-18T11:43:34-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2018-12-20T10:04:00-05:00", + "DatePublic": "", + "Description": "", + "ID": "VU#797129", + "IDNumber": "797129", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 6, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Abetting Planned Obsolescence by Aging 3D Networks-on-Chip", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/3/vu_990803/vu_990803.json b/data/3/vu_990803/vu_990803.json index a98dfd8096..8632421918 100644 --- a/data/3/vu_990803/vu_990803.json +++ b/data/3/vu_990803/vu_990803.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "CVE-2002-0417", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2002-03-05T15:42:47-05:00", "DateFirstPublished": "", "DateLastUpdated": "2002-03-07T11:55:00-05:00", diff --git a/data/32/vu_465632/vendor_cheu-b8sshd.json b/data/32/vu_465632/vendor_cheu-b8sshd.json new file mode 100644 index 0000000000..c3172d8fcb --- /dev/null +++ b/data/32/vu_465632/vendor_cheu-b8sshd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-20T15:56:00-05:00", + "DateNotified": "2019-01-26T15:50:07-05:00", + "DateResponded": "", + "ID": "VU#465632", + "Revision": 4, + "Status": "Affected", + "Vendor": "Microsoft", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8SSHD", + "VendorReferences": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190007\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0686\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0724", + "VendorStatement": "Microsoft is aware of this vulnerability and is working on a resolution" +} \ No newline at end of file diff --git a/data/32/vu_465632/vu_465632.json b/data/32/vu_465632/vu_465632.json new file mode 100644 index 0000000000..ca85dc36c6 --- /dev/null +++ b/data/32/vu_465632/vu_465632.json @@ -0,0 +1,69 @@ +{ + "Author": "This document was written by Will Dormann.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2019-0686", + "CVSS_AccessComplexity": "L", + "CVSS_AccessVector": "A", + "CVSS_Authenication": "N", + "CVSS_AvailabilityImpact": "C", + "CVSS_BaseScore": 8.3, + "CVSS_BaseVector": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 7.5176549591808, + "CVSS_EnvironmentalVector": "CDP:ND/TD:H/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "F", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "W", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "H", + "CVSS_TemporalScore": 7.5, + "CVSS_TemporalVector": "E:F/RL:W/RC:C", + "DateCreated": "2019-01-26T15:34:25-05:00", + "DateFirstPublished": "2019-01-28T17:43:44-05:00", + "DateLastUpdated": "2019-02-21T18:05:00-05:00", + "DatePublic": "2019-01-21T00:00:00", + "Description": "Microsoft Exchange supports a API called Exchange Web Services (EWS). One of the EWS API functions is called PushSubscriptionRequest, which can be used to cause the Exchange server to connect to an arbitrary website. Connections made using the PushSubscriptionRequest function will attempt to negotiate with the arbitrary web server using NTLM authentication. Starting with Microsoft Exchange 2013, the NTLM authentication over HTTP fails to set the NTLM Sign and Seal flags. The lack of signing makes this authentication attempt vulnerable to NTLM relay attacks. Microsoft Exchange is by default configured with extensive privileges with respect to the Domain object in Active Directory. Because the Exchange Windows Permissions group has WriteDacl access to the Domain object, this means that the Exchange server privileges obtained using this vulnerability can be used to gain Domain Admin privileges for the domain that contains the vulnerable Exchange server.", + "ID": "VU#465632", + "IDNumber": "465632", + "IPProtocol": "", + "Impact": "An attacker that has credentials for an Exchange mailbox and also has the ability to communicate with both a Microsoft Exchange server and a Windows domain controller may be able to gain domain administrator privileges. It is also reported that an attacker without knowledge of an Exchange user's password may be able to perform the same attack by using an SMB to HTTP relay attack as long as they are in the same network segment as an Exchange user.", + "Keywords": "PrivExchange", + "Overview": "Microsoft Exchange 2013 and newer fail to set signing and sealing flags on NTLM authentication traffic, which can allow a remote attacker to gain the privileges of the Exchange server.", + "References": [ + "https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/", + "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190007", + "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0686", + "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0724", + "https://www.thezdi.com/blog/2018/12/19/an-insincere-form-of-flattery-impersonating-users-on-microsoft-exchange", + "https://docs.microsoft.com/en-us/dotnet/api/microsoft.exchange.webservices.data.pushsubscription?view=exchange-ews-api+", + "https://docs.microsoft.com/en-us/exchange/client-developer/web-service-reference/pushsubscriptionrequest", + "https://docs.microsoft.com/en-us/previous-versions/office/developer/exchange-server-2010/dd877045(v%3Dexchg.140)", + "https://msdn.microsoft.com/en-us/library/cc236702.aspx", + "https://msdn.microsoft.com/en-us/library/cc236707.aspx" + ], + "Resolution": "Apply an update This issue is mitigated by the Microsoft Exchange updates for CVE-2019-0686. This update will cause the Exchange server to not attempt NTLM authentication with hosts that it contacts as the result of a PushSubscriptionRequest API call. The versions of Exchange that contain this fix include: Exchange Server 2010 Service Pack 3 Update Rollup 26\nExchange Server 2013 Cumulative Update 22\nExchange Server 2016 Cumulative Update 12\nExchange Server 2019 Cumulative Update 1 These updates also include the fix for CVE-2019-0724, which removes some of the unnecessary privileges that are granted to an Exchange server in a default installation. This is a defense-in-depth update that can help mitigate the impact of exploitation of this vulnerability.", + "Revision": 45, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "This vulnerability was publicly disclosed by Dirk-jan Mollema.", + "Title": "Microsoft Exchange server 2013 and newer are vulnerable to NTLM relay attacks", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "4", + "VRDA_D1_Population": "4", + "VulnerabilityCount": 1, + "Workarounds": "Disable EWS push/pull subscriptions If you have an exchange server that does not leverage EWS push/pull subscriptions, you can block the PushSubscriptionRequest API call that triggers this attack. In an Exchange Management Shell window, execute the following commands: New-ThrottlingPolicy -Name NoEWSSubscription -ThrottlingPolicyScope Organization -EwsMaxSubscriptions 0\nRestart-WebAppPool -Name MSExchangeServicesAppPool Remove privileges that Exchange has on the domain object Please note that the following workaround was not developed by CERT and is not supported by Microsoft. Please test any workarounds in your environment to ensure that they work properly. https://github.com/gdedrouas/Exchange-AD-Privesc/blob/master/DomainObject/Fix-DomainObjectDACL.ps1 is a PowerShell script that can be executed on either the Exchange Server or Domain Controller system. By default this script will check for vulnerable access control entries in the current active directory. When executed with Domain Admin privileges and the -Fix flag, this script will remove the ability for Exchange to write to the domain object. Note that if you encounter an error about Get-ADDomainController not being recognized, you will need to install and import the ActiveDirectory PowerShell module, and then finally run Fix-DomainObjectDACL.ps1 : Import-Module ServerManager\nAdd-WindowsFeature RSAT-AD-PowerShell\nImport-Module ActiveDirectory\n.\\Fix-DomainObjectDACL.ps1 If the script reports that faulty ACE were found, run: .\\Fix-DomainObjectDACL.ps1 -Fix PowerShell may be configured to block the execution of user-provided .ps1 files. If this is the case, first find your current PowerShell execution policy: Get-ExecutionPolicy\nTemporarily allow the execution of the Fix-DomainObjectDACL.ps1 script by running: Set-ExecutionPolicy unrestricted\nOnce you are finished running the Fix-DomainObjectDACL.ps1script, set the policy back to the original value as reported by Get-ExecutionPolicy: Set-ExecutionPolicy [POLICY] Consider additional workarounds The blog post for this vulnerability contains several mitigations that may also help protect against this and similar vulnerabilities." +} \ No newline at end of file diff --git a/data/35/vu_857035/vu_857035.json b/data/35/vu_857035/vu_857035.json index f2c39f53a2..575cd40234 100644 --- a/data/35/vu_857035/vu_857035.json +++ b/data/35/vu_857035/vu_857035.json @@ -34,7 +34,7 @@ "CVSS_TemporalVector": "E:POC/RL:U/RC:--", "DateCreated": "2018-06-06T14:33:51-04:00", "DateFirstPublished": "2018-08-14T17:38:18-04:00", - "DateLastUpdated": "2018-08-21T09:59:00-04:00", + "DateLastUpdated": "2018-11-09T12:49:00-05:00", "DatePublic": "2018-08-14T00:00:00", "Description": "The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. (CVE-2018-5389) It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode however, only an online attack against PSK authentication was thought to be feasible.", "ID": "VU#857035", @@ -49,7 +49,7 @@ "https://blogs.cisco.com/security/great-cipher-but-where-did-you-get-that-key" ], "Resolution": "Use Secure Passwords\nUse cryptographically secure PSK values that resist brute force or dictionary attacks.", - "Revision": 15, + "Revision": 16, "SystemsAffectedPreamble": "", "ThanksAndCredit": "Thanks to Martin Grothe, Joerg Schwenk, and Dennis Felsch for reporting this vulnerability.", "Title": "IKEv1 Main Mode vulnerable to brute force attacks", diff --git a/data/35/vu_971035/vu_971035.json b/data/35/vu_971035/vu_971035.json index 52ad3dff5e..8061aba2ea 100644 --- a/data/35/vu_971035/vu_971035.json +++ b/data/35/vu_971035/vu_971035.json @@ -34,7 +34,7 @@ "CVSS_TemporalVector": "E:U/RL:W/RC:UC", "DateCreated": "2012-03-28T14:43:15-04:00", "DateFirstPublished": "2012-06-27T15:02:09-04:00", - "DateLastUpdated": "2015-04-14T10:06:00-04:00", + "DateLastUpdated": "2018-12-14T12:19:00-05:00", "DatePublic": "2012-06-27T00:00:00", "Description": "IETF Internet-Draft draft-nourse-scep-23 \"...defines a protocol, Simple Certificate Enrollment Protocol (SCEP), for certificate management and certificate and CRL queries in a closed environment.\" Mobile Device Management (MDM) is defined as \"...software that secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc.\" Multiple MDM software packages use SCEP as a method to handle certificate management and certificate CRL queries within an organization. When a user or a device requests a certificate, the SCEP implementation may require a challenge password. It may be possible for a user or device to take their legitimately acquired SCEP challenge password and use it to obtain a certificate that represents a different user with a higher level of access such as a network administrator, or to obtain a different type of certificate than what was intended. It is also possible for SCEP implementations or system administrators to not require the challenge password, or to share a static password across many users. Additional Notes: SCEP was designed for use \"...in a closed environment\" and is not well suited for MDM and \"bring your own device\" (BYOD) applications where untrusted users and devices are in use. Applications that use SCEP take different measures to authenticate users and devices. draft-nourse-scep-23 discourages further use of SCEP: The IETF protocol suite currently includes two certificate management protocols with more comprehensive functionality: Certificate Management Protocol (CMP) [RFC4210] and Certificate Management over CMS (CMC) [RFC5272]. Environments that do not require interoperability with SCEP implementations SHOULD use the above-mentioned, PKIX-standard certificate management protocols. In light of the functionality gap between this specification [SCEP] and the two IETF standards track protocols, this specification is being published as Historic. Even when interoperability with the installed base of SCEP implementations is needed, implementers are encouraged to support one of these comprehensive standards track certificate management protocols in addition to the protocol defined in this specification. Additional information can be found in Certified Security Solutions, Inc's The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices whitepaper.", "ID": "VU#971035", @@ -49,13 +49,13 @@ "cms", "ios" ], - "Overview": "Simple Certificate Enrollment Protocol (SCEP) does not strongly authenticate certificate requests made by users or devices.", + "Overview": "Simple Certificate Enrollment Protocol (SCEP) does not strongly authenticate certificate requests made by users or devices. (Link updated 12/14/2018)", "References": [ "https://tools.ietf.org/html/draft-nourse-scep-23", - "http://www.css-security.com/wp-content/uploads/2012/05/SCEP-and-Untrusted-Devices.pdf" + "https://www.keyfactor.com/scep/ " ], "Resolution": "We are currently unaware of a practical solution to this problem.", - "Revision": 59, + "Revision": 62, "SystemsAffectedPreamble": "", "ThanksAndCredit": "Thanks to Ted Shorter of Certified Security Solutions for reporting this vulnerability.", "Title": "Simple Certificate Enrollment Protocol (SCEP) does not strongly authenticate certificate requests", diff --git a/data/35/vu_991035/vu_991035.json b/data/35/vu_991035/vu_991035.json index be1b40a46a..4a1f92d176 100644 --- a/data/35/vu_991035/vu_991035.json +++ b/data/35/vu_991035/vu_991035.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2008-04-29T09:36:46-04:00", "DateFirstPublished": "", "DateLastUpdated": "2008-04-29T09:38:00-04:00", diff --git a/data/37/vu_115437/vu_115437.json b/data/37/vu_115437/vu_115437.json new file mode 100644 index 0000000000..02986cfc8f --- /dev/null +++ b/data/37/vu_115437/vu_115437.json @@ -0,0 +1,66 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-01-02T13:27:24-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-01-02T13:31:00-05:00", + "DatePublic": "2018-10-02T00:00:00", + "Description": "189809\t2018-10-02 Ultimate Member \u2013 User Profile & Membership Plugin for WordPress /admin/templates/role/role-edit.php id Parameter Reflected XSS Ultimate Member \u2013 User Profile & Membership Plugin for WordPress contains a flaw that allows a reflected cross-site scripting (XSS) attack. This flaw exists because the /admin/templates/role/role-edit.php script does not properly sanitize input to the 'id' GET parameter before returning it to users. This may allow a context-dependent attacker to create a specially crafted request that executes arbitrary script code in a user's browser session within the trust relationship between their browser and the server. hosted by wordpress https://wordpress.org/plugins/ultimate-member/\nFixed: https://wordpress.org/support/topic/security-vulenrability/\nDescription: https://secure.helpscout.net/docs/561c9af29033600a7a36d66d/article/5b7692f90428631d7a8a1643/ \"Versions of Ultimate Member other than 2.0.23+ and 1.3.89 contain a security vulnerability, allowing attackers to upload malicious php files. You should update your site to the latest version immediately if you have not already. You should also update the social activity extension to latest version if you are using this extension. We have closed the security vulnerability in 2.0.23+ (and 1.3.89 for users who have not updated to 2.0 yet. You may use WP Rollback plugin for upgrading to 1.3.89) but the consequences of the infection can remain on your site.\"", + "ID": "VU#115437", + "IDNumber": "115437", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": [ + "Ultimate Member \u2013 User Profile & Membership", + "WordPress", + "XSS", + "VU#361155" + ], + "Overview": "Ultimate Member \u2013 User Profile & Membership Plugin for WordPress /admin/templates/role/role-edit.php id Parameter Reflected XSS", + "References": [ + "https://wordpress.org/plugins/ultimate-member/", + "https://wordpress.org/support/topic/security-vulenrability/" + ], + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 1, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Ultimate Member Plugin for WordPress vulnerable to Reflected XSS", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/37/vu_832637/vendor_cheu-bbyl2k.json b/data/37/vu_832637/vendor_cheu-bbyl2k.json new file mode 100644 index 0000000000..bf45d6d4e5 --- /dev/null +++ b/data/37/vu_832637/vendor_cheu-bbyl2k.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-05-08T11:22:27-04:00", + "DateNotified": "2019-05-08T11:20:55-04:00", + "DateResponded": "", + "ID": "VU#832637", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Apple", + "VendorInformation": "", + "VendorRecordID": "CHEU-BBYL2K", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_832637/vu_832637.json b/data/37/vu_832637/vu_832637.json new file mode 100644 index 0000000000..c4e258201f --- /dev/null +++ b/data/37/vu_832637/vu_832637.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-05-01T16:31:39-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-14T08:17:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#832637", + "IDNumber": "832637", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "https://discussions.apple.com/thread/250339858", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 6, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Apple Mojave", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hknt.json b/data/37/vu_875537/vendor_cheu-b8hknt.json new file mode 100644 index 0000000000..3d28c37bbd --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hknt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:31-05:00", + "DateNotified": "2019-01-17T10:00:10-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ACCESS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKNT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hknv.json b/data/37/vu_875537/vendor_cheu-b8hknv.json new file mode 100644 index 0000000000..ea1336e245 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hknv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:31-05:00", + "DateNotified": "2019-01-17T10:00:10-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ADTRAN", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKNV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hknx.json b/data/37/vu_875537/vendor_cheu-b8hknx.json new file mode 100644 index 0000000000..7f1eb8b136 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hknx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:32-05:00", + "DateNotified": "2019-01-17T10:00:11-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "A10 Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKNX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hknz.json b/data/37/vu_875537/vendor_cheu-b8hknz.json new file mode 100644 index 0000000000..cc9bcc5fe6 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hknz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:32-05:00", + "DateNotified": "2019-01-17T10:00:11-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Actiontec", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKNZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkp5.json b/data/37/vu_875537/vendor_cheu-b8hkp5.json new file mode 100644 index 0000000000..09b2a4d344 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkp5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:33-05:00", + "DateNotified": "2019-01-17T10:00:13-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "3com Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKP5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkp7.json b/data/37/vu_875537/vendor_cheu-b8hkp7.json new file mode 100644 index 0000000000..4b642f3482 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkp7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:34-05:00", + "DateNotified": "2019-01-17T10:00:13-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Actelis Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKP7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkp9.json b/data/37/vu_875537/vendor_cheu-b8hkp9.json new file mode 100644 index 0000000000..833dda9724 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkp9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:34-05:00", + "DateNotified": "2019-01-17T10:00:13-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "aep NETWORKS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKP9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkpr.json b/data/37/vu_875537/vendor_cheu-b8hkpr.json new file mode 100644 index 0000000000..8ab1b01dd6 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkpr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:38-05:00", + "DateNotified": "2019-01-17T10:00:21-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Aerohive", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKPR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkpt.json b/data/37/vu_875537/vendor_cheu-b8hkpt.json new file mode 100644 index 0000000000..95540edc01 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkpt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:39-05:00", + "DateNotified": "2019-01-17T10:00:21-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AVM GmbH", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKPT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkpv.json b/data/37/vu_875537/vendor_cheu-b8hkpv.json new file mode 100644 index 0000000000..37ddcb7c46 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkpv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:39-05:00", + "DateNotified": "2019-01-17T10:00:21-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Bell Canada Enterprises", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKPV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkpx.json b/data/37/vu_875537/vendor_cheu-b8hkpx.json new file mode 100644 index 0000000000..78d80abaa7 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkpx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:40-05:00", + "DateNotified": "2019-01-17T10:00:21-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AirWatch", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKPX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkpz.json b/data/37/vu_875537/vendor_cheu-b8hkpz.json new file mode 100644 index 0000000000..8d373c0db0 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkpz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:40-05:00", + "DateNotified": "2019-01-17T10:00:22-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cambium Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKPZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkq3.json b/data/37/vu_875537/vendor_cheu-b8hkq3.json new file mode 100644 index 0000000000..c8c72ce1c6 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkq3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:40-05:00", + "DateNotified": "2019-01-17T10:00:22-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Atheros Communications Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKQ3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkq5.json b/data/37/vu_875537/vendor_cheu-b8hkq5.json new file mode 100644 index 0000000000..0fefd0686b --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkq5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:41-05:00", + "DateNotified": "2019-01-17T10:00:22-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Aruba Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKQ5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkq7.json b/data/37/vu_875537/vendor_cheu-b8hkq7.json new file mode 100644 index 0000000000..9ed1426583 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkq7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:41-05:00", + "DateNotified": "2019-01-17T10:00:22-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Arista Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKQ7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkq9.json b/data/37/vu_875537/vendor_cheu-b8hkq9.json new file mode 100644 index 0000000000..ce74a21d13 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkq9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:41-05:00", + "DateNotified": "2019-01-17T10:00:22-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Brocade Communication Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKQ9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkqb.json b/data/37/vu_875537/vendor_cheu-b8hkqb.json new file mode 100644 index 0000000000..eadc7f0fa3 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkqb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-01-23T07:44:00-05:00", + "DateNotified": "2019-01-17T10:00:22-05:00", + "DateResponded": "2019-01-23T04:38:00-05:00", + "ID": "VU#875537", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Check Point Software Technologies", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8HKQB", + "VendorReferences": "None", + "VendorStatement": "Check Point Software Technologies is Not Vulnerable." +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkqd.json b/data/37/vu_875537/vendor_cheu-b8hkqd.json new file mode 100644 index 0000000000..75c589e202 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkqd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:42-05:00", + "DateNotified": "2019-01-17T10:00:22-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Akamai Technologies, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKQD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkqf.json b/data/37/vu_875537/vendor_cheu-b8hkqf.json new file mode 100644 index 0000000000..5221da696c --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkqf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:42-05:00", + "DateNotified": "2019-01-17T10:00:22-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ARRIS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKQF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkqh.json b/data/37/vu_875537/vendor_cheu-b8hkqh.json new file mode 100644 index 0000000000..8e2847ec4f --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkqh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:43-05:00", + "DateNotified": "2019-01-17T10:00:23-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Blue Coat Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKQH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkqk.json b/data/37/vu_875537/vendor_cheu-b8hkqk.json new file mode 100644 index 0000000000..56a23448db --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkqk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:43-05:00", + "DateNotified": "2019-01-17T10:00:22-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ANTlabs", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKQK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkqm.json b/data/37/vu_875537/vendor_cheu-b8hkqm.json new file mode 100644 index 0000000000..b152d54d68 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkqm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:43-05:00", + "DateNotified": "2019-01-17T10:00:23-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CA Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKQM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkqp.json b/data/37/vu_875537/vendor_cheu-b8hkqp.json new file mode 100644 index 0000000000..a0997044d2 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkqp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:44-05:00", + "DateNotified": "2019-01-17T10:00:23-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AsusTek Computer Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKQP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkr6.json b/data/37/vu_875537/vendor_cheu-b8hkr6.json new file mode 100644 index 0000000000..e34fc9a99d --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkr6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:48-05:00", + "DateNotified": "2019-01-17T10:00:25-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Appgate Network Security", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKR6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrb.json b/data/37/vu_875537/vendor_cheu-b8hkrb.json new file mode 100644 index 0000000000..210e704fa8 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:49-05:00", + "DateNotified": "2019-01-17T10:00:25-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Alcatel-Lucent Enterprise", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKRB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrd.json b/data/37/vu_875537/vendor_cheu-b8hkrd.json new file mode 100644 index 0000000000..bbe800fa93 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:49-05:00", + "DateNotified": "2019-01-17T10:00:26-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Android Open Source Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKRD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrf.json b/data/37/vu_875537/vendor_cheu-b8hkrf.json new file mode 100644 index 0000000000..7c2ff88fc6 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:50-05:00", + "DateNotified": "2019-01-17T10:00:26-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AT&T", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKRF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrh.json b/data/37/vu_875537/vendor_cheu-b8hkrh.json new file mode 100644 index 0000000000..52b303a1c8 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:50-05:00", + "DateNotified": "2019-01-17T10:00:26-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Barracuda Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKRH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrk.json b/data/37/vu_875537/vendor_cheu-b8hkrk.json new file mode 100644 index 0000000000..e187ef6cf6 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:51-05:00", + "DateNotified": "2019-01-17T10:00:26-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BlueCat Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKRK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrn.json b/data/37/vu_875537/vendor_cheu-b8hkrn.json new file mode 100644 index 0000000000..bf593d2d3a --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:51-05:00", + "DateNotified": "2019-01-17T10:00:27-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Belkin, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKRN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrr.json b/data/37/vu_875537/vendor_cheu-b8hkrr.json new file mode 100644 index 0000000000..4cd028cf40 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:52-05:00", + "DateNotified": "2019-01-17T10:00:27-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ceragon Networks Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKRR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrt.json b/data/37/vu_875537/vendor_cheu-b8hkrt.json new file mode 100644 index 0000000000..8a743a5896 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:52-05:00", + "DateNotified": "2019-01-17T10:00:27-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Broadcom", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKRT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrv.json b/data/37/vu_875537/vendor_cheu-b8hkrv.json new file mode 100644 index 0000000000..c3c3dee508 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:52-05:00", + "DateNotified": "2019-01-17T10:00:27-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AhnLab Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKRV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrx.json b/data/37/vu_875537/vendor_cheu-b8hkrx.json new file mode 100644 index 0000000000..56ca3cca81 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:53-05:00", + "DateNotified": "2019-01-17T10:00:28-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BlackBerry", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKRX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkrz.json b/data/37/vu_875537/vendor_cheu-b8hkrz.json new file mode 100644 index 0000000000..8071ca72aa --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkrz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-01-29T09:30:00-05:00", + "DateNotified": "2019-01-17T10:00:28-05:00", + "DateResponded": "2019-01-25T15:40:50-05:00", + "ID": "VU#875537", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Cisco", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8HKRZ", + "VendorReferences": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20150714-CVE-2015-4458", + "VendorStatement": "Cisco states that all affected versions of this hardware/software have had a fix in place since July of 2015." +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hks3.json b/data/37/vu_875537/vendor_cheu-b8hks3.json new file mode 100644 index 0000000000..d041b474e5 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hks3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:53-05:00", + "DateNotified": "2019-01-17T10:00:28-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Apple", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKS3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hks6.json b/data/37/vu_875537/vendor_cheu-b8hks6.json new file mode 100644 index 0000000000..7468e61d16 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hks6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:53-05:00", + "DateNotified": "2019-01-17T10:00:29-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Avaya, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKS6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkse.json b/data/37/vu_875537/vendor_cheu-b8hkse.json new file mode 100644 index 0000000000..65996f1b80 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkse.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:55-05:00", + "DateNotified": "2019-01-17T10:00:34-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "eero", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKSE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hksg.json b/data/37/vu_875537/vendor_cheu-b8hksg.json new file mode 100644 index 0000000000..e73c5d5b68 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hksg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:55-05:00", + "DateNotified": "2019-01-17T10:00:34-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKSG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hksn.json b/data/37/vu_875537/vendor_cheu-b8hksn.json new file mode 100644 index 0000000000..62a0b951c8 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hksn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:56-05:00", + "DateNotified": "2019-01-17T10:00:35-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "F-Secure Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKSN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hksy.json b/data/37/vu_875537/vendor_cheu-b8hksy.json new file mode 100644 index 0000000000..b75a4f5732 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hksy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:58-05:00", + "DateNotified": "2019-01-17T10:00:35-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "dnsmasq", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKSY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkt2.json b/data/37/vu_875537/vendor_cheu-b8hkt2.json new file mode 100644 index 0000000000..5b62804c5e --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkt2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:58-05:00", + "DateNotified": "2019-01-17T10:00:36-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Express Logic", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKT2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkt4.json b/data/37/vu_875537/vendor_cheu-b8hkt4.json new file mode 100644 index 0000000000..40ddf58cc9 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkt4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:58-05:00", + "DateNotified": "2019-01-17T10:00:36-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ericsson", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKT4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkt6.json b/data/37/vu_875537/vendor_cheu-b8hkt6.json new file mode 100644 index 0000000000..e2887d8eb6 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkt6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:58-05:00", + "DateNotified": "2019-01-17T10:00:37-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "FreeBSD Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKT6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hktb.json b/data/37/vu_875537/vendor_cheu-b8hktb.json new file mode 100644 index 0000000000..cde3b035f1 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hktb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:59-05:00", + "DateNotified": "2019-01-17T10:00:38-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Geexbox", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKTB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hktd.json b/data/37/vu_875537/vendor_cheu-b8hktd.json new file mode 100644 index 0000000000..b3bf6eac79 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hktd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:59-05:00", + "DateNotified": "2019-01-17T10:00:38-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Force10 Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKTD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hktf.json b/data/37/vu_875537/vendor_cheu-b8hktf.json new file mode 100644 index 0000000000..bdee75b3ad --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hktf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:03:59-05:00", + "DateNotified": "2019-01-17T10:00:38-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "EfficientIP SAS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKTF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkth.json b/data/37/vu_875537/vendor_cheu-b8hkth.json new file mode 100644 index 0000000000..1727922d0b --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkth.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:00-05:00", + "DateNotified": "2019-01-17T10:00:38-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Command Software Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKTH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hktk.json b/data/37/vu_875537/vendor_cheu-b8hktk.json new file mode 100644 index 0000000000..914b146f7f --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hktk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:00-05:00", + "DateNotified": "2019-01-17T10:00:39-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Google", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKTK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hktm.json b/data/37/vu_875537/vendor_cheu-b8hktm.json new file mode 100644 index 0000000000..8309c0b129 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hktm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:00-05:00", + "DateNotified": "2019-01-17T10:00:36-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "DragonFly BSD Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKTM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hktp.json b/data/37/vu_875537/vendor_cheu-b8hktp.json new file mode 100644 index 0000000000..35eb7706a6 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hktp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:00-05:00", + "DateNotified": "2019-01-17T10:00:40-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "D-Link Systems, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKTP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hktr.json b/data/37/vu_875537/vendor_cheu-b8hktr.json new file mode 100644 index 0000000000..7589008ab4 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hktr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:01-05:00", + "DateNotified": "2019-01-17T10:00:38-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Digi International", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKTR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hktt.json b/data/37/vu_875537/vendor_cheu-b8hktt.json new file mode 100644 index 0000000000..1dc539d426 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hktt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:01-05:00", + "DateNotified": "2019-01-17T10:00:41-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fedora Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKTT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hktv.json b/data/37/vu_875537/vendor_cheu-b8hktv.json new file mode 100644 index 0000000000..784e7fa561 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hktv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:01-05:00", + "DateNotified": "2019-01-17T10:00:41-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cradlepoint", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKTV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hktx.json b/data/37/vu_875537/vendor_cheu-b8hktx.json new file mode 100644 index 0000000000..3f461f91df --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hktx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-01T14:55:00-05:00", + "DateNotified": "2019-01-17T10:00:41-05:00", + "DateResponded": "2019-02-01T14:14:06-05:00", + "ID": "VU#875537", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Devicescape", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8HKTX", + "VendorReferences": "None", + "VendorStatement": "Devicescape does not believe this affects any of their products." +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hku2.json b/data/37/vu_875537/vendor_cheu-b8hku2.json new file mode 100644 index 0000000000..6d5851a390 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hku2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:01-05:00", + "DateNotified": "2019-01-17T10:00:41-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CoreOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKU2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hku4.json b/data/37/vu_875537/vendor_cheu-b8hku4.json new file mode 100644 index 0000000000..47b6dd107c --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hku4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:02-05:00", + "DateNotified": "2019-01-17T10:00:42-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Debian GNU/Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKU4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hku6.json b/data/37/vu_875537/vendor_cheu-b8hku6.json new file mode 100644 index 0000000000..ce545416c2 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hku6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:02-05:00", + "DateNotified": "2019-01-17T10:00:42-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Deutsche Telekom", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKU6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hku9.json b/data/37/vu_875537/vendor_cheu-b8hku9.json new file mode 100644 index 0000000000..56a8865d7c --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hku9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:02-05:00", + "DateNotified": "2019-01-17T10:00:51-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NLnet Labs", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKU9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkue.json b/data/37/vu_875537/vendor_cheu-b8hkue.json new file mode 100644 index 0000000000..607ff6c43a --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkue.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:03-05:00", + "DateNotified": "2019-01-17T10:00:53-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nokia", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKUE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkug.json b/data/37/vu_875537/vendor_cheu-b8hkug.json new file mode 100644 index 0000000000..fd513ee8dc --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkug.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:03-05:00", + "DateNotified": "2019-01-17T10:00:56-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Infoblox", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKUG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkuj.json b/data/37/vu_875537/vendor_cheu-b8hkuj.json new file mode 100644 index 0000000000..122414075f --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkuj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:04-05:00", + "DateNotified": "2019-01-17T10:00:53-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Systems Consortium", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKUJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkum.json b/data/37/vu_875537/vendor_cheu-b8hkum.json new file mode 100644 index 0000000000..b58907f9e5 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkum.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:04-05:00", + "DateNotified": "2019-01-17T10:00:48-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MetaSwitch", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKUM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkup.json b/data/37/vu_875537/vendor_cheu-b8hkup.json new file mode 100644 index 0000000000..9aa963d35d --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkup.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:04-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Netgear, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKUP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkus.json b/data/37/vu_875537/vendor_cheu-b8hkus.json new file mode 100644 index 0000000000..296cff8ffc --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkus.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:05-05:00", + "DateNotified": "2019-01-17T10:00:53-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nixu", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKUS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkuw.json b/data/37/vu_875537/vendor_cheu-b8hkuw.json new file mode 100644 index 0000000000..ec1990bc4d --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkuw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:05-05:00", + "DateNotified": "2019-01-17T10:01:03-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Toshiba Commerce Solutions", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKUW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkv3.json b/data/37/vu_875537/vendor_cheu-b8hkv3.json new file mode 100644 index 0000000000..295301737f --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkv3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:06-05:00", + "DateNotified": "2019-01-17T10:00:48-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Openwall GNU/*/Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKV3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkv5.json b/data/37/vu_875537/vendor_cheu-b8hkv5.json new file mode 100644 index 0000000000..b9790129a3 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkv5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:06-05:00", + "DateNotified": "2019-01-17T10:00:48-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Mitel Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKV5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkv7.json b/data/37/vu_875537/vendor_cheu-b8hkv7.json new file mode 100644 index 0000000000..3893aa0f98 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkv7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:06-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HardenedBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKV7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkv9.json b/data/37/vu_875537/vendor_cheu-b8hkv9.json new file mode 100644 index 0000000000..d3c97d4bf3 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkv9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-01-30T07:28:00-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "2019-01-29T15:48:00-05:00", + "ID": "VU#875537", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "pfSense", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8HKV9", + "VendorReferences": "None", + "VendorStatement": "pfSense stated that they do not appear to be affected by this vulnerability." +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkvc.json b/data/37/vu_875537/vendor_cheu-b8hkvc.json new file mode 100644 index 0000000000..1e05700b80 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkvc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:07-05:00", + "DateNotified": "2019-01-17T10:01:02-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TrueOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKVC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkvj.json b/data/37/vu_875537/vendor_cheu-b8hkvj.json new file mode 100644 index 0000000000..2c9ff87bd8 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkvj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:08-05:00", + "DateNotified": "2019-01-17T10:00:56-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QUALCOMM Incorporated", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKVJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkvl.json b/data/37/vu_875537/vendor_cheu-b8hkvl.json new file mode 100644 index 0000000000..c24da06b94 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkvl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:08-05:00", + "DateNotified": "2019-01-17T10:01:06-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ubuntu", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKVL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkvn.json b/data/37/vu_875537/vendor_cheu-b8hkvn.json new file mode 100644 index 0000000000..623c3d306d --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkvn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:08-05:00", + "DateNotified": "2019-01-17T10:00:48-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Paessler", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKVN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkvq.json b/data/37/vu_875537/vendor_cheu-b8hkvq.json new file mode 100644 index 0000000000..588ce59db3 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkvq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-18T10:44:00-05:00", + "DateNotified": "2019-01-17T10:01:07-05:00", + "DateResponded": "2019-02-14T22:20:44-05:00", + "ID": "VU#875537", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Zyxel", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8HKVQ", + "VendorReferences": "None", + "VendorStatement": "We've reached out to the researcher for further details, and we can now confirm that Zyxel is NOT affected by the vulnerability." +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkvs.json b/data/37/vu_875537/vendor_cheu-b8hkvs.json new file mode 100644 index 0000000000..8741f92de6 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkvs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:09-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quantenna Communications", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKVS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkvu.json b/data/37/vu_875537/vendor_cheu-b8hkvu.json new file mode 100644 index 0000000000..c150677285 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkvu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:09-05:00", + "DateNotified": "2019-01-17T10:00:56-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Systems Consortium - DHCP", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKVU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkvw.json b/data/37/vu_875537/vendor_cheu-b8hkvw.json new file mode 100644 index 0000000000..6b47d52930 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkvw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:09-05:00", + "DateNotified": "2019-01-17T10:01:03-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell SecureWorks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKVW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkvy.json b/data/37/vu_875537/vendor_cheu-b8hkvy.json new file mode 100644 index 0000000000..6d769462b9 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkvy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:09-05:00", + "DateNotified": "2019-01-17T10:00:36-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Foundry Brocade", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKVY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkw6.json b/data/37/vu_875537/vendor_cheu-b8hkw6.json new file mode 100644 index 0000000000..9b4a77d51b --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkw6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:10-05:00", + "DateNotified": "2019-01-17T10:01:03-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Unisys", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKW6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkw9.json b/data/37/vu_875537/vendor_cheu-b8hkw9.json new file mode 100644 index 0000000000..e0b3ff4b2e --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkw9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:10-05:00", + "DateNotified": "2019-01-17T10:01:04-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Zephyr Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKW9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkwc.json b/data/37/vu_875537/vendor_cheu-b8hkwc.json new file mode 100644 index 0000000000..e41471b5f8 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkwc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:11-05:00", + "DateNotified": "2019-01-17T10:01:05-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SUSE Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKWC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkwe.json b/data/37/vu_875537/vendor_cheu-b8hkwe.json new file mode 100644 index 0000000000..c901adc4dc --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkwe.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:11-05:00", + "DateNotified": "2019-01-17T10:01:06-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Slackware Linux Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKWE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkwk.json b/data/37/vu_875537/vendor_cheu-b8hkwk.json new file mode 100644 index 0000000000..681c0781ab --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkwk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:12-05:00", + "DateNotified": "2019-01-17T10:01:06-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Wind River", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKWK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkwm.json b/data/37/vu_875537/vendor_cheu-b8hkwm.json new file mode 100644 index 0000000000..8b7a0440f7 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkwm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:12-05:00", + "DateNotified": "2019-01-17T10:00:46-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HTC", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKWM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkwv.json b/data/37/vu_875537/vendor_cheu-b8hkwv.json new file mode 100644 index 0000000000..cd7fa866fd --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkwv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:13-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ruckus Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKWV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkwx.json b/data/37/vu_875537/vendor_cheu-b8hkwx.json new file mode 100644 index 0000000000..f1b49d6598 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkwx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:13-05:00", + "DateNotified": "2019-01-17T10:00:51-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MikroTik", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKWX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkwz.json b/data/37/vu_875537/vendor_cheu-b8hkwz.json new file mode 100644 index 0000000000..f958ce5ce2 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkwz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:14-05:00", + "DateNotified": "2019-01-17T10:00:51-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Joyent", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKWZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkx3.json b/data/37/vu_875537/vendor_cheu-b8hkx3.json new file mode 100644 index 0000000000..a4a9f906ab --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkx3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:14-05:00", + "DateNotified": "2019-01-17T10:00:52-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lantronix", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKX3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkx5.json b/data/37/vu_875537/vendor_cheu-b8hkx5.json new file mode 100644 index 0000000000..af5cd8c23e --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkx5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-22T09:10:00-04:00", + "DateNotified": "2019-01-17T10:00:53-05:00", + "DateResponded": "2019-03-21T17:57:36-04:00", + "ID": "VU#875537", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Microsoft", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8HKX5", + "VendorReferences": "None", + "VendorStatement": "We have confirmed we are not affected by this issue." +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkx7.json b/data/37/vu_875537/vendor_cheu-b8hkx7.json new file mode 100644 index 0000000000..c60d6a4c4b --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkx7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:14-05:00", + "DateNotified": "2019-01-17T10:00:53-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Juniper Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKX7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkx9.json b/data/37/vu_875537/vendor_cheu-b8hkx9.json new file mode 100644 index 0000000000..270ed3e30f --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkx9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:14-05:00", + "DateNotified": "2019-01-17T10:00:53-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Red Hat, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKX9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkxb.json b/data/37/vu_875537/vendor_cheu-b8hkxb.json new file mode 100644 index 0000000000..737264c8a0 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkxb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:15-05:00", + "DateNotified": "2019-01-17T10:00:51-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Intel", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKXB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkxg.json b/data/37/vu_875537/vendor_cheu-b8hkxg.json new file mode 100644 index 0000000000..0b8731cf3b --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkxg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:16-05:00", + "DateNotified": "2019-01-17T10:00:55-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NEC Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKXG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkxj.json b/data/37/vu_875537/vendor_cheu-b8hkxj.json new file mode 100644 index 0000000000..656d3a51f4 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkxj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:16-05:00", + "DateNotified": "2019-01-17T10:00:55-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MediaTek", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKXJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkxn.json b/data/37/vu_875537/vendor_cheu-b8hkxn.json new file mode 100644 index 0000000000..962f4d46d6 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkxn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:17-05:00", + "DateNotified": "2019-01-17T10:01:02-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sonos", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKXN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkxw.json b/data/37/vu_875537/vendor_cheu-b8hkxw.json new file mode 100644 index 0000000000..4cc7f08d1a --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkxw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-01-30T07:32:00-05:00", + "DateNotified": "2019-01-17T10:01:03-05:00", + "DateResponded": "2019-01-30T03:07:50-05:00", + "ID": "VU#875537", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Synology", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8HKXW", + "VendorReferences": "None", + "VendorStatement": "Synology states that their products are not vulnerable." +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkxy.json b/data/37/vu_875537/vendor_cheu-b8hkxy.json new file mode 100644 index 0000000000..c1b8785d8f --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkxy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:20-05:00", + "DateNotified": "2019-01-17T10:01:04-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sony Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKXY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hky3.json b/data/37/vu_875537/vendor_cheu-b8hky3.json new file mode 100644 index 0000000000..17c8ec5c69 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hky3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:20-05:00", + "DateNotified": "2019-01-17T10:01:04-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Turbolinux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKY3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hky5.json b/data/37/vu_875537/vendor_cheu-b8hky5.json new file mode 100644 index 0000000000..424ed9f654 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hky5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:21-05:00", + "DateNotified": "2019-01-17T10:01:05-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Symantec", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKY5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkyd.json b/data/37/vu_875537/vendor_cheu-b8hkyd.json new file mode 100644 index 0000000000..006db3d789 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkyd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:23-05:00", + "DateNotified": "2019-01-17T10:00:37-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Espressif Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKYD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkyg.json b/data/37/vu_875537/vendor_cheu-b8hkyg.json new file mode 100644 index 0000000000..71e6804128 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkyg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:23-05:00", + "DateNotified": "2019-01-17T10:00:39-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell EMC", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKYG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkyj.json b/data/37/vu_875537/vendor_cheu-b8hkyj.json new file mode 100644 index 0000000000..de610c43d1 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkyj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-11T11:57:00-04:00", + "DateNotified": "2019-01-17T10:00:39-05:00", + "DateResponded": "2019-02-28T05:36:21-05:00", + "ID": "VU#875537", + "Revision": 2, + "Status": "Affected", + "Vendor": "F5 Networks, Inc.", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8HKYJ", + "VendorReferences": "None", + "VendorStatement": "F5 has now completed its analysis and published our response to the vulnerabilities known as \"Zombie POODLE\" and \"GOLDENDOODLE\", which can be found here: https://support.f5.com/csp/article/K10065173 We have assigned CVE-2019-6593 from our pool and a separate update will be sent for this shortly. Only BIG-IP versions 12.1.0, 11.6.1 and 11.5.1 through 11.5.4 are known to be vulnerable at this time." +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkyl.json b/data/37/vu_875537/vendor_cheu-b8hkyl.json new file mode 100644 index 0000000000..f25837fcc2 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkyl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:24-05:00", + "DateNotified": "2019-01-17T10:00:40-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fastly", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKYL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkyn.json b/data/37/vu_875537/vendor_cheu-b8hkyn.json new file mode 100644 index 0000000000..92c0ff2e56 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkyn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:24-05:00", + "DateNotified": "2019-01-17T10:00:37-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "DesktopBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKYN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkyq.json b/data/37/vu_875537/vendor_cheu-b8hkyq.json new file mode 100644 index 0000000000..5f7ee4803c --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkyq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:25-05:00", + "DateNotified": "2019-01-17T10:00:37-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Comcast", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKYQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkz4.json b/data/37/vu_875537/vendor_cheu-b8hkz4.json new file mode 100644 index 0000000000..771a41e32d --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkz4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:27-05:00", + "DateNotified": "2019-01-17T10:00:48-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NetBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZ4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkz9.json b/data/37/vu_875537/vendor_cheu-b8hkz9.json new file mode 100644 index 0000000000..d0e4faafa0 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkz9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:28-05:00", + "DateNotified": "2019-01-17T10:00:48-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Peplink", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZ9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkzb.json b/data/37/vu_875537/vendor_cheu-b8hkzb.json new file mode 100644 index 0000000000..b8221e3a28 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkzb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:29-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Honeywell", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkzf.json b/data/37/vu_875537/vendor_cheu-b8hkzf.json new file mode 100644 index 0000000000..1cc2858d9c --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkzf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:30-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenDNS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkzl.json b/data/37/vu_875537/vendor_cheu-b8hkzl.json new file mode 100644 index 0000000000..f6599f81c4 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkzl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:31-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Micro Focus", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkzn.json b/data/37/vu_875537/vendor_cheu-b8hkzn.json new file mode 100644 index 0000000000..6904977790 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkzn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:31-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NETSCOUT", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkzq.json b/data/37/vu_875537/vendor_cheu-b8hkzq.json new file mode 100644 index 0000000000..1496b74354 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkzq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:31-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Miredo", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkzs.json b/data/37/vu_875537/vendor_cheu-b8hkzs.json new file mode 100644 index 0000000000..75626f6836 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkzs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:32-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QLogic", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkzu.json b/data/37/vu_875537/vendor_cheu-b8hkzu.json new file mode 100644 index 0000000000..fc05be0ed3 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkzu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:32-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HP Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkzx.json b/data/37/vu_875537/vendor_cheu-b8hkzx.json new file mode 100644 index 0000000000..93efbe25b8 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkzx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:32-05:00", + "DateNotified": "2019-01-17T10:00:49-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quagga", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hkzz.json b/data/37/vu_875537/vendor_cheu-b8hkzz.json new file mode 100644 index 0000000000..7d42225b01 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hkzz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:32-05:00", + "DateNotified": "2019-01-17T10:00:50-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Semiconductor Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HKZZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl23.json b/data/37/vu_875537/vendor_cheu-b8hl23.json new file mode 100644 index 0000000000..2c6dc294e0 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl23.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:33-05:00", + "DateNotified": "2019-01-17T10:00:50-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL23", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl26.json b/data/37/vu_875537/vendor_cheu-b8hl26.json new file mode 100644 index 0000000000..e35eee818e --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl26.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:33-05:00", + "DateNotified": "2019-01-17T10:00:50-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Interniche Technologies, inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL26", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl28.json b/data/37/vu_875537/vendor_cheu-b8hl28.json new file mode 100644 index 0000000000..593d0468a5 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl28.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:33-05:00", + "DateNotified": "2019-01-17T10:00:51-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Hitachi", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL28", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl2b.json b/data/37/vu_875537/vendor_cheu-b8hl2b.json new file mode 100644 index 0000000000..478c523570 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl2b.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:04:34-05:00", + "DateNotified": "2019-01-17T10:00:51-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "PowerDNS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL2B", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl2l.json b/data/37/vu_875537/vendor_cheu-b8hl2l.json new file mode 100644 index 0000000000..4c694005cf --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl2l.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:08:16-05:00", + "DateNotified": "2019-01-17T10:00:51-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Secure64 Software Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL2L", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl2n.json b/data/37/vu_875537/vendor_cheu-b8hl2n.json new file mode 100644 index 0000000000..ea764e3241 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl2n.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:08:16-05:00", + "DateNotified": "2019-01-17T10:00:51-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Linksys", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL2N", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl2r.json b/data/37/vu_875537/vendor_cheu-b8hl2r.json new file mode 100644 index 0000000000..6d34ea81b1 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl2r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:08:16-05:00", + "DateNotified": "2019-01-17T10:00:51-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "IBM Corporation (zseries)", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL2R", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl2t.json b/data/37/vu_875537/vendor_cheu-b8hl2t.json new file mode 100644 index 0000000000..af06459b08 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl2t.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:08:16-05:00", + "DateNotified": "2019-01-17T10:00:52-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lenovo", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL2T", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl2y.json b/data/37/vu_875537/vendor_cheu-b8hl2y.json new file mode 100644 index 0000000000..87adb24a7d --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl2y.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:08:17-05:00", + "DateNotified": "2019-01-17T10:00:52-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GNU glibc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL2Y", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl35.json b/data/37/vu_875537/vendor_cheu-b8hl35.json new file mode 100644 index 0000000000..91efd56c61 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl35.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:08:18-05:00", + "DateNotified": "2019-01-17T10:01:02-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "VMware", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL35", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl39.json b/data/37/vu_875537/vendor_cheu-b8hl39.json new file mode 100644 index 0000000000..7b7bb214eb --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl39.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:08:18-05:00", + "DateNotified": "2019-01-17T10:01:03-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SonicWall", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL39", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl3c.json b/data/37/vu_875537/vendor_cheu-b8hl3c.json new file mode 100644 index 0000000000..570df37839 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl3c.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:08:19-05:00", + "DateNotified": "2019-01-17T10:01:05-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Mobile", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL3C", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl3h.json b/data/37/vu_875537/vendor_cheu-b8hl3h.json new file mode 100644 index 0000000000..a7616fd8db --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl3h.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:08:20-05:00", + "DateNotified": "2019-01-17T10:00:52-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "InfoExpress, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL3H", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl3l.json b/data/37/vu_875537/vendor_cheu-b8hl3l.json new file mode 100644 index 0000000000..8cf35e8345 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl3l.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:16-05:00", + "DateNotified": "2019-01-17T10:08:34-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TP-LINK", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL3L", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl3n.json b/data/37/vu_875537/vendor_cheu-b8hl3n.json new file mode 100644 index 0000000000..9a98fbe592 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl3n.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:17-05:00", + "DateNotified": "2019-01-17T10:08:34-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Zebra Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL3N", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl3q.json b/data/37/vu_875537/vendor_cheu-b8hl3q.json new file mode 100644 index 0000000000..4615a54b4c --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl3q.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:17-05:00", + "DateNotified": "2019-01-17T10:08:34-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Philips Electronics", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL3Q", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl3s.json b/data/37/vu_875537/vendor_cheu-b8hl3s.json new file mode 100644 index 0000000000..809dae55f3 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl3s.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:17-05:00", + "DateNotified": "2019-01-17T10:08:34-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Men & Mice", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL3S", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl3u.json b/data/37/vu_875537/vendor_cheu-b8hl3u.json new file mode 100644 index 0000000000..345e0a390e --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl3u.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:17-05:00", + "DateNotified": "2019-01-17T10:08:35-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Marvell Semiconductors", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL3U", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl3w.json b/data/37/vu_875537/vendor_cheu-b8hl3w.json new file mode 100644 index 0000000000..b615979eb8 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl3w.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:17-05:00", + "DateNotified": "2019-01-17T10:08:35-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Huawei Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL3W", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl3y.json b/data/37/vu_875537/vendor_cheu-b8hl3y.json new file mode 100644 index 0000000000..cd27544a04 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl3y.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:18-05:00", + "DateNotified": "2019-01-17T10:08:36-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Xilinx", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL3Y", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl42.json b/data/37/vu_875537/vendor_cheu-b8hl42.json new file mode 100644 index 0000000000..21abd5875e --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl42.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:18-05:00", + "DateNotified": "2019-01-17T10:08:37-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "netsnmp", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL42", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl44.json b/data/37/vu_875537/vendor_cheu-b8hl44.json new file mode 100644 index 0000000000..49a1d00028 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl44.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:18-05:00", + "DateNotified": "2019-01-17T10:08:37-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "m0n0wall", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL44", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl46.json b/data/37/vu_875537/vendor_cheu-b8hl46.json new file mode 100644 index 0000000000..bc4142b44e --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl46.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:18-05:00", + "DateNotified": "2019-01-17T10:08:38-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Roku", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL46", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl48.json b/data/37/vu_875537/vendor_cheu-b8hl48.json new file mode 100644 index 0000000000..d1485a3bed --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl48.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:19-05:00", + "DateNotified": "2019-01-17T10:08:39-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Riverbed Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL48", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl4a.json b/data/37/vu_875537/vendor_cheu-b8hl4a.json new file mode 100644 index 0000000000..353298a395 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl4a.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:19-05:00", + "DateNotified": "2019-01-17T10:08:39-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Pulse Secure", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL4A", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl4c.json b/data/37/vu_875537/vendor_cheu-b8hl4c.json new file mode 100644 index 0000000000..0bea3e7d23 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl4c.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:19-05:00", + "DateNotified": "2019-01-17T10:08:40-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Technicolor", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL4C", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl4e.json b/data/37/vu_875537/vendor_cheu-b8hl4e.json new file mode 100644 index 0000000000..a0c94000b7 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl4e.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:19-05:00", + "DateNotified": "2019-01-17T10:08:40-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TippingPoint Technologies Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL4E", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl4h.json b/data/37/vu_875537/vendor_cheu-b8hl4h.json new file mode 100644 index 0000000000..d62a175601 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl4h.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:20-05:00", + "DateNotified": "2019-01-17T10:08:42-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sophos, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL4H", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl4u.json b/data/37/vu_875537/vendor_cheu-b8hl4u.json new file mode 100644 index 0000000000..0b86e87674 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl4u.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:21-05:00", + "DateNotified": "2019-01-17T10:08:48-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microchip Technology", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL4U", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl4y.json b/data/37/vu_875537/vendor_cheu-b8hl4y.json new file mode 100644 index 0000000000..3421693313 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl4y.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:22-05:00", + "DateNotified": "2019-01-17T10:08:50-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Snort", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL4Y", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b8hl52.json b/data/37/vu_875537/vendor_cheu-b8hl52.json new file mode 100644 index 0000000000..da1cd3c6a9 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b8hl52.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T10:14:22-05:00", + "DateNotified": "2019-01-17T10:08:50-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sourcefire", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8HL52", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b93nuk.json b/data/37/vu_875537/vendor_cheu-b93nuk.json new file mode 100644 index 0000000000..b8016bf313 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b93nuk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-04T12:46:20-05:00", + "DateNotified": "2019-02-04T12:41:01-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Initiative Japan, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B93NUK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-b93nut.json b/data/37/vu_875537/vendor_cheu-b93nut.json new file mode 100644 index 0000000000..6ae3101165 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-b93nut.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-04T12:46:21-05:00", + "DateNotified": "2019-02-04T12:41:04-05:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fujitsu", + "VendorInformation": "", + "VendorRecordID": "CHEU-B93NUT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-bamfu5.json b/data/37/vu_875537/vendor_cheu-bamfu5.json new file mode 100644 index 0000000000..52d564388a --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-bamfu5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-26T07:47:23-04:00", + "DateNotified": "2019-03-26T07:41:47-04:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAMFU5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-bamfu7.json b/data/37/vu_875537/vendor_cheu-bamfu7.json new file mode 100644 index 0000000000..e24dcc8cf6 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-bamfu7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-26T07:47:23-04:00", + "DateNotified": "2019-03-26T07:41:47-04:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "LibreSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAMFU7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-bamfu9.json b/data/37/vu_875537/vendor_cheu-bamfu9.json new file mode 100644 index 0000000000..7e3c05de62 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-bamfu9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-25T08:38:00-04:00", + "DateNotified": "2019-03-26T07:41:47-04:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 1, + "Status": "Unknown", + "Vendor": "wolfSSL", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BAMFU9", + "VendorReferences": "https://www.wolfssl.com/olfssl-zombie-poodle-goldendoodle-attacks/", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-bamfub.json b/data/37/vu_875537/vendor_cheu-bamfub.json new file mode 100644 index 0000000000..b6468254a5 --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-bamfub.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-26T07:47:24-04:00", + "DateNotified": "2019-03-26T07:41:47-04:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BoringSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAMFUB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_cheu-bamfud.json b/data/37/vu_875537/vendor_cheu-bamfud.json new file mode 100644 index 0000000000..a69117726a --- /dev/null +++ b/data/37/vu_875537/vendor_cheu-bamfud.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-26T07:47:24-04:00", + "DateNotified": "2019-03-26T07:41:47-04:00", + "DateResponded": "", + "ID": "VU#875537", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GnuTLS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAMFUD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/37/vu_875537/vendor_naln-b9bhnf.json b/data/37/vu_875537/vendor_naln-b9bhnf.json new file mode 100644 index 0000000000..48805aaa05 --- /dev/null +++ b/data/37/vu_875537/vendor_naln-b9bhnf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-12T08:24:00-05:00", + "DateNotified": "2018-08-21T00:00:00", + "DateResponded": "2019-02-11T15:12:37-05:00", + "ID": "VU#875537", + "Revision": 1, + "Status": "Affected", + "Vendor": "Citrix", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "NALN-B9BHNF", + "VendorReferences": "https://support.citrix.com/article/CTX240139", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/37/vu_875537/vu_875537.json b/data/37/vu_875537/vu_875537.json new file mode 100644 index 0000000000..d0acb8af9c --- /dev/null +++ b/data/37/vu_875537/vu_875537.json @@ -0,0 +1,61 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:M/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "M", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-11-06T15:58:36-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-04-30T11:55:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#875537", + "IDNumber": "875537", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": [ + "https://i.blackhat.com/asia-19/Fri-March-29/bh-asia-Young-Zombie-Poodle-Goldendoodle-and-How-TLSv13-Can-Save-Us-All.pdf", + "https://www.tripwire.com/state-of-security/vulnerability-management/zombie-poodle-goldendoodle/" + ], + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 34, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to Craig Young from Tripwire for reporting this vulnerability.", + "Title": "Multiple Load balancer, middlebox, and VPN products are vulnerable to HTTPS session hijacking", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "3", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/37/vu_877837/vendor_ltys-b69jan.json b/data/37/vu_877837/vendor_ltys-b69jan.json new file mode 100644 index 0000000000..d71025d0d8 --- /dev/null +++ b/data/37/vu_877837/vendor_ltys-b69jan.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-05-08T09:21:00-04:00", + "DateNotified": "2018-10-04T11:27:17-04:00", + "DateResponded": "2018-10-24T00:00:00", + "ID": "VU#877837", + "Revision": 3, + "Status": "Affected", + "Vendor": "Dell Kace Quest", + "VendorInformation": "", + "VendorRecordID": "LTYS-B69JAN", + "VendorReferences": "https://support.quest.com/kace-systems-management-appliance/9.1/download-new-releases\nhttps://support.quest.com/", + "VendorStatement": "Upgrade to version 9.1.317." +} \ No newline at end of file diff --git a/data/37/vu_877837/vu_877837.json b/data/37/vu_877837/vu_877837.json new file mode 100644 index 0000000000..ab363baf58 --- /dev/null +++ b/data/37/vu_877837/vu_877837.json @@ -0,0 +1,73 @@ +{ + "Author": "This document was written by Laurie Tyzenhaus.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": [ + "CVE-2018-5404", + "CVE-2018-5405", + "CVE-2018-5406" + ], + "CVSS_AccessComplexity": "M", + "CVSS_AccessVector": "N", + "CVSS_Authenication": "N", + "CVSS_AvailabilityImpact": "C", + "CVSS_BaseScore": 9.3, + "CVSS_BaseVector": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "CVSS_CollateralDamagePotential": "N", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 5.48031772512, + "CVSS_EnvironmentalVector": "CDP:N/TD:M/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "POC", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "OF", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "M", + "CVSS_TemporalScore": 7.3, + "CVSS_TemporalVector": "E:POC/RL:OF/RC:C", + "DateCreated": "2018-04-12T10:23:10-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-04-25T15:48:00-04:00", + "DatePublic": "", + "Description": "CVE-2018-5404: The Dell Kace K1000 Appliance allows an authenticated, remote attacker with least privileges ('User Console Only' role) could exploit Blind SQL Injection vulnerabilities to retrieve sensitive information from the database or copy the entire database. (CWE-89) CVE-2018-5405: The Dell Kace K1000 Appliance allows an authenticated least privileged user with \u2018User Console Only\u2019 rights can inject arbitrary JavaScript code on the tickets page. Script execution could allow a malicious user of the system to steal session cookies of other users including Administrator and take over their session. This can further be exploited to launch other attacks. The software also does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. The software does not neutralize or incorrectly neutralizes user-controllable input before it is place in output that is used as a web page that is served to other users. (CWE-79) CVE-2018-5406: The Dell Kace K1000 Appliance allows a remote attacker to exploit the misconfigured Cross-Origin Resource Sharing (CORS) mechanism. An unauthenticated, remote attacker could exploit this vulnerability to perform sensitive actions such as adding a new administrator account or changing the appliance\u2019s settings. A malicious internal user could also gain administrator privileges of this appliance and use it to visit a malicious link that exploits this vulnerability. This could cause the application to perform sensitive actions such as adding a new administrator account or changing the appliance\u2019s settings. (CWE-284)", + "ID": "VU#877837", + "IDNumber": "877837", + "IPProtocol": "", + "Impact": "An unauthenticated, remote attacker could add an administrator-level account or change the appliance's settings. An authenticated remote attacker could leverage Blind SQL injections to obtain sensitive data. An authenticated user with \"user console only\" rights may inject arbitrary JavaScript, which could result in an attacker taking over a session of others, including an Administrator.", + "Keywords": [ + "Dell Kace", + "Quest Kace", + "K1000 Appliance", + "CVE-2018-5404", + "CVE-2018-5405", + "CVE-2018-5406" + ], + "Overview": "The Dell Kace K1000 Appliance contains multiple vulnerabilities, including a blind SQL injection vulnerability and a stored cross site scripting vulnerability. It also suffers from misconfigurations in the cross-origin resource sharing (CORS) mechanism and improperly validates source communications.", + "References": [ + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5404", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5405", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5406" + ], + "Resolution": "Apply an update Upgrade to KACE SMA Versions 9.0.270 and later.", + "Revision": 50, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to Kapil Khot for reporting this vulnerability.", + "Title": "Multiple vulnerabilities in Quest (Dell) Kace K1000 Appliance", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 3, + "Workarounds": "Apply patch (SEC2018_20180410) NOTE: KACE SMA versions 9.0.270 and later include these security fixes." +} \ No newline at end of file diff --git a/data/37/vu_944837/vendor_ltys-bbymjc.json b/data/37/vu_944837/vendor_ltys-bbymjc.json new file mode 100644 index 0000000000..4b8dd6c801 --- /dev/null +++ b/data/37/vu_944837/vendor_ltys-bbymjc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-05-08T12:49:00-04:00", + "DateNotified": "2019-02-28T00:00:00", + "DateResponded": "2019-05-03T00:00:00", + "ID": "VU#944837", + "Revision": 1, + "Status": "Affected", + "Vendor": "Vertiv", + "VendorInformation": "", + "VendorRecordID": "LTYS-BBYMJC", + "VendorReferences": "UMG: https://www.vertiv.com/en-us/support/software-download/it-management/avocent-universal-management-gateway-appliance--software-downloads/\nTrellis: https://www.vertiv.com/en-us/support/software-download/software/trellis-enterprise-and-quick-start-solutions-software-downloads/", + "VendorStatement": "Vertiv (Avocent) has addressed these issues. Customers are encouraged to install Universal Management Gateway firmware version 4.2.2.21 or higher to address these vulnerabilities, located here. TrellisTM users of the Universal Management Gateway should install the update patch located here." +} \ No newline at end of file diff --git a/data/37/vu_944837/vu_944837.json b/data/37/vu_944837/vu_944837.json new file mode 100644 index 0000000000..275c326157 --- /dev/null +++ b/data/37/vu_944837/vu_944837.json @@ -0,0 +1,65 @@ +{ + "Author": "This document was written by Laurie Tyzenhaus.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": [ + "CVE-2019-9507", + "CVE-2019-9508", + "CVE-2019-9509" + ], + "CVSS_AccessComplexity": "L", + "CVSS_AccessVector": "N", + "CVSS_Authenication": "N", + "CVSS_AvailabilityImpact": "P", + "CVSS_BaseScore": 9.7, + "CVSS_BaseVector": "AV:N/AC:L/Au:N/C:C/I:C/A:P", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 8.701363316016, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "POC", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "--", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 8.7, + "CVSS_TemporalVector": "E:POC/RL:--/RC:C", + "DateCreated": "2019-02-27T07:52:00-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-08T13:12:00-04:00", + "DatePublic": "", + "Description": "CVE-2019-9507 Avocent UMG-4000 version 4.2.1.19 Web Application allows for arbitrary remote code execution at the same level of the application. The web application fails to neutralize or incorrectly neutralizes code syntax before using the input. [Focus of CVSS 2.0 score.] (CWE-95) CVE-2019-9508 Avocent UMG-4000 version 4.2.1.19 Web Application allows for Stored Cross Site Scripting (XSS). The web application is vulnerable to a malicious payload being stored on the site itself and will execute the malicious payload upon visiting the page, regardless of the URL followed. (CWE-79) CVE-2019-9509 Avocent UMG-4000 version 4.2.1.19 Web Application \"buttonID\" parameter is vulnerable to Reflected Cross Site Scripting (XSS) . The web application does not neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79)", + "ID": "VU#944837", + "IDNumber": "944837", + "IPProtocol": "", + "Impact": "Remote execution of arbitrary software.", + "Keywords": "VU#601461", + "Overview": "Vertiv's Avocent UMG-4000 Web Application vulnerable to Command Injection, Stored XSS and Reflected XSS which may allow an authenticated attacker with administrative level permissions to remotely execute arbitrary code.", + "References": [ + "https://www.vertiv.com/en-us/support/software-download/it-management/avocent-universal-management-gateway-appliance--software-downloads/", + "https://www.vertiv.com/en-us/support/software-download/software/trellis-enterprise-and-quick-start-solutions-software-downloads/" + ], + "Resolution": "Vertiv has addressed these issues. Customers are encouraged to install Universal Management Gateway firmware version 4.2.2.21 or higher to address these vulnerabilities, located here. TrellisTM users of the Universal Management Gateway should install the update patch located here.", + "Revision": 28, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to the reporter who wishes to remain anonymous.", + "Title": "Vertiv's Avocent UMG-4000 Web Application vulnerable to Command Injection, Stored XSS and Reflected XSS", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 3, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/38/vu_990638/vu_990638.json b/data/38/vu_990638/vu_990638.json index da0416798d..8254d7c13b 100644 --- a/data/38/vu_990638/vu_990638.json +++ b/data/38/vu_990638/vu_990638.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2004-11-02T11:03:45-04:00", "DateFirstPublished": "", "DateLastUpdated": "2004-11-02T11:05:00-04:00", diff --git a/data/39/vu_166939/vendor_cheu-b8blsh.json b/data/39/vu_166939/vendor_cheu-b8blsh.json new file mode 100644 index 0000000000..e1664e66ce --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-b8blsh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-12T10:07:00-04:00", + "DateNotified": "2019-01-11T10:59:03-05:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 1, + "Status": "Affected", + "Vendor": "Broadcom", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8BLSH", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-b8bm8u.json b/data/39/vu_166939/vendor_cheu-b8bm8u.json new file mode 100644 index 0000000000..8333436b09 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-b8bm8u.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-12T10:07:00-04:00", + "DateNotified": "2019-01-11T11:20:22-05:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 1, + "Status": "Affected", + "Vendor": "Apple", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8BM8U", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3np7.json b/data/39/vu_166939/vendor_cheu-bb3np7.json new file mode 100644 index 0000000000..acc74df235 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3np7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:35-04:00", + "DateNotified": "2019-04-09T13:34:59-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AirWatch", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NP7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3np9.json b/data/39/vu_166939/vendor_cheu-bb3np9.json new file mode 100644 index 0000000000..3fdcd13d77 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3np9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:35-04:00", + "DateNotified": "2019-04-09T13:34:59-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Actiontec", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NP9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3npb.json b/data/39/vu_166939/vendor_cheu-bb3npb.json new file mode 100644 index 0000000000..7200fa455b --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3npb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:36-04:00", + "DateNotified": "2019-04-09T13:34:59-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Alpine Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NPB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3npd.json b/data/39/vu_166939/vendor_cheu-bb3npd.json new file mode 100644 index 0000000000..364a94b049 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3npd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:36-04:00", + "DateNotified": "2019-04-09T13:35:00-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "A10 Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NPD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3npf.json b/data/39/vu_166939/vendor_cheu-bb3npf.json new file mode 100644 index 0000000000..6392d058f6 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3npf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:36-04:00", + "DateNotified": "2019-04-09T13:35:00-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Android Open Source Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NPF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3npn.json b/data/39/vu_166939/vendor_cheu-bb3npn.json new file mode 100644 index 0000000000..1104dbf713 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3npn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:38-04:00", + "DateNotified": "2019-04-09T13:35:01-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Actelis Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NPN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nq4.json b/data/39/vu_166939/vendor_cheu-bb3nq4.json new file mode 100644 index 0000000000..17716833ca --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nq4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-19T13:24:00-04:00", + "DateNotified": "2019-04-09T13:35:05-04:00", + "DateResponded": "2019-04-16T18:16:47-04:00", + "ID": "VU#166939", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Aruba Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BB3NQ4", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nq6.json b/data/39/vu_166939/vendor_cheu-bb3nq6.json new file mode 100644 index 0000000000..0180283c7d --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nq6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:42-04:00", + "DateNotified": "2019-04-09T13:35:05-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Alcatel-Lucent Enterprise", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQ6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nq8.json b/data/39/vu_166939/vendor_cheu-bb3nq8.json new file mode 100644 index 0000000000..2160bdc74d --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nq8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:42-04:00", + "DateNotified": "2019-04-09T13:35:05-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ADTRAN", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQ8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqa.json b/data/39/vu_166939/vendor_cheu-bb3nqa.json new file mode 100644 index 0000000000..8e3730a9e0 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqa.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:42-04:00", + "DateNotified": "2019-04-09T13:35:05-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Belden", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqd.json b/data/39/vu_166939/vendor_cheu-bb3nqd.json new file mode 100644 index 0000000000..b30966d996 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:43-04:00", + "DateNotified": "2019-04-09T13:35:05-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AVM GmbH", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqf.json b/data/39/vu_166939/vendor_cheu-bb3nqf.json new file mode 100644 index 0000000000..c12ddbdb18 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:43-04:00", + "DateNotified": "2019-04-09T13:35:05-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AhnLab Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqh.json b/data/39/vu_166939/vendor_cheu-bb3nqh.json new file mode 100644 index 0000000000..2ea7e60ffa --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:43-04:00", + "DateNotified": "2019-04-09T13:35:05-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "aep NETWORKS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqk.json b/data/39/vu_166939/vendor_cheu-bb3nqk.json new file mode 100644 index 0000000000..f78d6503fe --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:44-04:00", + "DateNotified": "2019-04-09T13:35:05-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Atheros Communications Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqm.json b/data/39/vu_166939/vendor_cheu-bb3nqm.json new file mode 100644 index 0000000000..21571b83d9 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:44-04:00", + "DateNotified": "2019-04-09T13:35:06-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Appgate Network Security", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqp.json b/data/39/vu_166939/vendor_cheu-bb3nqp.json new file mode 100644 index 0000000000..3d5165d190 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:44-04:00", + "DateNotified": "2019-04-09T13:35:06-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Avaya, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqr.json b/data/39/vu_166939/vendor_cheu-bb3nqr.json new file mode 100644 index 0000000000..5f2f65e636 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:45-04:00", + "DateNotified": "2019-04-09T13:35:06-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Aerohive", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqt.json b/data/39/vu_166939/vendor_cheu-bb3nqt.json new file mode 100644 index 0000000000..2654f4e720 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:45-04:00", + "DateNotified": "2019-04-09T13:35:06-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ANTlabs", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqv.json b/data/39/vu_166939/vendor_cheu-bb3nqv.json new file mode 100644 index 0000000000..dc53eefa38 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:45-04:00", + "DateNotified": "2019-04-09T13:35:07-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Akamai Technologies, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nqx.json b/data/39/vu_166939/vendor_cheu-bb3nqx.json new file mode 100644 index 0000000000..9453304243 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nqx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:45-04:00", + "DateNotified": "2019-04-09T13:35:07-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ACCESS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NQX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3ns9.json b/data/39/vu_166939/vendor_cheu-bb3ns9.json new file mode 100644 index 0000000000..3aa6767110 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3ns9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:54-04:00", + "DateNotified": "2019-04-09T13:35:24-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Honeywell", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NS9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nsb.json b/data/39/vu_166939/vendor_cheu-bb3nsb.json new file mode 100644 index 0000000000..a58958ab5b --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nsb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:55-04:00", + "DateNotified": "2019-04-09T13:35:22-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "DragonFly BSD Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NSB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nsd.json b/data/39/vu_166939/vendor_cheu-bb3nsd.json new file mode 100644 index 0000000000..786e1f9a84 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nsd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:55-04:00", + "DateNotified": "2019-04-09T13:35:22-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BlueCat Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NSD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nsf.json b/data/39/vu_166939/vendor_cheu-bb3nsf.json new file mode 100644 index 0000000000..38297146cf --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nsf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:55-04:00", + "DateNotified": "2019-04-09T13:35:26-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Marvell Semiconductors", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NSF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nsh.json b/data/39/vu_166939/vendor_cheu-bb3nsh.json new file mode 100644 index 0000000000..78981f3cd4 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nsh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:56-04:00", + "DateNotified": "2019-04-09T13:35:23-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Force10 Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NSH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nsl.json b/data/39/vu_166939/vendor_cheu-bb3nsl.json new file mode 100644 index 0000000000..0f2ee3657a --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nsl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:56-04:00", + "DateNotified": "2019-04-09T13:35:24-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Check Point Software Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NSL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nsn.json b/data/39/vu_166939/vendor_cheu-bb3nsn.json new file mode 100644 index 0000000000..b56e780d41 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nsn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:56-04:00", + "DateNotified": "2019-04-09T13:35:24-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "EfficientIP SAS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NSN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nst.json b/data/39/vu_166939/vendor_cheu-bb3nst.json new file mode 100644 index 0000000000..612cfce605 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nst.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:57-04:00", + "DateNotified": "2019-04-09T13:35:26-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "F5 Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NST", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nsv.json b/data/39/vu_166939/vendor_cheu-bb3nsv.json new file mode 100644 index 0000000000..636d6a3991 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nsv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:57-04:00", + "DateNotified": "2019-04-09T13:35:26-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Digi International", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NSV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nsx.json b/data/39/vu_166939/vendor_cheu-bb3nsx.json new file mode 100644 index 0000000000..f916d07c37 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nsx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:58-04:00", + "DateNotified": "2019-04-09T13:35:44-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lantronix", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NSX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nsz.json b/data/39/vu_166939/vendor_cheu-bb3nsz.json new file mode 100644 index 0000000000..4d7031a675 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nsz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:58-04:00", + "DateNotified": "2019-04-09T13:35:48-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sophos, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NSZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nt3.json b/data/39/vu_166939/vendor_cheu-bb3nt3.json new file mode 100644 index 0000000000..6d60256e2e --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nt3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:58-04:00", + "DateNotified": "2019-04-09T13:35:45-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Secure64 Software Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NT3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nt5.json b/data/39/vu_166939/vendor_cheu-bb3nt5.json new file mode 100644 index 0000000000..dfbdb67ac8 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nt5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:59-04:00", + "DateNotified": "2019-04-09T13:35:46-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sonos", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NT5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nt8.json b/data/39/vu_166939/vendor_cheu-bb3nt8.json new file mode 100644 index 0000000000..6943d13638 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nt8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:59-04:00", + "DateNotified": "2019-04-09T13:35:42-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SonicWall", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NT8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nta.json b/data/39/vu_166939/vendor_cheu-bb3nta.json new file mode 100644 index 0000000000..7b8e281ecc --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nta.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:37:59-04:00", + "DateNotified": "2019-04-09T13:35:51-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microchip Technology", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NTA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3ntc.json b/data/39/vu_166939/vendor_cheu-bb3ntc.json new file mode 100644 index 0000000000..dfe3ab49bf --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3ntc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:00-04:00", + "DateNotified": "2019-04-09T13:35:42-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SmoothWall", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NTC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nte.json b/data/39/vu_166939/vendor_cheu-bb3nte.json new file mode 100644 index 0000000000..5e1f414b73 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nte.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:00-04:00", + "DateNotified": "2019-04-09T13:35:42-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microsoft", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NTE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3ntp.json b/data/39/vu_166939/vendor_cheu-bb3ntp.json new file mode 100644 index 0000000000..38f85420f9 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3ntp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:02-04:00", + "DateNotified": "2019-04-09T13:35:47-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nixu", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NTP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nts.json b/data/39/vu_166939/vendor_cheu-bb3nts.json new file mode 100644 index 0000000000..35991feca9 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nts.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:03-04:00", + "DateNotified": "2019-04-09T13:35:21-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Mitel Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NTS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3ntu.json b/data/39/vu_166939/vendor_cheu-bb3ntu.json new file mode 100644 index 0000000000..f36eaada03 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3ntu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:03-04:00", + "DateNotified": "2019-04-09T13:35:46-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sierra Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NTU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3ntw.json b/data/39/vu_166939/vendor_cheu-bb3ntw.json new file mode 100644 index 0000000000..8cbbd8fe23 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3ntw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:03-04:00", + "DateNotified": "2019-04-09T13:35:23-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NTW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nty.json b/data/39/vu_166939/vendor_cheu-bb3nty.json new file mode 100644 index 0000000000..b1957ed989 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nty.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:04-04:00", + "DateNotified": "2019-04-09T13:35:24-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Arista Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NTY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nu2.json b/data/39/vu_166939/vendor_cheu-bb3nu2.json new file mode 100644 index 0000000000..8f41683de3 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nu2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:04-04:00", + "DateNotified": "2019-04-09T13:35:49-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Peplink", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NU2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nu4.json b/data/39/vu_166939/vendor_cheu-bb3nu4.json new file mode 100644 index 0000000000..431af9e724 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nu4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:04-04:00", + "DateNotified": "2019-04-09T13:35:26-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Hitachi", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NU4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nu6.json b/data/39/vu_166939/vendor_cheu-bb3nu6.json new file mode 100644 index 0000000000..c763471ca4 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nu6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:05-04:00", + "DateNotified": "2019-04-09T13:35:27-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "McAfee", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NU6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nua.json b/data/39/vu_166939/vendor_cheu-bb3nua.json new file mode 100644 index 0000000000..be47baa406 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nua.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:05-04:00", + "DateNotified": "2019-04-09T13:35:48-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Miredo", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NUA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nud.json b/data/39/vu_166939/vendor_cheu-bb3nud.json new file mode 100644 index 0000000000..cc25cfa1aa --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nud.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:06-04:00", + "DateNotified": "2019-04-09T13:35:52-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell SecureWorks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NUD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nuf.json b/data/39/vu_166939/vendor_cheu-bb3nuf.json new file mode 100644 index 0000000000..4aaa3fc403 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nuf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:06-04:00", + "DateNotified": "2019-04-09T13:35:22-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MetaSwitch", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NUF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nuj.json b/data/39/vu_166939/vendor_cheu-bb3nuj.json new file mode 100644 index 0000000000..49432f474a --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nuj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:07-04:00", + "DateNotified": "2019-04-09T13:35:23-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Command Software Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NUJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nuv.json b/data/39/vu_166939/vendor_cheu-bb3nuv.json new file mode 100644 index 0000000000..77b30b3d24 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nuv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:38:09-04:00", + "DateNotified": "2019-04-09T13:35:43-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ruckus Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NUV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nuy.json b/data/39/vu_166939/vendor_cheu-bb3nuy.json new file mode 100644 index 0000000000..c7c7a0c722 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nuy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:27-04:00", + "DateNotified": "2019-04-09T13:35:44-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Juniper Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NUY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nv3.json b/data/39/vu_166939/vendor_cheu-bb3nv3.json new file mode 100644 index 0000000000..615feb088e --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nv3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:28-04:00", + "DateNotified": "2019-04-09T13:35:47-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NetBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NV3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nv5.json b/data/39/vu_166939/vendor_cheu-bb3nv5.json new file mode 100644 index 0000000000..83526d2c18 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nv5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:28-04:00", + "DateNotified": "2019-04-09T13:35:47-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Zephyr Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NV5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nv7.json b/data/39/vu_166939/vendor_cheu-bb3nv7.json new file mode 100644 index 0000000000..9d0a43919b --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nv7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:28-04:00", + "DateNotified": "2019-04-09T13:35:44-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Riverbed Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NV7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nv9.json b/data/39/vu_166939/vendor_cheu-bb3nv9.json new file mode 100644 index 0000000000..286e7dc426 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nv9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:29-04:00", + "DateNotified": "2019-04-09T13:35:48-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenDNS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NV9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nvb.json b/data/39/vu_166939/vendor_cheu-bb3nvb.json new file mode 100644 index 0000000000..731b6fd7a9 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nvb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:29-04:00", + "DateNotified": "2019-04-09T13:35:49-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sourcefire", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NVB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nvd.json b/data/39/vu_166939/vendor_cheu-bb3nvd.json new file mode 100644 index 0000000000..53b9cca5dd --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nvd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:29-04:00", + "DateNotified": "2019-04-09T13:35:51-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Red Hat, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NVD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nvf.json b/data/39/vu_166939/vendor_cheu-bb3nvf.json new file mode 100644 index 0000000000..3729cd12d5 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nvf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:29-04:00", + "DateNotified": "2019-04-09T13:35:52-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TippingPoint Technologies Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NVF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nvh.json b/data/39/vu_166939/vendor_cheu-bb3nvh.json new file mode 100644 index 0000000000..f660cf220a --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nvh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-23T13:17:00-04:00", + "DateNotified": "2019-04-09T13:35:51-04:00", + "DateResponded": "2019-04-18T08:34:02-04:00", + "ID": "VU#166939", + "Revision": 4, + "Status": "Affected", + "Vendor": "Synology", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BB3NVH", + "VendorReferences": "https://www.synology.com/security/advisory/Synology_SA_19_18", + "VendorStatement": "Please note that RT1900ac [1] employs `wpa_supplicant' for EAPOL handshakes instead of `broadcom-sta' by default, but administrators are capable of force enabling the proprietary driver. Hence, Synology considers this vulnerability has limited impact on RT1900ac. For the \"brcmfmac\" concern, RT1900ac is not affected as it employs Broadcom proprietary driver instead of the open source version. [1] https://www.synology.com/products/RT1900ac" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nvk.json b/data/39/vu_166939/vendor_cheu-bb3nvk.json new file mode 100644 index 0000000000..af72e8c98f --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nvk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:30-04:00", + "DateNotified": "2019-04-09T13:35:52-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quagga", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NVK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nvq.json b/data/39/vu_166939/vendor_cheu-bb3nvq.json new file mode 100644 index 0000000000..6cfae204e4 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nvq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:31-04:00", + "DateNotified": "2019-04-09T13:35:48-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nokia", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NVQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nvu.json b/data/39/vu_166939/vendor_cheu-bb3nvu.json new file mode 100644 index 0000000000..4f4d58725c --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nvu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:31-04:00", + "DateNotified": "2019-04-09T13:35:52-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Wind River", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NVU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nvy.json b/data/39/vu_166939/vendor_cheu-bb3nvy.json new file mode 100644 index 0000000000..3787634184 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nvy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:32-04:00", + "DateNotified": "2019-04-09T13:35:17-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Express Logic", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NVY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nw4.json b/data/39/vu_166939/vendor_cheu-bb3nw4.json new file mode 100644 index 0000000000..3125180fed --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nw4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:33-04:00", + "DateNotified": "2019-04-09T13:35:17-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HTC", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NW4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nwd.json b/data/39/vu_166939/vendor_cheu-bb3nwd.json new file mode 100644 index 0000000000..e7171e99f9 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nwd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:34-04:00", + "DateNotified": "2019-04-09T13:35:23-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Gentoo Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NWD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nwf.json b/data/39/vu_166939/vendor_cheu-bb3nwf.json new file mode 100644 index 0000000000..6d9d91c3b3 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nwf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:34-04:00", + "DateNotified": "2019-04-09T13:35:24-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cradlepoint", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NWF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nwh.json b/data/39/vu_166939/vendor_cheu-bb3nwh.json new file mode 100644 index 0000000000..235e512a5a --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nwh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:35-04:00", + "DateNotified": "2019-04-09T13:35:25-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "InfoExpress, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NWH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nwk.json b/data/39/vu_166939/vendor_cheu-bb3nwk.json new file mode 100644 index 0000000000..aee220d646 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nwk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-19T13:26:00-04:00", + "DateNotified": "2019-04-09T13:35:25-04:00", + "DateResponded": "2019-04-16T07:54:11-04:00", + "ID": "VU#166939", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "LANCOM Systems GmbH", + "VendorInformation": "LANCOM Systems confirms that no LANCOM product is affected.", + "VendorRecordID": "CHEU-BB3NWK", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nwm.json b/data/39/vu_166939/vendor_cheu-bb3nwm.json new file mode 100644 index 0000000000..c2f4d76026 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nwm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-19T11:59:00-04:00", + "DateNotified": "2019-04-09T13:35:27-04:00", + "DateResponded": "2019-04-18T05:21:32-04:00", + "ID": "VU#166939", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Brocade Communication Systems", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BB3NWM", + "VendorReferences": "None", + "VendorStatement": "No Brocade Fibre Channel technology products from Broadcom are currently known to be affected by these\u00a0vulnerabilities." +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nwp.json b/data/39/vu_166939/vendor_cheu-bb3nwp.json new file mode 100644 index 0000000000..79d68ef062 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nwp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:35-04:00", + "DateNotified": "2019-04-09T13:35:27-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Comcast", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NWP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nwr.json b/data/39/vu_166939/vendor_cheu-bb3nwr.json new file mode 100644 index 0000000000..244091beab --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nwr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:36-04:00", + "DateNotified": "2019-04-09T13:35:53-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ubuntu", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NWR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nwu.json b/data/39/vu_166939/vendor_cheu-bb3nwu.json new file mode 100644 index 0000000000..2189693de8 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nwu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:36-04:00", + "DateNotified": "2019-04-09T13:35:26-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MediaTek", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NWU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nww.json b/data/39/vu_166939/vendor_cheu-bb3nww.json new file mode 100644 index 0000000000..59509bed31 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nww.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:37-04:00", + "DateNotified": "2019-04-09T13:35:22-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BlackBerry", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NWW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nwy.json b/data/39/vu_166939/vendor_cheu-bb3nwy.json new file mode 100644 index 0000000000..ab128290c7 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nwy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:37-04:00", + "DateNotified": "2019-04-09T13:35:22-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Infoblox", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NWY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nxc.json b/data/39/vu_166939/vendor_cheu-bb3nxc.json new file mode 100644 index 0000000000..cfd76c1e45 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nxc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:39-04:00", + "DateNotified": "2019-04-09T13:35:41-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Netgear, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NXC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nxe.json b/data/39/vu_166939/vendor_cheu-bb3nxe.json new file mode 100644 index 0000000000..168bed3bed --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nxe.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:39-04:00", + "DateNotified": "2019-04-09T13:35:42-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quantenna Communications", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NXE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nxk.json b/data/39/vu_166939/vendor_cheu-bb3nxk.json new file mode 100644 index 0000000000..398d8baaa0 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nxk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:40-04:00", + "DateNotified": "2019-04-09T13:35:45-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "VMware", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NXK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nxq.json b/data/39/vu_166939/vendor_cheu-bb3nxq.json new file mode 100644 index 0000000000..af29ddbbb5 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nxq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:41-04:00", + "DateNotified": "2019-04-09T13:35:53-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TrueOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NXQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nxt.json b/data/39/vu_166939/vendor_cheu-bb3nxt.json new file mode 100644 index 0000000000..0a2b23392f --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nxt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:41-04:00", + "DateNotified": "2019-04-09T13:35:49-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Turbolinux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NXT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nxy.json b/data/39/vu_166939/vendor_cheu-bb3nxy.json new file mode 100644 index 0000000000..df0c9ff4f2 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nxy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:42-04:00", + "DateNotified": "2019-04-09T13:35:47-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QUALCOMM Incorporated", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NXY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3ny2.json b/data/39/vu_166939/vendor_cheu-bb3ny2.json new file mode 100644 index 0000000000..766aafc679 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3ny2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:43-04:00", + "DateNotified": "2019-04-09T13:35:19-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Belkin, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NY2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3ny4.json b/data/39/vu_166939/vendor_cheu-bb3ny4.json new file mode 100644 index 0000000000..ccfe08ad12 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3ny4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:42:43-04:00", + "DateNotified": "2019-04-09T13:35:49-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Symantec", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NY4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nzl.json b/data/39/vu_166939/vendor_cheu-bb3nzl.json new file mode 100644 index 0000000000..4caaf61650 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nzl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:25-04:00", + "DateNotified": "2019-04-09T13:53:49-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TP-LINK", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NZL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nzn.json b/data/39/vu_166939/vendor_cheu-bb3nzn.json new file mode 100644 index 0000000000..fa373f53d2 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nzn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:26-04:00", + "DateNotified": "2019-04-09T13:53:50-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Zebra Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NZN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nzq.json b/data/39/vu_166939/vendor_cheu-bb3nzq.json new file mode 100644 index 0000000000..012d5b0af9 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nzq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:26-04:00", + "DateNotified": "2019-04-09T13:53:51-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NETSCOUT", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NZQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nzs.json b/data/39/vu_166939/vendor_cheu-bb3nzs.json new file mode 100644 index 0000000000..a0f3c98916 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nzs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:26-04:00", + "DateNotified": "2019-04-09T13:53:52-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Medtronic", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NZS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nzu.json b/data/39/vu_166939/vendor_cheu-bb3nzu.json new file mode 100644 index 0000000000..785963df53 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nzu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:26-04:00", + "DateNotified": "2019-04-09T13:53:53-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Slackware Linux Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NZU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nzw.json b/data/39/vu_166939/vendor_cheu-bb3nzw.json new file mode 100644 index 0000000000..ebc324818f --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nzw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:27-04:00", + "DateNotified": "2019-04-09T13:53:53-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Philips Electronics", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NZW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3nzy.json b/data/39/vu_166939/vendor_cheu-bb3nzy.json new file mode 100644 index 0000000000..f08742a74c --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3nzy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:27-04:00", + "DateNotified": "2019-04-09T13:53:54-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NEC Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3NZY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p22.json b/data/39/vu_166939/vendor_cheu-bb3p22.json new file mode 100644 index 0000000000..c8b993f889 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p22.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:27-04:00", + "DateNotified": "2019-04-09T13:53:54-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Toshiba Commerce Solutions", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P22", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p24.json b/data/39/vu_166939/vendor_cheu-bb3p24.json new file mode 100644 index 0000000000..14fe410701 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p24.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:27-04:00", + "DateNotified": "2019-04-09T13:53:55-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "PowerDNS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P24", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p26.json b/data/39/vu_166939/vendor_cheu-bb3p26.json new file mode 100644 index 0000000000..89c18e3b97 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p26.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:28-04:00", + "DateNotified": "2019-04-09T13:53:55-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Unisys", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P26", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p28.json b/data/39/vu_166939/vendor_cheu-bb3p28.json new file mode 100644 index 0000000000..21e85f7c32 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p28.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:28-04:00", + "DateNotified": "2019-04-09T13:53:56-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Mobile", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P28", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2a.json b/data/39/vu_166939/vendor_cheu-bb3p2a.json new file mode 100644 index 0000000000..effad00245 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2a.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:28-04:00", + "DateNotified": "2019-04-09T13:53:57-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Xilinx", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2A", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2c.json b/data/39/vu_166939/vendor_cheu-bb3p2c.json new file mode 100644 index 0000000000..60e0e16475 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2c.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:28-04:00", + "DateNotified": "2019-04-09T13:53:58-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2C", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2e.json b/data/39/vu_166939/vendor_cheu-bb3p2e.json new file mode 100644 index 0000000000..2c632ac871 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2e.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:29-04:00", + "DateNotified": "2019-04-09T13:53:59-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "netsnmp", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2E", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2g.json b/data/39/vu_166939/vendor_cheu-bb3p2g.json new file mode 100644 index 0000000000..6df04ea95c --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2g.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:29-04:00", + "DateNotified": "2019-04-09T13:53:59-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Semiconductor Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2G", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2j.json b/data/39/vu_166939/vendor_cheu-bb3p2j.json new file mode 100644 index 0000000000..4a239fef9d --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2j.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:29-04:00", + "DateNotified": "2019-04-09T13:54:00-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "m0n0wall", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2J", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2l.json b/data/39/vu_166939/vendor_cheu-bb3p2l.json new file mode 100644 index 0000000000..1beb63747b --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2l.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:29-04:00", + "DateNotified": "2019-04-09T13:54:01-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Paessler", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2L", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2p.json b/data/39/vu_166939/vendor_cheu-bb3p2p.json new file mode 100644 index 0000000000..36f8ef2869 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2p.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:30-04:00", + "DateNotified": "2019-04-09T13:54:04-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Roku", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2P", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2r.json b/data/39/vu_166939/vendor_cheu-bb3p2r.json new file mode 100644 index 0000000000..55fa1bd1b6 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:30-04:00", + "DateNotified": "2019-04-09T13:54:05-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "European Registry for Internet Domains", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2R", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2t.json b/data/39/vu_166939/vendor_cheu-bb3p2t.json new file mode 100644 index 0000000000..0ca07de777 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2t.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:30-04:00", + "DateNotified": "2019-04-09T13:54:06-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QLogic", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2T", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2v.json b/data/39/vu_166939/vendor_cheu-bb3p2v.json new file mode 100644 index 0000000000..91e073c22a --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2v.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:31-04:00", + "DateNotified": "2019-04-09T13:54:06-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2V", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2x.json b/data/39/vu_166939/vendor_cheu-bb3p2x.json new file mode 100644 index 0000000000..d802f9f6c2 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2x.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:31-04:00", + "DateNotified": "2019-04-09T13:54:07-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Pulse Secure", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2X", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p2z.json b/data/39/vu_166939/vendor_cheu-bb3p2z.json new file mode 100644 index 0000000000..26b7fcd443 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p2z.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:31-04:00", + "DateNotified": "2019-04-09T13:54:08-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SUSE Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P2Z", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p33.json b/data/39/vu_166939/vendor_cheu-bb3p33.json new file mode 100644 index 0000000000..c9db0d47e6 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p33.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:32-04:00", + "DateNotified": "2019-04-09T13:54:09-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CZ.NIC", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P33", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p35.json b/data/39/vu_166939/vendor_cheu-bb3p35.json new file mode 100644 index 0000000000..2968ebd9cb --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p35.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:32-04:00", + "DateNotified": "2019-04-09T13:54:09-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenConnect", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P35", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p37.json b/data/39/vu_166939/vendor_cheu-bb3p37.json new file mode 100644 index 0000000000..e0aba01823 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p37.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:32-04:00", + "DateNotified": "2019-04-09T13:54:10-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NLnet Labs", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P37", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p39.json b/data/39/vu_166939/vendor_cheu-bb3p39.json new file mode 100644 index 0000000000..1bdfb9a76b --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p39.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:33-04:00", + "DateNotified": "2019-04-09T13:54:11-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Technicolor", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P39", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p3b.json b/data/39/vu_166939/vendor_cheu-bb3p3b.json new file mode 100644 index 0000000000..115296df50 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p3b.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:33-04:00", + "DateNotified": "2019-04-09T13:54:12-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Rocket RTOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P3B", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p3d.json b/data/39/vu_166939/vendor_cheu-bb3p3d.json new file mode 100644 index 0000000000..0d601185a2 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p3d.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T13:54:33-04:00", + "DateNotified": "2019-04-09T13:54:12-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TDS Telecom", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P3D", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p3f.json b/data/39/vu_166939/vendor_cheu-bb3p3f.json new file mode 100644 index 0000000000..829fc99937 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p3f.json @@ -0,0 +1,14 @@ +{ + "Addendum": "Zyxel was initially marked as Affected, this was an error, Zyxel has stated that they are not affected by these vulnerabilities.", + "DateLastUpdated": "2019-04-19T12:19:00-04:00", + "DateNotified": "2019-04-09T13:54:14-04:00", + "DateResponded": "2019-04-15T06:01:04-04:00", + "ID": "VU#166939", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "Zyxel", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BB3P3F", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p66.json b/data/39/vu_166939/vendor_cheu-bb3p66.json new file mode 100644 index 0000000000..ff8a70e027 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p66.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-19T13:24:00-04:00", + "DateNotified": "2019-04-09T13:54:44-04:00", + "DateResponded": "2019-04-17T12:22:34-04:00", + "ID": "VU#166939", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Palo Alto Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BB3P66", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p69.json b/data/39/vu_166939/vendor_cheu-bb3p69.json new file mode 100644 index 0000000000..af18ed6f22 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p69.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:33-04:00", + "DateNotified": "2019-04-09T13:54:46-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Snort", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P69", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6b.json b/data/39/vu_166939/vendor_cheu-bb3p6b.json new file mode 100644 index 0000000000..b9e8090aa0 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6b.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:34-04:00", + "DateNotified": "2019-04-09T13:54:47-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fastly", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P6B", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6d.json b/data/39/vu_166939/vendor_cheu-bb3p6d.json new file mode 100644 index 0000000000..a78f8022e9 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6d.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:34-04:00", + "DateNotified": "2019-04-09T13:54:48-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lenovo", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P6D", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6f.json b/data/39/vu_166939/vendor_cheu-bb3p6f.json new file mode 100644 index 0000000000..69e99eede2 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6f.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:34-04:00", + "DateNotified": "2019-04-09T13:54:49-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Openwall GNU/*/Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P6F", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6h.json b/data/39/vu_166939/vendor_cheu-bb3p6h.json new file mode 100644 index 0000000000..0efed095c4 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6h.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:34-04:00", + "DateNotified": "2019-04-09T13:54:50-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Foundry Brocade", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P6H", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6k.json b/data/39/vu_166939/vendor_cheu-bb3p6k.json new file mode 100644 index 0000000000..06cffefd44 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6k.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:35-04:00", + "DateNotified": "2019-04-09T13:54:50-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "eCosCentric", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P6K", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6m.json b/data/39/vu_166939/vendor_cheu-bb3p6m.json new file mode 100644 index 0000000000..6931ac86c2 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6m.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:35-04:00", + "DateNotified": "2019-04-09T13:54:51-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Micro Focus", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P6M", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6p.json b/data/39/vu_166939/vendor_cheu-bb3p6p.json new file mode 100644 index 0000000000..bac6dbb6d7 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6p.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:35-04:00", + "DateNotified": "2019-04-09T13:54:52-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Devicescape", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P6P", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6r.json b/data/39/vu_166939/vendor_cheu-bb3p6r.json new file mode 100644 index 0000000000..e3c5041f23 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:35-04:00", + "DateNotified": "2019-04-09T13:54:53-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ARRIS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P6R", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6t.json b/data/39/vu_166939/vendor_cheu-bb3p6t.json new file mode 100644 index 0000000000..e8b8fe0270 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6t.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:36-04:00", + "DateNotified": "2019-04-09T13:54:55-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Huawei Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P6T", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6v.json b/data/39/vu_166939/vendor_cheu-bb3p6v.json new file mode 100644 index 0000000000..d7fee6bbd5 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6v.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-12T17:56:00-04:00", + "DateNotified": "2019-04-09T13:54:56-04:00", + "DateResponded": "2019-04-12T16:52:54-04:00", + "ID": "VU#166939", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Extreme Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BB3P6V", + "VendorReferences": "None", + "VendorStatement": "For VU#166939, WiNG wireless products from Extreme Networks, Inc. are not affected because we do not use the affected chipsets or drivers." +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p6y.json b/data/39/vu_166939/vendor_cheu-bb3p6y.json new file mode 100644 index 0000000000..670dd3e036 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p6y.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:36-04:00", + "DateNotified": "2019-04-09T13:54:57-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sony Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P6Y", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p72.json b/data/39/vu_166939/vendor_cheu-bb3p72.json new file mode 100644 index 0000000000..778eb0a8e5 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p72.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:36-04:00", + "DateNotified": "2019-04-09T13:54:58-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell EMC", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P72", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p74.json b/data/39/vu_166939/vendor_cheu-bb3p74.json new file mode 100644 index 0000000000..8808fc4456 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p74.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:37-04:00", + "DateNotified": "2019-04-09T13:54:59-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ceragon Networks Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P74", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p76.json b/data/39/vu_166939/vendor_cheu-bb3p76.json new file mode 100644 index 0000000000..d0b51836bf --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p76.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:37-04:00", + "DateNotified": "2019-04-09T13:55:00-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Geexbox", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P76", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p78.json b/data/39/vu_166939/vendor_cheu-bb3p78.json new file mode 100644 index 0000000000..f5cff18b13 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p78.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:37-04:00", + "DateNotified": "2019-04-09T13:55:01-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Illumos", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P78", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7a.json b/data/39/vu_166939/vendor_cheu-bb3p7a.json new file mode 100644 index 0000000000..27433ebe55 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7a.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:37-04:00", + "DateNotified": "2019-04-09T13:55:01-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ericsson", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7A", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7c.json b/data/39/vu_166939/vendor_cheu-bb3p7c.json new file mode 100644 index 0000000000..3c7b64d249 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7c.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:38-04:00", + "DateNotified": "2019-04-09T13:55:02-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CoreOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7C", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7e.json b/data/39/vu_166939/vendor_cheu-bb3p7e.json new file mode 100644 index 0000000000..df4b1441cc --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7e.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:38-04:00", + "DateNotified": "2019-04-09T13:55:02-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Barracuda Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7E", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7g.json b/data/39/vu_166939/vendor_cheu-bb3p7g.json new file mode 100644 index 0000000000..87a0ef392a --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7g.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:38-04:00", + "DateNotified": "2019-04-09T13:55:03-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "eero", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7G", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7j.json b/data/39/vu_166939/vendor_cheu-bb3p7j.json new file mode 100644 index 0000000000..eaf4528977 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7j.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:38-04:00", + "DateNotified": "2019-04-09T13:55:04-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Systems Consortium - DHCP", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7J", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7l.json b/data/39/vu_166939/vendor_cheu-bb3p7l.json new file mode 100644 index 0000000000..7f12439dc2 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7l.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:39-04:00", + "DateNotified": "2019-04-09T13:55:05-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Espressif Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7L", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7n.json b/data/39/vu_166939/vendor_cheu-bb3p7n.json new file mode 100644 index 0000000000..53e9a85f57 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7n.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:39-04:00", + "DateNotified": "2019-04-09T13:55:06-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Interniche Technologies, inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7N", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7q.json b/data/39/vu_166939/vendor_cheu-bb3p7q.json new file mode 100644 index 0000000000..1a28fb8f44 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7q.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:39-04:00", + "DateNotified": "2019-04-09T13:55:06-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Linksys", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7Q", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7s.json b/data/39/vu_166939/vendor_cheu-bb3p7s.json new file mode 100644 index 0000000000..4ea802063a --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7s.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:39-04:00", + "DateNotified": "2019-04-09T13:55:07-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Arch Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7S", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7u.json b/data/39/vu_166939/vendor_cheu-bb3p7u.json new file mode 100644 index 0000000000..758aec56ef --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7u.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:40-04:00", + "DateNotified": "2019-04-09T13:55:09-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "dnsmasq", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7U", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7w.json b/data/39/vu_166939/vendor_cheu-bb3p7w.json new file mode 100644 index 0000000000..6f1d699096 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7w.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:40-04:00", + "DateNotified": "2019-04-09T13:55:09-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HP Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7W", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p7y.json b/data/39/vu_166939/vendor_cheu-bb3p7y.json new file mode 100644 index 0000000000..4b31b2bb31 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p7y.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:40-04:00", + "DateNotified": "2019-04-09T13:55:10-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "FreeBSD Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P7Y", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p82.json b/data/39/vu_166939/vendor_cheu-bb3p82.json new file mode 100644 index 0000000000..523f680931 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p82.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:40-04:00", + "DateNotified": "2019-04-09T13:55:10-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "F-Secure Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P82", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p84.json b/data/39/vu_166939/vendor_cheu-bb3p84.json new file mode 100644 index 0000000000..bbf332e3ef --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p84.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:41-04:00", + "DateNotified": "2019-04-09T13:55:11-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GNU glibc", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P84", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p86.json b/data/39/vu_166939/vendor_cheu-bb3p86.json new file mode 100644 index 0000000000..356c502d5c --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p86.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:41-04:00", + "DateNotified": "2019-04-09T13:55:11-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fedora Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P86", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p88.json b/data/39/vu_166939/vendor_cheu-bb3p88.json new file mode 100644 index 0000000000..54b3dbeea7 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p88.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-19T13:21:00-04:00", + "DateNotified": "2019-04-09T13:55:12-04:00", + "DateResponded": "2019-04-18T17:22:14-04:00", + "ID": "VU#166939", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Cisco", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BB3P88", + "VendorReferences": "None", + "VendorStatement": "Cisco has evaluated these vulnerabilities and confirmed that no Cisco products are impacted. This assessment is valid for all Cisco enterprise products and Cisco Small Business products." +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8a.json b/data/39/vu_166939/vendor_cheu-bb3p8a.json new file mode 100644 index 0000000000..3751590b2e --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8a.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:41-04:00", + "DateNotified": "2019-04-09T13:55:13-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "pfSense", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8A", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8d.json b/data/39/vu_166939/vendor_cheu-bb3p8d.json new file mode 100644 index 0000000000..7fbbf005f9 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8d.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:42-04:00", + "DateNotified": "2019-04-09T13:55:18-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Intel", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8D", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8f.json b/data/39/vu_166939/vendor_cheu-bb3p8f.json new file mode 100644 index 0000000000..ab8acf2a47 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8f.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:42-04:00", + "DateNotified": "2019-04-09T13:55:18-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Deutsche Telekom", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8F", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8h.json b/data/39/vu_166939/vendor_cheu-bb3p8h.json new file mode 100644 index 0000000000..f4f8692ed4 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8h.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:42-04:00", + "DateNotified": "2019-04-09T13:55:20-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MikroTik", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8H", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8k.json b/data/39/vu_166939/vendor_cheu-bb3p8k.json new file mode 100644 index 0000000000..b41d4ed887 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8k.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:43-04:00", + "DateNotified": "2019-04-09T13:55:20-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AsusTek Computer Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8K", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8m.json b/data/39/vu_166939/vendor_cheu-bb3p8m.json new file mode 100644 index 0000000000..ba61a3ac3d --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8m.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:43-04:00", + "DateNotified": "2019-04-09T13:55:21-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Debian GNU/Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8M", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8p.json b/data/39/vu_166939/vendor_cheu-bb3p8p.json new file mode 100644 index 0000000000..b72141d4e4 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8p.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:43-04:00", + "DateNotified": "2019-04-09T13:55:21-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Google", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8P", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8r.json b/data/39/vu_166939/vendor_cheu-bb3p8r.json new file mode 100644 index 0000000000..c94f72dfd9 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:43-04:00", + "DateNotified": "2019-04-09T13:55:22-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cambium Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8R", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8t.json b/data/39/vu_166939/vendor_cheu-bb3p8t.json new file mode 100644 index 0000000000..2a09aec6fd --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8t.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:44-04:00", + "DateNotified": "2019-04-09T13:55:23-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Blue Coat Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8T", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8v.json b/data/39/vu_166939/vendor_cheu-bb3p8v.json new file mode 100644 index 0000000000..1fa1b91f20 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8v.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:44-04:00", + "DateNotified": "2019-04-09T13:55:24-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CA Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8V", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p8x.json b/data/39/vu_166939/vendor_cheu-bb3p8x.json new file mode 100644 index 0000000000..fdae4b5092 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p8x.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:44-04:00", + "DateNotified": "2019-04-09T13:55:26-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "D-Link Systems, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P8X", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p9h.json b/data/39/vu_166939/vendor_cheu-bb3p9h.json new file mode 100644 index 0000000000..3f63b091e7 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p9h.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:47-04:00", + "DateNotified": "2019-04-09T13:55:42-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "IBM Corporation (zseries)", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P9H", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p9p.json b/data/39/vu_166939/vendor_cheu-bb3p9p.json new file mode 100644 index 0000000000..17530beb29 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p9p.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:48-04:00", + "DateNotified": "2019-04-09T13:55:46-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Systems Consortium", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P9P", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p9r.json b/data/39/vu_166939/vendor_cheu-bb3p9r.json new file mode 100644 index 0000000000..364fb15771 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p9r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:49-04:00", + "DateNotified": "2019-04-09T13:55:47-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "DesktopBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P9R", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p9t.json b/data/39/vu_166939/vendor_cheu-bb3p9t.json new file mode 100644 index 0000000000..932c967232 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p9t.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:49-04:00", + "DateNotified": "2019-04-09T13:55:48-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Joyent", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P9T", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb3p9v.json b/data/39/vu_166939/vendor_cheu-bb3p9v.json new file mode 100644 index 0000000000..576574a2e0 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb3p9v.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-09T14:00:49-04:00", + "DateNotified": "2019-04-09T13:55:48-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AT&T", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB3P9V", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb6sav.json b/data/39/vu_166939/vendor_cheu-bb6sav.json new file mode 100644 index 0000000000..8b658885e6 --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb6sav.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-12T16:34:22-04:00", + "DateNotified": "2019-04-12T16:31:43-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "wolfSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB6SAV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb6seh.json b/data/39/vu_166939/vendor_cheu-bb6seh.json new file mode 100644 index 0000000000..19cbf8e4dc --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb6seh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-12T16:44:32-04:00", + "DateNotified": "2019-04-12T16:39:53-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "LibreSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB6SEH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vendor_cheu-bb9q6c.json b/data/39/vu_166939/vendor_cheu-bb9q6c.json new file mode 100644 index 0000000000..9ebd170d3e --- /dev/null +++ b/data/39/vu_166939/vendor_cheu-bb9q6c.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-15T14:48:59-04:00", + "DateNotified": "2019-04-15T14:43:40-04:00", + "DateResponded": "", + "ID": "VU#166939", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fortinet, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB9Q6C", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/39/vu_166939/vu_166939.json b/data/39/vu_166939/vu_166939.json new file mode 100644 index 0000000000..43f08ffe8a --- /dev/null +++ b/data/39/vu_166939/vu_166939.json @@ -0,0 +1,69 @@ +{ + "Author": "This document was written by Trent Novelly.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": [ + "CVE-2019-9503", + "CVE-2019-9500", + "CVE-2019-9501", + "CVE-2019-9502" + ], + "CVSS_AccessComplexity": "H", + "CVSS_AccessVector": "A", + "CVSS_Authenication": "N", + "CVSS_AvailabilityImpact": "C", + "CVSS_BaseScore": 6.8, + "CVSS_BaseVector": "AV:A/AC:H/Au:N/C:C/I:C/A:C", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 3.9871413654912, + "CVSS_EnvironmentalVector": "CDP:ND/TD:M/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "POC", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "OF", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "M", + "CVSS_TemporalScore": 5.3, + "CVSS_TemporalVector": "E:POC/RL:OF/RC:ND", + "DateCreated": "2018-10-30T10:37:34-04:00", + "DateFirstPublished": "2019-04-17T09:52:23-04:00", + "DateLastUpdated": "2019-04-23T14:28:00-04:00", + "DatePublic": "2019-04-15T00:00:00", + "Description": "Quarkslab has researched and reported multiple vulnerabilities affecting Broadcom WiFi drivers. Vulnerabilities in the open source brcmfmac driver: CVE-2019-9503: If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and not be processed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. CVE-2019-9500: If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited by compromised chipsets to compromise the host, or when used in combination with the above frame validation bypass, can be used remotely. NOTE: The brcmfmac driver only works with Broadcom FullMAC chipsets. Vulnerabilities in the Broadcom wl driver: Two heap buffer overflows can be triggered in the client when parsing an EAPOL message 3 during the 4-way handshake from the access point (AP). CVE-2019-9501: By supplying a vendor information element with a data length larger than 32 bytes, a heap buffer overflow is triggered in wlc_wpa_sup_eapol. CVE-2019-9502: If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. NOTE: When the wl driver is used with SoftMAC chipsets, these vulnerabilities are triggered in the host's kernel. When a FullMAC chipset is being used, these vulnerabilities would be triggered in the chipset's firmware.", + "ID": "VU#166939", + "IDNumber": "166939", + "IPProtocol": "", + "Impact": "In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, these vulnerabilities will result in denial-of-service conditions.", + "Keywords": "", + "Overview": "The Broadcom wl driver and the open-source brcmfmac driver for Broadcom WiFi chipsets contain multiple vulnerabilities. The Broadcom wl driver is vulnerable to two heap buffer overflows, and the open-source brcmfmac driver is vulnerable to a frame validation bypass and a heap buffer overflow.", + "References": [ + "https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html", + "https://lore.kernel.org/linux-wireless/1550148232-4309-1-git-send-email-arend.vanspriel@broadcom.com", + "https://broadcom.com/", + "https://git.kernel.org/linus/a4176ec356c73a46c07c181c6d04039fafa34a9f", + "https://git.kernel.org/linus/1b5e2423164b3670e8bc9174e4762d297990deff" + ], + "Resolution": "Apply Patches\nThe brcmfmac driver has been patched to address these vulnerabilities.", + "Revision": 35, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to Hugues Anguelkov during his internship at Quarkslab for reporting this vulnerability.", + "Title": "Broadcom WiFi chipset drivers contain multiple vulnerabilities", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "The following workarounds can help mitigate this and other WiFi vulnerabilities: Use Trusted Wifi\nOnly use WiFi networks that you trust." +} \ No newline at end of file diff --git a/data/39/vu_794939/vu_794939.json b/data/39/vu_794939/vu_794939.json new file mode 100644 index 0000000000..6ac4e63ff9 --- /dev/null +++ b/data/39/vu_794939/vu_794939.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-01-23T13:35:54-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-03-12T14:51:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#794939", + "IDNumber": "794939", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "https://scmsinc.com/product/circuitwerkes-sicon-8-voice-recordable-transmitter-site-remote-control/", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 11, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Sicon-8", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/39/vu_990539/vu_990539.json b/data/39/vu_990539/vu_990539.json index 9a351d374e..075b9b1497 100644 --- a/data/39/vu_990539/vu_990539.json +++ b/data/39/vu_990539/vu_990539.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "15", "CERTAdvisory": "", "CVEIDs": "CVE-2002-0421", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2002-02-28T11:10:42-05:00", "DateFirstPublished": "", "DateLastUpdated": "2002-10-23T12:56:00-04:00", diff --git a/data/4/vu_339704/vendor_wdon-b64lrl.json b/data/4/vu_339704/vendor_wdon-b64lrl.json new file mode 100644 index 0000000000..73e072141f --- /dev/null +++ b/data/4/vu_339704/vendor_wdon-b64lrl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-11-01T11:59:00-04:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#339704", + "Revision": 1, + "Status": "Affected", + "Vendor": "Cisco", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "WDON-B64LRL", + "VendorReferences": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181031-asaftd-sip-dos", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/4/vu_975504/vendor_cheu-b8j3cq.json b/data/4/vu_975504/vendor_cheu-b8j3cq.json new file mode 100644 index 0000000000..62fd998144 --- /dev/null +++ b/data/4/vu_975504/vendor_cheu-b8j3cq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-17T20:08:16-05:00", + "DateNotified": "2019-01-17T20:02:43-05:00", + "DateResponded": "", + "ID": "VU#975504", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microsoft", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8J3CQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/4/vu_975504/vu_975504.json b/data/4/vu_975504/vu_975504.json new file mode 100644 index 0000000000..244c74879e --- /dev/null +++ b/data/4/vu_975504/vu_975504.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-01-17T19:11:00-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-04-12T11:06:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#975504", + "IDNumber": "975504", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 3, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Micrsoft MBR divide by zero vulnerability", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/41/vu_324041/vu_324041.json b/data/41/vu_324041/vu_324041.json new file mode 100644 index 0000000000..25537a5ac4 --- /dev/null +++ b/data/41/vu_324041/vu_324041.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-10-15T09:20:06-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-09T12:36:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#324041", + "IDNumber": "324041", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "[VRF#18-10-JTTVH]", + "Overview": "", + "References": "https://github.com/ceballosm/scratchpad/tree/master/SEL", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 10, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "SEL-5056 Flow Controller", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/41/vu_518741/vu_518741.json b/data/41/vu_518741/vu_518741.json new file mode 100644 index 0000000000..85fc90f4db --- /dev/null +++ b/data/41/vu_518741/vu_518741.json @@ -0,0 +1,63 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-01-02T13:35:46-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-01-02T13:38:00-05:00", + "DatePublic": "", + "Description": "190819\t2018-10-15 RSVPMaker for Toastmasters Plugin for WordPress import_export Page Account Creation CSRF RSVPMaker for Toastmasters Plugin for WordPress contains a flaw as HTTP requests to the import_export page, as called by /wp-admin/admin.php, do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to create user accounts. https://www.pluginvulnerabilities.com/2018/10/15/full-disclosure-of-cross-site-request-forgery-csrf-user-import-vulnerability-in-rsvpmaker-for-toastmasters/\nWordpress hosts this plugin (https://wordpress.org/plugins/rsvpmaker-for-toastmasters/advanced/)\nCurrent version is 3.3.9 updated Dec 2018. Fix? unknown", + "ID": "VU#518741", + "IDNumber": "518741", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": [ + "RSVPMaker for Toastmasters", + "WordPress", + "CSRF", + "VU#361155" + ], + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 1, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "RSVPMaker for Toastmasters Plugin for WordPress vulnerable to CSRF", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/43/vu_991243/vu_991243.json b/data/43/vu_991243/vu_991243.json index fe97e89c4e..605b6af629 100644 --- a/data/43/vu_991243/vu_991243.json +++ b/data/43/vu_991243/vu_991243.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2002-01-08T10:16:08-05:00", "DateFirstPublished": "", "DateLastUpdated": "2002-01-09T11:05:00-05:00", diff --git a/data/45/vu_638245/vendor_ltys-b6glc3.json b/data/45/vu_638245/vendor_ltys-b6glc3.json new file mode 100644 index 0000000000..ec4399f941 --- /dev/null +++ b/data/45/vu_638245/vendor_ltys-b6glc3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2018-11-13T10:44:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#638245", + "Revision": 1, + "Status": "Affected", + "Vendor": "Apache Struts", + "VendorInformation": "", + "VendorRecordID": "LTYS-B6GLC3", + "VendorReferences": "https://issues.apache.org/jira/browse/FILEUPLOAD-279\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-1000031 \nhttps://issues.apache.org/jira/browse/WW-4812", + "VendorStatement": "The Apache Struts Team recommends to immediately upgrade your Struts 2.3.36 based projects to use the latest released version of Commons FileUpload library, which is currently 1.3.3. This is necessary to prevent your publicly accessible web site from being exposed to possible Remote Code Execution attacks." +} \ No newline at end of file diff --git a/data/45/vu_638245/vu_638245.json b/data/45/vu_638245/vu_638245.json new file mode 100644 index 0000000000..8ec09ecdc0 --- /dev/null +++ b/data/45/vu_638245/vu_638245.json @@ -0,0 +1,66 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2016-1000031", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-11-13T09:01:35-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2018-11-21T10:05:00-05:00", + "DatePublic": "", + "Description": "The vulnerability is in the commons-fileupload component, which is the built-in file upload mechanism for Struts. It affects any app that was built using Struts 2.3.x, as those versions include the vulnerable commons-fileupload 1.3.2 library. The bug is actually rather old, and researchers disclosed it to the Apache Software Foundation in 2016. At the time, Apache released a patched version of the library, which was included in Struts 2.5.x. The Apache Struts Team recommends to immediately upgrade your Struts 2.3.36 based projects to use the latest released version of Commons FileUpload library, which is currently 1.3.3. This is necessary to prevent your publicly accessible web site from being exposed to possible Remote Code Execution attacks. This affects Struts 2.3.36 and prior. Struts versions from 2.5.12 are already using the latest commons-fileupload version. Your project is affected if it uses the built-in file upload mechanism of Struts 2, which defaults to the use of commons-fileupload. The updated commons-fileupload library is a drop-in replacement for the vulnerable version. Deployed applications can be hardened by replacing the commons-fileupload jar file in WEB-INF/lib with the fixed jar.", + "ID": "VU#638245", + "IDNumber": "638245", + "IPProtocol": "", + "Impact": "Remote Code Execution.", + "Keywords": [ + "Struts", + "Apache", + "Commons FileUpload DiskFileItem Class File Manipulation Remote Code Execution Weakness", + "LOBSTER" + ], + "Overview": "Custom Libraries", + "References": [ + "https://duo.com/decipher/apache-warns-of-critical-flaw-in-struts-2-framework", + "https://www.linkedin.com/feed/update/urn:li:activity:6466224237031018496" + ], + "Resolution": "Upgrade Commons FileUpload to version 1.3.3 when running Struts 2.3.36 or prior. The FileUpload is a separate installation.", + "Revision": 9, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Apache Struts 2.5.11 and earlier vulnerable to remote code execution via Commons FileUpload library.", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/45/vu_872645/vu_872645.json b/data/45/vu_872645/vu_872645.json new file mode 100644 index 0000000000..e75b1ad205 --- /dev/null +++ b/data/45/vu_872645/vu_872645.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2019-9504", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-03-18T16:22:33-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-14T08:21:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#872645", + "IDNumber": "872645", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "[VRF#19-03-KSLFW]", + "Overview": "", + "References": "http://www.iraje.com/", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 22, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Iraje Privileged Identity Manager (PIM) 6.5.0 vulnerable to privlege escalation", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/45/vu_991145/vu_991145.json b/data/45/vu_991145/vu_991145.json index 2bdfb99322..ed7a316376 100644 --- a/data/45/vu_991145/vu_991145.json +++ b/data/45/vu_991145/vu_991145.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "CVE-2003-0094", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2003-03-05T16:28:57-05:00", "DateFirstPublished": "", "DateLastUpdated": "2003-03-14T12:22:00-04:00", diff --git a/data/47/vu_294747/vu_294747.json b/data/47/vu_294747/vu_294747.json new file mode 100644 index 0000000000..8356acb44d --- /dev/null +++ b/data/47/vu_294747/vu_294747.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-02-20T15:13:03-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-04-26T09:43:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#294747", + "IDNumber": "294747", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "https://fusiontables.google.com/embedviz?q=select+col1+from+1qN7vkDRuRsU6TqQpjS2IDeik0ubnXbLExKO9v3cT&viz=MAP&h=false&lat=37.21999124941695&lng=-95.16197962245633&t=1&z=5&l=col1&y=2&tmplt=2&hml=TWO_COL_LAT_LNG", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 16, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Yunni iLnk P2P", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/49/vu_169249/vendor_ltys-b3xnxn.json b/data/49/vu_169249/vendor_ltys-b3xnxn.json new file mode 100644 index 0000000000..fc4fa3187f --- /dev/null +++ b/data/49/vu_169249/vendor_ltys-b3xnxn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-05-10T13:32:00-04:00", + "DateNotified": "2018-08-24T00:00:00", + "DateResponded": "2018-08-24T00:00:00", + "ID": "VU#169249", + "Revision": 6, + "Status": "Affected", + "Vendor": "PrinterLogic", + "VendorInformation": "For more information, please visit: https://www.printerlogic.com/security-bulletin/", + "VendorRecordID": "LTYS-B3XNXN", + "VendorReferences": "https://www.printerlogic.com/security-bulletin/", + "VendorStatement": "Vendor states: \"Security vulnerabilities referenced in VU#169249 have been resolved\"" +} \ No newline at end of file diff --git a/data/49/vu_169249/vu_169249.json b/data/49/vu_169249/vu_169249.json new file mode 100644 index 0000000000..d64d7db3bc --- /dev/null +++ b/data/49/vu_169249/vu_169249.json @@ -0,0 +1,75 @@ +{ + "Author": "This document was written by Laurie Tyzenhaus.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": [ + "CVE-2018-5408", + "CVE-2018-5409", + "CVE-2019-9505" + ], + "CVSS_AccessComplexity": "M", + "CVSS_AccessVector": "N", + "CVSS_Authenication": "N", + "CVSS_AvailabilityImpact": "N", + "CVSS_BaseScore": 7.8, + "CVSS_BaseVector": "AV:N/AC:M/Au:N/C:P/I:C/A:N", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "P", + "CVSS_EnvironmentalScore": 7.810852056, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 7.8, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-06-14T14:09:17-04:00", + "DateFirstPublished": "2019-05-03T12:15:21-04:00", + "DateLastUpdated": "2019-05-14T08:31:00-04:00", + "DatePublic": "2019-05-03T00:00:00", + "Description": "PrinterLogic versions up to and including 18.3.1.96 are vulnerable to multiple attacks. The PrinterLogic agent, running as SYSTEM, does not validate the PrinterLogic Management Portal's SSL certificate, validate PrinterLogic update packages, or sanitize web browser input. CVE-2018-5408: The PrinterLogic Print Management software does not validate, or incorrectly validates, the PrinterLogic management portal's SSL certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host. (CWE-295) CVE-2018-5409: PrinterLogic Print Management software updates and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit. (CWE-494) CVE-2019-9505: PrinterLogic Print Management software does not sanitize special characters allowing for remote unauthorized changes to configuration files. (CWE-159)", + "ID": "VU#169249", + "IDNumber": "169249", + "IPProtocol": "", + "Impact": "An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges.", + "Keywords": [ + "CWE-295; CWE-494; CWE-159; PrinterLogic; SSL certificate", + "CVE-2018-5408", + "CVE-2018-5409", + "CVE-2019-9505" + ], + "Overview": "PrinterLogic Print Management Software fails to validate SSL and software update certificates, which could allow an attacker to reconfigure the software and remotely execute code. In addition, the PrinterLogic agent does not sanitize browser input allowing a remote attacker to modify configuration settings. These vulnerabilities may result in a remote attacker executing code on workstations running the PrinterLogic agent.", + "References": [ + "https://www.printerlogic.com/security-bulletin/", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5408", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5409", + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9505", + "https://cwe.mitre.org/data/definitions/295.html", + "https://cwe.mitre.org/data/definitions/494.html", + "https://cwe.mitre.org/data/definitions/159.html" + ], + "Resolution": "Update PrinterLogic Print Management Software when patches become available.", + "Revision": 54, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to the Adversarial Simulation Team at Sygnia (Sygnia Consulting), led by David Warshavski and Doron Vazgiel, for reporting these vulnerabilities and participating in the coordinated vulnerability disclosure process.", + "Title": "PrinterLogic Print Management Software fails to validate SSL certificates or the integrity of software updates.", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 3, + "Workarounds": "Consider using 'always on' VPN to prevent some of the MITM scenarios and enforce application whitelisting on the endpoint to prevent the PrinterLogic agent from executing malicious code." +} \ No newline at end of file diff --git a/data/49/vu_306749/vu_306749.json b/data/49/vu_306749/vu_306749.json new file mode 100644 index 0000000000..2224cbd066 --- /dev/null +++ b/data/49/vu_306749/vu_306749.json @@ -0,0 +1,63 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-01-02T13:39:26-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-01-02T13:42:00-05:00", + "DatePublic": "", + "Description": "191547\t2018-10-26 Give Plugin for WordPress /wp-admin/admin-ajax.php give_donation_import Action fields Parameter Insecure Deserialization Object Injection Remote Code Execution Give Plugin for WordPress contains a flaw in the /wp-admin/admin-ajax.php script, when the action is set to 'give_donation_import' that is triggered as user-supplied input passed via the 'fields' parameter is insecurely used in an unserialize call. This may allow an authenticated remote attacker to inject arbitrary objects and potentially execute arbitrary code.", + "ID": "VU#306749", + "IDNumber": "306749", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": [ + "Give Plugin", + "WordPress", + "RCE", + "VU#361155" + ], + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 1, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Give Plugin for WordPress vulnerable to RCE", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/49/vu_598349/vu_598349.json b/data/49/vu_598349/vu_598349.json index 045a61261e..2f1d5de63e 100644 --- a/data/49/vu_598349/vu_598349.json +++ b/data/49/vu_598349/vu_598349.json @@ -42,7 +42,7 @@ "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", "DateCreated": "2018-05-03T15:46:50-04:00", "DateFirstPublished": "2018-09-05T07:48:24-04:00", - "DateLastUpdated": "2018-10-23T13:34:00-04:00", + "DateLastUpdated": "2018-11-12T10:57:00-05:00", "DatePublic": "2018-09-05T00:00:00", "Description": "The Web Proxy Automatic Discovery (WPAD) protocol is used to automatically provide proxy configuration information to devices on a network. Clients issue a special DHCP request to obtain the information for the proxy configuration, but will fall back on a DNS request to one of several standardized URLs making use of the subdomain name of \u201cwpad\u201d if a DHCP response is unavailable. An attacker with local area network (LAN) access may be able to add a device with the name \u201cwpad\u201d to the network, which may produce a collision with a standardized WPAD DNS name. Many customer premise home/office routers (including, but not limited to, Google Wifi and Ubiquiti UniFi) automatically register device names as DNS A records on the LAN, which may allow an attacker to utilize a specially named and configured device to act as a WPAD proxy configuration server. The attacker-served proxy configuration can result in the loss of confidentiality and integrity of any network activity by any device that utilizes WPAD. Other autodiscovery names such as ISATAP may also be exploitable.", "ID": "VU#598349", @@ -62,7 +62,7 @@ "https://www.exploit-db.com/exploits/43367/" ], "Resolution": "", - "Revision": 57, + "Revision": 58, "SystemsAffectedPreamble": "", "ThanksAndCredit": "This attack was found, tested and reported by Ossi Salmi, Mika Sepp\u00e4nen, Marko Laakso and Kasper Kyll\u00f6nen of Arctic Security. We asked help of Jussi Eronen and Iikka Sovanto of NCSC-FI in reaching out the vendor representatives.", "Title": "Automatic DNS registration and proxy autodiscovery allow spoofing of network services", diff --git a/data/5/vu_711505/vu_711505.json b/data/5/vu_711505/vu_711505.json new file mode 100644 index 0000000000..2d1684a9e4 --- /dev/null +++ b/data/5/vu_711505/vu_711505.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-11-08T09:10:15-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2018-11-15T15:59:00-05:00", + "DatePublic": "", + "Description": "", + "ID": "VU#711505", + "IDNumber": "711505", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 2, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Cradlepoint vulnerabilities", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/5/vu_809405/vu_809405.json b/data/5/vu_809405/vu_809405.json new file mode 100644 index 0000000000..a93ca44392 --- /dev/null +++ b/data/5/vu_809405/vu_809405.json @@ -0,0 +1,62 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-04-29T09:56:29-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-03T16:01:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#809405", + "IDNumber": "809405", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "VRF#19-04-GCDFZ]", + "Overview": "", + "References": [ + "https://cryptocoingrowth.com/icos/digiters-network/", + "https://www.linkedin.com/in/mv-express-coin-mec-8b453b95?trk=pub-pbmap", + "https://bitcointalk.org/index.php?topic=5131745.0" + ], + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 3, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "BitCoin: Digiters Network", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/5/vu_822605/vendor_naln-b8jgah.json b/data/5/vu_822605/vendor_naln-b8jgah.json new file mode 100644 index 0000000000..d1e2135608 --- /dev/null +++ b/data/5/vu_822605/vendor_naln-b8jgah.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-01-18T07:11:00-05:00", + "DateNotified": "2018-11-29T15:20:12-05:00", + "DateResponded": "", + "ID": "VU#822605", + "Revision": 1, + "Status": "Affected", + "Vendor": "IDenticard Systems", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "NALN-B8JGAH", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/5/vu_822605/vu_822605.json b/data/5/vu_822605/vu_822605.json new file mode 100644 index 0000000000..a37910e06c --- /dev/null +++ b/data/5/vu_822605/vu_822605.json @@ -0,0 +1,74 @@ +{ + "Author": "This document was written by Trent Novelly and Madison Oliver.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": [ + "CVE-2019-3906", + "CVE-2019-3907", + "CVE-2019-3908", + "CVE-2019-3909" + ], + "CVSS_AccessComplexity": "M", + "CVSS_AccessVector": "N", + "CVSS_Authenication": "S", + "CVSS_AvailabilityImpact": "C", + "CVSS_BaseScore": 8.5, + "CVSS_BaseVector": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 8.08048416, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "H", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "W", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 8.1, + "CVSS_TemporalVector": "E:H/RL:W/RC:C", + "DateCreated": "2018-11-20T09:34:54-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-03-18T08:19:00-04:00", + "DatePublic": "2019-01-14T00:00:00", + "Description": "CVE-2019-3906: Hardcoded Credentials (Admin Access to Service) \nPremiSys contains hard-coded credentials (CWE-798) that provide administrator access to the entire service via the PremiSys Windows Communication Foundation (WCF) Service endpoint. These credentials can be used by an attacker to access and modify the badge system database. **The CVSS score listed at the end of this publication is in regards to CVE-2019-3906. CVE-2019-3907: Weak Hashing/Encryption\nA known-weak encryption method (Base64 encoded MD5 hashes - salt + password) is used to store user credentials and other sensitive information. CVE-2019-3908: Hardcoded Password\nThe PremiSys backup files can be unzipped using a hardcoded password. CVE-2019-3909: Default Database Credentials (Full Access to Service Databases)\nA default database username and password are used to install the IDenticard service. Users cannot change this password without sending custom passwords to the vendor directly in order to receive an encrypted variant to use in their configurations.", + "ID": "VU#822605", + "IDNumber": "822605", + "IPProtocol": "", + "Impact": "A remote attacker could gain access to the badge system database, thus obtaining sensitive information and the ability to create and modify badges allowing physical access to secure areas.", + "Keywords": [ + "IDenticard", + "PremiSys", + "access control", + "hard-coded credentials" + ], + "Overview": "IDenticard\u2019s PremiSys access control systems, versions 3.1.190 and prior, employ a weak encryption method and contain hard-coded credentials which can be used by attackers to access and manipulate sensitive information enabling physical access to secure areas.", + "References": [ + "https://www.tenable.com/blog/multiple-zero-days-in-premisys-identicard-access-control-system", + "https://www.identicard.com/blog/2019/01/18/identicard-responds-to-tenables-premisys-findings/ ", + "https://www.nextgov.com/cybersecurity/2019/01/researchers-flaws-vendor-security-software-could-leave-some-federal-buildings-vulnerable/154231/", + "https://cwe.mitre.org/data/definitions/798.html", + "https://www.identicard.com/access-control/premisys-access-control-system/" + ], + "Resolution": "The vendor intends to release a patch, and until then, we suggest that you use these workarounds:", + "Revision": 77, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to Jimi Sebree of Tenable for reporting this vulnerability.", + "Title": "IDenticard PremiSys access control systems contain vulnerabilities that enable physical access to secure facilities", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "Limit Access Implement network segmentation to isolate the PremiSys system\nEnsure the access control system is not connected to the internet\nMonitor and report suspicious activity in or near facility entry and exit points and in the immediate vicinity\nSystem administrators can contact their authorized IDenticard Technical Support for assistance with replacing the default username and password" +} \ No newline at end of file diff --git a/data/50/vu_990550/vu_990550.json b/data/50/vu_990550/vu_990550.json index 9190548f5b..b74dddd86a 100644 --- a/data/50/vu_990550/vu_990550.json +++ b/data/50/vu_990550/vu_990550.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2003-11-20T12:37:13-05:00", "DateFirstPublished": "", "DateLastUpdated": "2003-12-23T14:14:00-05:00", diff --git a/data/51/vu_699251/vu_699251.json b/data/51/vu_699251/vu_699251.json new file mode 100644 index 0000000000..57227715c4 --- /dev/null +++ b/data/51/vu_699251/vu_699251.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2019-0211", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-04-04T12:02:33-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-04-04T12:25:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#699251", + "IDNumber": "699251", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 2, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Apache Privilege Escalation", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/52/vu_787952/vu_787952.json b/data/52/vu_787952/vu_787952.json index aad1223bc1..136d1549dc 100644 --- a/data/52/vu_787952/vu_787952.json +++ b/data/52/vu_787952/vu_787952.json @@ -44,7 +44,7 @@ "CVSS_TemporalVector": "E:POC/RL:OF/RC:C", "DateCreated": "2017-05-06T01:35:36-04:00", "DateFirstPublished": "2018-08-14T19:48:53-04:00", - "DateLastUpdated": "2018-09-14T15:21:00-04:00", + "DateLastUpdated": "2018-11-07T10:44:00-05:00", "DatePublic": "2018-08-10T00:00:00", "Description": "Many Android mobile devices come with OEM-pre-installed apps. Some apps have been identified as having incorrect access control settings, allowing malicious third-party apps to exploit and bypass system permissions and settings. Additionally, some Android and iOS apps embed a hard-coded cryptographic key or use a weak cryptographic algorithm that allows an attacker to obtain elevated access. Kryptowire has released a paper documenting 38 vulnerabilities in various Android smartphone devices. These vulnerabilities are largely attributed to incorrect user permissions and access control settings via pre OEM pre-installed apps, and may be exploitable via malicious third-party apps installed by the user. Two of the vulnerabilities are exploitable via the Android debug bridge (adb). Kryptowire, in collaboration with DHS S&T and the NCCIC, previously discovered and reported the following vulnerabilities. CWE-295: Improper Certificate Validation\nThe software does not validate, or incorrectly validates, a certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host. Vulnerable app: (CVE-2017-13105) Virus Cleaner ( Hi Security ) - Antivirus, Booster, 3.7.1.1329 CWE-798: Use of Hard-coded Credentials\nThe software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. Vulnerable apps: (CVE-2017-13100) The Moron Test, 6.3.1, 2017-05-04, iOS\n(CVE-2017-13101) musical.ly - your video social network, 6.1.6, 2017-10-03, iOS\n(CVE-2017-13102) Asphalt Xtreme: Offroad Rally Racing, 1.6.0, 2017-08-13, iOS\n(CVE-2017-13104) UberEATS: Uber for Food Delivery, 1.108.10001, 2017-11-02, iOS\n(CVE-2017-13105) Virus Cleaner ( Hi Security ) - Antivirus, Booster, 3.7.1.1329, 2017-09-13, Android\n(CVE-2017-13106) CM Launcher 3D - Theme,wallpaper,Secure,Efficient, 5.0.3, 2017-09-19, Android\n(CVE-2017-13107) Live.me - live stream video chat, 3.7.20, 2017-11-06, Android\n(CVE-2017-13108) DFNDR Security: Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER (CVE-2017-13103) This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. The CVSS score below reflects a worst-case scenario of code execution as a system user, however many devices and vulnerabilities have significantly lower impacts and therefore lower CVSS scores.", "ID": "VU#787952", @@ -65,7 +65,7 @@ "https://www.dhs.gov/science-and-technology/news/2017/12/18/news-release-st-pilot-project-helps-secure-first-responder" ], "Resolution": "Apply an update If available, update your device's system version of Android and apply any available Google Play / Apple Store updates to installed apps.", - "Revision": 66, + "Revision": 67, "SystemsAffectedPreamble": "", "ThanksAndCredit": "Thanks to Brian Schulte at Kryptowire for reporting this vulnerability.", "Title": "Android and iOS apps contain multiple vulnerabilities", diff --git a/data/55/vu_361155/vu_361155.json b/data/55/vu_361155/vu_361155.json index e4a35b3a37..9a0e8e1b6c 100644 --- a/data/55/vu_361155/vu_361155.json +++ b/data/55/vu_361155/vu_361155.json @@ -34,9 +34,9 @@ "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", "DateCreated": "2018-10-31T12:59:54-04:00", "DateFirstPublished": "", - "DateLastUpdated": "2018-10-31T14:05:00-04:00", + "DateLastUpdated": "2019-01-07T13:56:00-05:00", "DatePublic": "", - "Description": "", + "Description": "189965\t2018-10-04 VendorFuel Plugin for WordPress /local/style.css File Upload Remote Code Execution VendorFuel Plugin for WordPress contains a flaw in /local/style.css that is triggered as file types and extensions for uploaded files are not properly validated before being placed in a user-accessible path. This may allow a remote attacker to upload e.g. a file and then request it in order to execute arbitrary code with the privileges of the web service. Report: https://www.pluginvulnerabilities.com/2018/10/04/our-proactive-monitoring-caught-a-restricted-file-upload-vulnerability-in-vendorfuel/ https://vendrofuel.com\nBy Hoffman Technologies, Inc dba VendorFuel \ninfo@vendorfuel.com\n855-998-3835", "ID": "VU#361155", "IDNumber": "361155", "IPProtocol": "", @@ -44,14 +44,16 @@ "Keywords": "", "Overview": "", "References": [ + "https://www.pluginvulnerabilities.com/2018/10/26/full-disclosure-of-php-object-injection-vulnerability-in-patreon-wordpress/", + "https://www.pluginvulnerabilities.com/2018/10/04/our-proactive-monitoring-caught-a-restricted-file-upload-vulnerability-in-vendorfuel/", "https://www.pluginvulnerabilities.com/2018/09/25/our-new-disclosure-policy-in-response-to-the-continued-inappropriate-behavior-of-the-wordpress-support-forum-moderators/", "https://www.pluginvulnerabilities.com/2018/09/27/wordpress-team-didnt-notify-developer-of-plugin-with-700000-active-installations-about-vulnerability-they-knew-about/" ], "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", - "Revision": 4, + "Revision": 9, "SystemsAffectedPreamble": "", "ThanksAndCredit": "", - "Title": "Wordpress Plugin Vulnerabilities no CVEs", + "Title": "VendorFuel Plugin for WordPress vulnerable to RCE", "US-CERTTechnicalAlert": "", "VRDA_D1_DirectReport": "1", "VRDA_D1_Impact": "", diff --git a/data/57/vu_469957/vu_469957.json b/data/57/vu_469957/vu_469957.json new file mode 100644 index 0000000000..e6ee9b9155 --- /dev/null +++ b/data/57/vu_469957/vu_469957.json @@ -0,0 +1,62 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2019-4061", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-02-01T09:08:19-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-04-29T08:02:00-04:00", + "DatePublic": "2019-03-18T00:00:00", + "Description": "", + "ID": "VU#469957", + "IDNumber": "469957", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": [ + "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2018-0008.md", + "https://www.atredis.com/blog/2019/3/18/harvesting-data-from-bigfix-relay-servers", + "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2018-0008.md" + ], + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 16, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "IBM BigFix vulnerabilties", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/57/vu_991057/vu_991057.json b/data/57/vu_991057/vu_991057.json index 13d78ee09c..dcd6751b7f 100644 --- a/data/57/vu_991057/vu_991057.json +++ b/data/57/vu_991057/vu_991057.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2003-04-23T15:35:22-04:00", "DateFirstPublished": "", "DateLastUpdated": "2004-10-11T14:48:00-04:00", diff --git a/data/59/vu_112059/vu_112059.json b/data/59/vu_112059/vu_112059.json new file mode 100644 index 0000000000..be418d035d --- /dev/null +++ b/data/59/vu_112059/vu_112059.json @@ -0,0 +1,61 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-03-06T09:11:59-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-03-27T15:24:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#112059", + "IDNumber": "112059", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": [ + "https://github.com/mgrube/CVE-2019-9673", + "https://freenetproject.org/freenet-build-1484-released.html" + ], + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 9, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Freenet vulnerable to remote code execution", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b84pxq.json b/data/61/vu_730261/vendor_cheu-b84pxq.json new file mode 100644 index 0000000000..c545f451f6 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b84pxq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-04T13:42:43-05:00", + "DateNotified": "2019-01-04T13:37:01-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Memory", + "VendorInformation": "", + "VendorRecordID": "CHEU-B84PXQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b84pxs.json b/data/61/vu_730261/vendor_cheu-b84pxs.json new file mode 100644 index 0000000000..99926b3e4c --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b84pxs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-04T13:42:43-05:00", + "DateNotified": "2019-01-04T13:37:01-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Google", + "VendorInformation": "", + "VendorRecordID": "CHEU-B84PXS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b84pxx.json b/data/61/vu_730261/vendor_cheu-b84pxx.json new file mode 100644 index 0000000000..c6a5466b96 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b84pxx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-11T10:23:00-05:00", + "DateNotified": "2019-01-04T13:37:02-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 1, + "Status": "Affected", + "Vendor": "Valve", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B84PXX", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b84pxz.json b/data/61/vu_730261/vendor_cheu-b84pxz.json new file mode 100644 index 0000000000..362e321ef8 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b84pxz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-04T13:42:44-05:00", + "DateNotified": "2019-01-04T13:37:02-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sony Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B84PXZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b84py3.json b/data/61/vu_730261/vendor_cheu-b84py3.json new file mode 100644 index 0000000000..a7576e0a99 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b84py3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:09:00-04:00", + "DateNotified": "2019-01-04T13:37:02-05:00", + "DateResponded": "2019-01-08T18:01:09-05:00", + "ID": "VU#730261", + "Revision": 13, + "Status": "Affected", + "Vendor": "Microsoft", + "VendorInformation": "Microsoft issued multiple updates.", + "VendorRecordID": "CHEU-B84PY3", + "VendorReferences": "https://support.microsoft.com/en-us/help/4036283/surface-surface-update-history\nhttps://support.microsoft.com/en-us/help/4023487/surface-surface-3-update-history\nhttps://support.microsoft.com/en-us/help/4023488/surface-surface-book-update-history\nhttps://support.microsoft.com/en-us/help/4055398/surface-book-2-update-history\nhttps://support.microsoft.com/en-us/help/4037237/surface-surface-laptop-update-history\nhttps://support.microsoft.com/en-us/help/4023490/surface-surface-studio-update-history\nhttps://support.microsoft.com/en-us/help/4037238/surface-surface-pro-update-history\nhttps://support.microsoft.com/en-us/help/4023484/surface-surface-pro-3-update-history\nhttps://support.microsoft.com/en-us/help/4023489/surface-surface-pro-4-update-history", + "VendorStatement": "Please find below information related to Surface devices that includes Marvell AVASTAR firmware 15.68.9125.57. Devices with this information: [1] Surface 3 (Windows 10, version 1703 or greater)\n[2] Surface Book (Windows 10 Fall Creators Update, version 1709 or greater)\n[3] Surface Book 2 (Windows 10 Fall Creators Update, version 1709 or greater)\n[4] Surface Laptop (1st Gen) (Windows 10 April 2018 Update, version 1803 or greater)\n[5] Surface Studio (1st Gen) (Windows 10 Fall Creators Update (version 1709) or greater)\n[6] Surface Pro (5th Gen) ((Model 1796 & Model 1807) devices running Windows 10 Fall Creators Update, build 1709 or greater:)\n[7] Surface Pro 3 (Windows 10 Creators Update, version 1703 or greater)\n[8] Surface Pro 4 (Windows 10 Fall Creators Update, version 1709 or greater) Devices with no information about Marvell fixes (unfixed or unaffected): * Surface Go\n* Surface Go LTE\n* Surface Studio 2\n* Surface Pro\n* Surface Pro 2\n* Surface Pro 6\n* Surface Laptop 2\n* Surface 2\n* Surface RT" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl6u.json b/data/61/vu_730261/vendor_cheu-b9bl6u.json new file mode 100644 index 0000000000..e2191768e8 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl6u.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:19-05:00", + "DateNotified": "2019-02-12T10:25:03-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ACCESS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL6U", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl6w.json b/data/61/vu_730261/vendor_cheu-b9bl6w.json new file mode 100644 index 0000000000..63b56d14cd --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl6w.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:20-05:00", + "DateNotified": "2019-02-12T10:25:06-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "A10 Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL6W", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl6y.json b/data/61/vu_730261/vendor_cheu-b9bl6y.json new file mode 100644 index 0000000000..98911e758f --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl6y.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:20-05:00", + "DateNotified": "2019-02-12T10:25:06-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GNU adns", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL6Y", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl72.json b/data/61/vu_730261/vendor_cheu-b9bl72.json new file mode 100644 index 0000000000..f5aab2810c --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl72.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:20-05:00", + "DateNotified": "2019-02-12T10:25:06-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Actelis Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL72", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl74.json b/data/61/vu_730261/vendor_cheu-b9bl74.json new file mode 100644 index 0000000000..c2c1bafadf --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl74.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:20-05:00", + "DateNotified": "2019-02-12T10:25:13-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AhnLab Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL74", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl76.json b/data/61/vu_730261/vendor_cheu-b9bl76.json new file mode 100644 index 0000000000..080eb69715 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl76.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-14T16:23:00-05:00", + "DateNotified": "2019-02-12T10:25:13-05:00", + "DateResponded": "2019-02-14T05:52:58-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "AVM GmbH", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BL76", + "VendorReferences": "None", + "VendorStatement": "AVM products are not affected. We do not use any Marvell component in any of our products." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl78.json b/data/61/vu_730261/vendor_cheu-b9bl78.json new file mode 100644 index 0000000000..a260c932e6 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl78.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:21-05:00", + "DateNotified": "2019-02-12T10:25:13-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Atheros Communications Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL78", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7a.json b/data/61/vu_730261/vendor_cheu-b9bl7a.json new file mode 100644 index 0000000000..97652ec70a --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7a.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:21-05:00", + "DateNotified": "2019-02-12T10:25:14-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Appgate Network Security", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7A", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7c.json b/data/61/vu_730261/vendor_cheu-b9bl7c.json new file mode 100644 index 0000000000..e41fe1b6a7 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7c.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:21-05:00", + "DateNotified": "2019-02-12T10:25:14-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Actiontec", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7C", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7e.json b/data/61/vu_730261/vendor_cheu-b9bl7e.json new file mode 100644 index 0000000000..21a6900880 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7e.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:21-05:00", + "DateNotified": "2019-02-12T10:25:14-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Aerohive", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7E", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7g.json b/data/61/vu_730261/vendor_cheu-b9bl7g.json new file mode 100644 index 0000000000..6352611af5 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7g.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:22-05:00", + "DateNotified": "2019-02-12T10:25:14-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Avaya, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7G", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7j.json b/data/61/vu_730261/vendor_cheu-b9bl7j.json new file mode 100644 index 0000000000..bc8df243e3 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7j.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:22-05:00", + "DateNotified": "2019-02-12T10:25:14-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AirWatch", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7J", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7l.json b/data/61/vu_730261/vendor_cheu-b9bl7l.json new file mode 100644 index 0000000000..e5324192d1 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7l.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-25T09:35:00-05:00", + "DateNotified": "2019-02-12T10:25:14-05:00", + "DateResponded": "2019-02-21T21:51:30-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Apple", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BL7L", + "VendorReferences": "None", + "VendorStatement": "We\u00a0have\u00a0reviewed\u00a0this\u00a0report\u00a0and\u00a0determined\u00a0that\u00a0we\u00a0are\u00a0not\u00a0affected\u00a0by\u00a0this\u00a0issue." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7n.json b/data/61/vu_730261/vendor_cheu-b9bl7n.json new file mode 100644 index 0000000000..e8163c16f3 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7n.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:22-05:00", + "DateNotified": "2019-02-12T10:25:14-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BlueCat Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7N", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7r.json b/data/61/vu_730261/vendor_cheu-b9bl7r.json new file mode 100644 index 0000000000..6bb1934374 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:23-05:00", + "DateNotified": "2019-02-12T10:25:14-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "aep NETWORKS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7R", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7t.json b/data/61/vu_730261/vendor_cheu-b9bl7t.json new file mode 100644 index 0000000000..3996ad8f13 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7t.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:23-05:00", + "DateNotified": "2019-02-12T10:25:14-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Bell Canada Enterprises", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7T", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7v.json b/data/61/vu_730261/vendor_cheu-b9bl7v.json new file mode 100644 index 0000000000..a70e02d5d8 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7v.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:23-05:00", + "DateNotified": "2019-02-12T10:25:15-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AsusTek Computer Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7V", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7x.json b/data/61/vu_730261/vendor_cheu-b9bl7x.json new file mode 100644 index 0000000000..51f1761153 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7x.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:23-05:00", + "DateNotified": "2019-02-12T10:25:15-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cirpack", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7X", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl7z.json b/data/61/vu_730261/vendor_cheu-b9bl7z.json new file mode 100644 index 0000000000..05048d5eaf --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl7z.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:24-05:00", + "DateNotified": "2019-02-12T10:25:15-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Blue Coat Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL7Z", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl83.json b/data/61/vu_730261/vendor_cheu-b9bl83.json new file mode 100644 index 0000000000..c8d01d94b5 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl83.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:24-05:00", + "DateNotified": "2019-02-12T10:25:15-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ADTRAN", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL83", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl85.json b/data/61/vu_730261/vendor_cheu-b9bl85.json new file mode 100644 index 0000000000..9f19338a19 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl85.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:24-05:00", + "DateNotified": "2019-02-12T10:25:15-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ANTlabs", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL85", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl87.json b/data/61/vu_730261/vendor_cheu-b9bl87.json new file mode 100644 index 0000000000..c14211e7db --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl87.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:24-05:00", + "DateNotified": "2019-02-12T10:25:15-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BlackBerry", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL87", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl89.json b/data/61/vu_730261/vendor_cheu-b9bl89.json new file mode 100644 index 0000000000..93bced2cea --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl89.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:24-05:00", + "DateNotified": "2019-02-12T10:25:15-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Android Open Source Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL89", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8b.json b/data/61/vu_730261/vendor_cheu-b9bl8b.json new file mode 100644 index 0000000000..36a425e502 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8b.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:25-05:00", + "DateNotified": "2019-02-12T10:25:15-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CA Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL8B", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8d.json b/data/61/vu_730261/vendor_cheu-b9bl8d.json new file mode 100644 index 0000000000..4a489181f4 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8d.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-13T07:27:00-05:00", + "DateNotified": "2019-02-12T10:25:15-05:00", + "DateResponded": "2019-02-13T05:22:35-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Check Point Software Technologies", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BL8D", + "VendorReferences": "None", + "VendorStatement": "Check Point Software Technologies is not vulnerable." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8g.json b/data/61/vu_730261/vendor_cheu-b9bl8g.json new file mode 100644 index 0000000000..87db764599 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8g.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:25-05:00", + "DateNotified": "2019-02-12T10:25:17-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Alpine Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL8G", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8j.json b/data/61/vu_730261/vendor_cheu-b9bl8j.json new file mode 100644 index 0000000000..147e9be04f --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8j.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:26-05:00", + "DateNotified": "2019-02-12T10:25:17-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Belkin, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL8J", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8l.json b/data/61/vu_730261/vendor_cheu-b9bl8l.json new file mode 100644 index 0000000000..20a8c9d2cd --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8l.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:26-05:00", + "DateNotified": "2019-02-12T10:25:17-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Belden", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL8L", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8n.json b/data/61/vu_730261/vendor_cheu-b9bl8n.json new file mode 100644 index 0000000000..c224fbd442 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8n.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:26-05:00", + "DateNotified": "2019-02-12T10:25:18-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Barracuda Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL8N", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8r.json b/data/61/vu_730261/vendor_cheu-b9bl8r.json new file mode 100644 index 0000000000..072ac1e632 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:26-05:00", + "DateNotified": "2019-02-12T10:25:18-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ceragon Networks Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL8R", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8t.json b/data/61/vu_730261/vendor_cheu-b9bl8t.json new file mode 100644 index 0000000000..d74a5ec6b4 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8t.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:27-05:00", + "DateNotified": "2019-02-12T10:25:18-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AT&T", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL8T", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8v.json b/data/61/vu_730261/vendor_cheu-b9bl8v.json new file mode 100644 index 0000000000..5202085487 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8v.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:27-05:00", + "DateNotified": "2019-02-12T10:25:18-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Deutsche Telekom", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL8V", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8x.json b/data/61/vu_730261/vendor_cheu-b9bl8x.json new file mode 100644 index 0000000000..7adc020b2e --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8x.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:27-05:00", + "DateNotified": "2019-02-12T10:25:18-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Alcatel-Lucent Enterprise", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL8X", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl8z.json b/data/61/vu_730261/vendor_cheu-b9bl8z.json new file mode 100644 index 0000000000..80c1a3b8b9 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl8z.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:27-05:00", + "DateNotified": "2019-02-12T10:25:18-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cambium Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL8Z", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl93.json b/data/61/vu_730261/vendor_cheu-b9bl93.json new file mode 100644 index 0000000000..fe195dbd26 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl93.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:27-05:00", + "DateNotified": "2019-02-12T10:25:19-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Amazon", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL93", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl95.json b/data/61/vu_730261/vendor_cheu-b9bl95.json new file mode 100644 index 0000000000..3a4c7c7de4 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl95.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:28-05:00", + "DateNotified": "2019-02-12T10:25:19-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Debian GNU/Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL95", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl97.json b/data/61/vu_730261/vendor_cheu-b9bl97.json new file mode 100644 index 0000000000..0b5989ddf9 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl97.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:28-05:00", + "DateNotified": "2019-02-12T10:25:19-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "D-Link Systems, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL97", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl99.json b/data/61/vu_730261/vendor_cheu-b9bl99.json new file mode 100644 index 0000000000..1c1ffe3695 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl99.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:28-05:00", + "DateNotified": "2019-02-12T10:25:19-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Broadcom", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL99", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9b.json b/data/61/vu_730261/vendor_cheu-b9bl9b.json new file mode 100644 index 0000000000..377a3d5f9a --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9b.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:28-05:00", + "DateNotified": "2019-02-12T10:25:19-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Arista Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL9B", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9d.json b/data/61/vu_730261/vendor_cheu-b9bl9d.json new file mode 100644 index 0000000000..187936bf86 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9d.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-12T10:43:00-05:00", + "DateNotified": "2019-02-12T10:25:19-05:00", + "DateResponded": "2019-02-12T10:28:31-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Aruba Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BL9D", + "VendorReferences": "None", + "VendorStatement": "I can confirm that Aruba is NOT affected by this." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9f.json b/data/61/vu_730261/vendor_cheu-b9bl9f.json new file mode 100644 index 0000000000..655782133a --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9f.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-19T13:53:00-04:00", + "DateNotified": "2019-02-12T10:25:19-05:00", + "DateResponded": "2019-03-19T12:56:50-04:00", + "ID": "VU#730261", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "Brocade Communication Systems", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BL9F", + "VendorReferences": "None", + "VendorStatement": "No Brocade Fibre Channel technology products from Broadcom are currently known to be affected by these Marvell Avastar wireless system on chip models vulnerabilities." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9h.json b/data/61/vu_730261/vendor_cheu-b9bl9h.json new file mode 100644 index 0000000000..5cb17a6cfa --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9h.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:29-05:00", + "DateNotified": "2019-02-12T10:25:20-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cricket Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL9H", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9k.json b/data/61/vu_730261/vendor_cheu-b9bl9k.json new file mode 100644 index 0000000000..aefbe34008 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9k.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:29-05:00", + "DateNotified": "2019-02-12T10:25:20-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Aspera Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL9K", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9m.json b/data/61/vu_730261/vendor_cheu-b9bl9m.json new file mode 100644 index 0000000000..d45112d93d --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9m.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:29-05:00", + "DateNotified": "2019-02-12T10:25:20-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Contiki OS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL9M", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9p.json b/data/61/vu_730261/vendor_cheu-b9bl9p.json new file mode 100644 index 0000000000..4679cb0e30 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9p.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:30-05:00", + "DateNotified": "2019-02-12T10:25:20-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CoreOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL9P", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9r.json b/data/61/vu_730261/vendor_cheu-b9bl9r.json new file mode 100644 index 0000000000..f7c9b8b0f0 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:30-05:00", + "DateNotified": "2019-02-12T10:25:20-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Arch Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL9R", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9t.json b/data/61/vu_730261/vendor_cheu-b9bl9t.json new file mode 100644 index 0000000000..3c79d197d2 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9t.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:30-05:00", + "DateNotified": "2019-02-12T10:25:20-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ARRIS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL9T", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9v.json b/data/61/vu_730261/vendor_cheu-b9bl9v.json new file mode 100644 index 0000000000..0db07dceac --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9v.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:30-05:00", + "DateNotified": "2019-02-12T10:25:20-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Digi International", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL9V", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9x.json b/data/61/vu_730261/vendor_cheu-b9bl9x.json new file mode 100644 index 0000000000..93d66f6c2e --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9x.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:31-05:00", + "DateNotified": "2019-02-12T10:25:21-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CMX Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL9X", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bl9z.json b/data/61/vu_730261/vendor_cheu-b9bl9z.json new file mode 100644 index 0000000000..2632ad2080 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bl9z.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:31-05:00", + "DateNotified": "2019-02-12T10:25:21-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Blunk Microsystems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BL9Z", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bla3.json b/data/61/vu_730261/vendor_cheu-b9bla3.json new file mode 100644 index 0000000000..54661554da --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bla3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:31-05:00", + "DateNotified": "2019-02-12T10:25:21-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Comcast", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLA3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bla6.json b/data/61/vu_730261/vendor_cheu-b9bla6.json new file mode 100644 index 0000000000..7ef727c8a1 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bla6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:31-05:00", + "DateNotified": "2019-02-12T10:25:21-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Akamai Technologies, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLA6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bla8.json b/data/61/vu_730261/vendor_cheu-b9bla8.json new file mode 100644 index 0000000000..1953f8a1a2 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bla8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:32-05:00", + "DateNotified": "2019-02-12T10:25:24-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Force10 Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLA8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blaa.json b/data/61/vu_730261/vendor_cheu-b9blaa.json new file mode 100644 index 0000000000..0421dbcd64 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blaa.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:32-05:00", + "DateNotified": "2019-02-12T10:25:24-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "FreeBSD Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blac.json b/data/61/vu_730261/vendor_cheu-b9blac.json new file mode 100644 index 0000000000..3e5c9f255b --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blac.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:32-05:00", + "DateNotified": "2019-02-12T10:25:25-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Honeywell", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blae.json b/data/61/vu_730261/vendor_cheu-b9blae.json new file mode 100644 index 0000000000..8f356987cb --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blae.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:32-05:00", + "DateNotified": "2019-02-12T10:25:25-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Express Logic", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blag.json b/data/61/vu_730261/vendor_cheu-b9blag.json new file mode 100644 index 0000000000..ba8d3122a0 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blag.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:32-05:00", + "DateNotified": "2019-02-12T10:25:25-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "dnsmasq", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blaj.json b/data/61/vu_730261/vendor_cheu-b9blaj.json new file mode 100644 index 0000000000..d5c748213b --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blaj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:33-05:00", + "DateNotified": "2019-02-12T10:25:25-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GFI Software, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blal.json b/data/61/vu_730261/vendor_cheu-b9blal.json new file mode 100644 index 0000000000..de5d129b89 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blal.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:33-05:00", + "DateNotified": "2019-02-12T10:25:25-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GNU glibc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blan.json b/data/61/vu_730261/vendor_cheu-b9blan.json new file mode 100644 index 0000000000..4a6d4dd35d --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blan.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:33-05:00", + "DateNotified": "2019-02-12T10:25:25-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ericsson", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blaq.json b/data/61/vu_730261/vendor_cheu-b9blaq.json new file mode 100644 index 0000000000..15010e31b2 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blaq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:33-05:00", + "DateNotified": "2019-02-12T10:25:25-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "eCosCentric", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blat.json b/data/61/vu_730261/vendor_cheu-b9blat.json new file mode 100644 index 0000000000..5800f0232d --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blat.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:34-05:00", + "DateNotified": "2019-02-12T10:25:25-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Command Software Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blav.json b/data/61/vu_730261/vendor_cheu-b9blav.json new file mode 100644 index 0000000000..6ad3f510b0 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blav.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:34-05:00", + "DateNotified": "2019-02-12T10:25:25-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HP Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blax.json b/data/61/vu_730261/vendor_cheu-b9blax.json new file mode 100644 index 0000000000..dd4c577bc0 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blax.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:34-05:00", + "DateNotified": "2019-02-12T10:25:25-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLAX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blb2.json b/data/61/vu_730261/vendor_cheu-b9blb2.json new file mode 100644 index 0000000000..5f7151facf --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blb2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:35-05:00", + "DateNotified": "2019-02-12T10:25:26-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "DesktopBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLB2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blb4.json b/data/61/vu_730261/vendor_cheu-b9blb4.json new file mode 100644 index 0000000000..1380529d17 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blb4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:35-05:00", + "DateNotified": "2019-02-12T10:25:26-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cradlepoint", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLB4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blb6.json b/data/61/vu_730261/vendor_cheu-b9blb6.json new file mode 100644 index 0000000000..96848a2476 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blb6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:35-05:00", + "DateNotified": "2019-02-12T10:25:26-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Huawei Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLB6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blb8.json b/data/61/vu_730261/vendor_cheu-b9blb8.json new file mode 100644 index 0000000000..477a0eb8cc --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blb8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:35-05:00", + "DateNotified": "2019-02-12T10:25:26-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HardenedBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLB8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blba.json b/data/61/vu_730261/vendor_cheu-b9blba.json new file mode 100644 index 0000000000..680fa5f512 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blba.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:35-05:00", + "DateNotified": "2019-02-12T10:25:26-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Hitachi", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLBA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blbc.json b/data/61/vu_730261/vendor_cheu-b9blbc.json new file mode 100644 index 0000000000..d10091d58c --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blbc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-12T16:46:00-05:00", + "DateNotified": "2019-02-12T10:25:26-05:00", + "DateResponded": "2019-02-12T13:20:37-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Cisco", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLBC", + "VendorReferences": "None", + "VendorStatement": "Cisco has evaluated this vulnerability against its wireless portfolio and determined no Cisco product is affected by it. This assessment is valid for all Cisco enterprise products, Cisco SMB products and Cisco Meraki products." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blbe.json b/data/61/vu_730261/vendor_cheu-b9blbe.json new file mode 100644 index 0000000000..37905de947 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blbe.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-12T16:44:00-05:00", + "DateNotified": "2019-02-12T10:25:26-05:00", + "DateResponded": "2019-02-12T12:56:49-05:00", + "ID": "VU#730261", + "Revision": 4, + "Status": "Not Affected", + "Vendor": "Devicescape", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLBE", + "VendorReferences": "None", + "VendorStatement": "We do not have any driver level software, so this should have no impact on anything we do. Some of our customers may well be using affected Marvell chipsets, but they manage the OS and driver software themselves (we supply just the supplicant, usually in source code, for customers using our wireless supplicant solution)." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blbg.json b/data/61/vu_730261/vendor_cheu-b9blbg.json new file mode 100644 index 0000000000..e768b95636 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blbg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:36-05:00", + "DateNotified": "2019-02-12T10:25:26-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Gentoo Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLBG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blbj.json b/data/61/vu_730261/vendor_cheu-b9blbj.json new file mode 100644 index 0000000000..44c7a040cd --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blbj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:36-05:00", + "DateNotified": "2019-02-12T10:25:28-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "IBM, INC.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLBJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blbl.json b/data/61/vu_730261/vendor_cheu-b9blbl.json new file mode 100644 index 0000000000..0a78d71fb5 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blbl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:36-05:00", + "DateNotified": "2019-02-12T10:25:28-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fastly", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLBL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blbn.json b/data/61/vu_730261/vendor_cheu-b9blbn.json new file mode 100644 index 0000000000..d0a6f7014a --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blbn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:37-05:00", + "DateNotified": "2019-02-12T10:25:28-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell EMC", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLBN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blbq.json b/data/61/vu_730261/vendor_cheu-b9blbq.json new file mode 100644 index 0000000000..7277229927 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blbq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:37-05:00", + "DateNotified": "2019-02-12T10:25:28-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Geexbox", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLBQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blbs.json b/data/61/vu_730261/vendor_cheu-b9blbs.json new file mode 100644 index 0000000000..de2f90266f --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blbs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:37-05:00", + "DateNotified": "2019-02-12T10:25:28-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "JH Software", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLBS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blbu.json b/data/61/vu_730261/vendor_cheu-b9blbu.json new file mode 100644 index 0000000000..6ccb8b9f43 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blbu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:37-05:00", + "DateNotified": "2019-02-12T10:25:28-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Systems Consortium - DHCP", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLBU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blbw.json b/data/61/vu_730261/vendor_cheu-b9blbw.json new file mode 100644 index 0000000000..f859a500e2 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blbw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:37-05:00", + "DateNotified": "2019-02-12T10:25:28-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "eero", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLBW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blby.json b/data/61/vu_730261/vendor_cheu-b9blby.json new file mode 100644 index 0000000000..6b0e0f32e1 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blby.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:38-05:00", + "DateNotified": "2019-02-12T10:25:28-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HTC", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLBY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blc2.json b/data/61/vu_730261/vendor_cheu-b9blc2.json new file mode 100644 index 0000000000..d1d5e3d380 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blc2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-14T07:46:00-05:00", + "DateNotified": "2019-02-12T10:25:29-05:00", + "DateResponded": "2019-02-13T21:40:49-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Fortinet, Inc.", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLC2", + "VendorReferences": "None", + "VendorStatement": "Fortinet has determined that no Fortinet products are affected by this. The assessment including all FortiAP (including U, C, S and W2 series) and Meru AP products." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blc4.json b/data/61/vu_730261/vendor_cheu-b9blc4.json new file mode 100644 index 0000000000..c98205d08c --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blc4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:38-05:00", + "DateNotified": "2019-02-12T10:25:29-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Foundry Brocade", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLC4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blc6.json b/data/61/vu_730261/vendor_cheu-b9blc6.json new file mode 100644 index 0000000000..adc71627be --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blc6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:38-05:00", + "DateNotified": "2019-02-12T10:25:29-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "IBM Corporation (zseries)", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLC6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blc8.json b/data/61/vu_730261/vendor_cheu-b9blc8.json new file mode 100644 index 0000000000..bad6529897 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blc8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:38-05:00", + "DateNotified": "2019-02-12T10:25:30-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "F-Secure Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLC8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blca.json b/data/61/vu_730261/vendor_cheu-b9blca.json new file mode 100644 index 0000000000..1aa632196b --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blca.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:39-05:00", + "DateNotified": "2019-02-12T10:25:31-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "InfoExpress, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blcd.json b/data/61/vu_730261/vendor_cheu-b9blcd.json new file mode 100644 index 0000000000..14c51bdba1 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blcd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:39-05:00", + "DateNotified": "2019-02-12T10:25:29-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Inmarsat", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blcf.json b/data/61/vu_730261/vendor_cheu-b9blcf.json new file mode 100644 index 0000000000..f5a5928391 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blcf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:39-05:00", + "DateNotified": "2019-02-12T10:25:30-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "DragonFly BSD Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blch.json b/data/61/vu_730261/vendor_cheu-b9blch.json new file mode 100644 index 0000000000..2cfdd67a69 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blch.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:39-05:00", + "DateNotified": "2019-02-12T10:25:31-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "F5 Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blck.json b/data/61/vu_730261/vendor_cheu-b9blck.json new file mode 100644 index 0000000000..3fdafcbab2 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blck.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:40-05:00", + "DateNotified": "2019-02-12T10:25:36-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Motorola, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blcm.json b/data/61/vu_730261/vendor_cheu-b9blcm.json new file mode 100644 index 0000000000..7ac1cafa46 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blcm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:40-05:00", + "DateNotified": "2019-02-12T10:25:36-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Mitel Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blcp.json b/data/61/vu_730261/vendor_cheu-b9blcp.json new file mode 100644 index 0000000000..55f36e7a62 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blcp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:40-05:00", + "DateNotified": "2019-02-12T10:25:36-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Intel", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blcr.json b/data/61/vu_730261/vendor_cheu-b9blcr.json new file mode 100644 index 0000000000..1d73fc35e0 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blcr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:40-05:00", + "DateNotified": "2019-02-12T10:25:37-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lantronix", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blct.json b/data/61/vu_730261/vendor_cheu-b9blct.json new file mode 100644 index 0000000000..48f67f8b02 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blct.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:41-05:00", + "DateNotified": "2019-02-12T10:25:38-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nixu", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blcv.json b/data/61/vu_730261/vendor_cheu-b9blcv.json new file mode 100644 index 0000000000..d856eb010d --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blcv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:41-05:00", + "DateNotified": "2019-02-12T10:25:30-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Infoblox", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blcx.json b/data/61/vu_730261/vendor_cheu-b9blcx.json new file mode 100644 index 0000000000..2f9b6b8072 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blcx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:41-05:00", + "DateNotified": "2019-02-12T10:25:29-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Illumos", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blcz.json b/data/61/vu_730261/vendor_cheu-b9blcz.json new file mode 100644 index 0000000000..3ff92a89a3 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blcz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:41-05:00", + "DateNotified": "2019-02-12T10:25:36-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "m0n0wall", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLCZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bld3.json b/data/61/vu_730261/vendor_cheu-b9bld3.json new file mode 100644 index 0000000000..137c1df9e0 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bld3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:41-05:00", + "DateNotified": "2019-02-12T10:25:30-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ENEA", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLD3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bld5.json b/data/61/vu_730261/vendor_cheu-b9bld5.json new file mode 100644 index 0000000000..03f7df3bb0 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bld5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:42-05:00", + "DateNotified": "2019-02-12T10:25:38-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lynx Software Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLD5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bld7.json b/data/61/vu_730261/vendor_cheu-b9bld7.json new file mode 100644 index 0000000000..6b997ce90e --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bld7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:42-05:00", + "DateNotified": "2019-02-12T10:25:44-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OmniTI", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLD7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bld9.json b/data/61/vu_730261/vendor_cheu-b9bld9.json new file mode 100644 index 0000000000..480384bee7 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bld9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:42-05:00", + "DateNotified": "2019-02-12T10:25:41-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Medtronic", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLD9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bldb.json b/data/61/vu_730261/vendor_cheu-b9bldb.json new file mode 100644 index 0000000000..b528a1d381 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bldb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:42-05:00", + "DateNotified": "2019-02-12T10:25:36-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Netgear, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLDB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blde.json b/data/61/vu_730261/vendor_cheu-b9blde.json new file mode 100644 index 0000000000..8db432377e --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blde.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:43-05:00", + "DateNotified": "2019-02-12T10:25:37-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Linksys", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLDE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bldg.json b/data/61/vu_730261/vendor_cheu-b9bldg.json new file mode 100644 index 0000000000..59fa7ad2ce --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bldg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:43-05:00", + "DateNotified": "2019-02-12T10:25:36-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lancope", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLDG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bldj.json b/data/61/vu_730261/vendor_cheu-b9bldj.json new file mode 100644 index 0000000000..151d4a903a --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bldj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:43-05:00", + "DateNotified": "2019-02-12T10:25:38-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MikroTik", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLDJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bldl.json b/data/61/vu_730261/vendor_cheu-b9bldl.json new file mode 100644 index 0000000000..11244e42ec --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bldl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:43-05:00", + "DateNotified": "2019-02-12T10:25:49-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sonos", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLDL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bldn.json b/data/61/vu_730261/vendor_cheu-b9bldn.json new file mode 100644 index 0000000000..fe1e116bc5 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bldn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:44-05:00", + "DateNotified": "2019-02-12T10:25:52-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SMC Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLDN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bldq.json b/data/61/vu_730261/vendor_cheu-b9bldq.json new file mode 100644 index 0000000000..91d7d51876 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bldq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-14T07:42:00-05:00", + "DateNotified": "2019-02-12T10:25:49-05:00", + "DateResponded": "2019-02-13T14:39:44-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Palo Alto Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLDQ", + "VendorReferences": "None", + "VendorStatement": "Palo Alto Networks is not affected." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blds.json b/data/61/vu_730261/vendor_cheu-b9blds.json new file mode 100644 index 0000000000..9d75535b99 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blds.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:44-05:00", + "DateNotified": "2019-02-12T10:25:49-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Oryx Embedded", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLDS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bldu.json b/data/61/vu_730261/vendor_cheu-b9bldu.json new file mode 100644 index 0000000000..53a6f42473 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bldu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:44-05:00", + "DateNotified": "2019-02-12T10:25:44-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Riverbed Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLDU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bldw.json b/data/61/vu_730261/vendor_cheu-b9bldw.json new file mode 100644 index 0000000000..9046634039 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bldw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:44-05:00", + "DateNotified": "2019-02-12T10:25:50-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "PowerDNS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLDW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bldy.json b/data/61/vu_730261/vendor_cheu-b9bldy.json new file mode 100644 index 0000000000..ea54d0923a --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bldy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-13T07:25:00-05:00", + "DateNotified": "2019-02-12T10:25:54-05:00", + "DateResponded": "2019-02-12T20:59:57-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Zyxel", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLDY", + "VendorReferences": "None", + "VendorStatement": "Zyxel is not affected since we do not use the Marvell Avastar WiFi chips." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9ble2.json b/data/61/vu_730261/vendor_cheu-b9ble2.json new file mode 100644 index 0000000000..953b704355 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9ble2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:45-05:00", + "DateNotified": "2019-02-12T10:25:51-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Turbolinux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLE2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9ble4.json b/data/61/vu_730261/vendor_cheu-b9ble4.json new file mode 100644 index 0000000000..fa7a80f154 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9ble4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:45-05:00", + "DateNotified": "2019-02-12T10:25:51-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sourcefire", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLE4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9ble6.json b/data/61/vu_730261/vendor_cheu-b9ble6.json new file mode 100644 index 0000000000..db99ad9ab3 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9ble6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:45-05:00", + "DateNotified": "2019-02-12T10:25:52-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SmoothWall", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLE6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9ble8.json b/data/61/vu_730261/vendor_cheu-b9ble8.json new file mode 100644 index 0000000000..85bc3813ba --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9ble8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:45-05:00", + "DateNotified": "2019-02-12T10:25:56-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Vertical Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLE8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blec.json b/data/61/vu_730261/vendor_cheu-b9blec.json new file mode 100644 index 0000000000..a8edca72c5 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blec.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:46-05:00", + "DateNotified": "2019-02-12T10:25:53-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "European Registry for Internet Domains", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLEC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blee.json b/data/61/vu_730261/vendor_cheu-b9blee.json new file mode 100644 index 0000000000..0f8b196f5d --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blee.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:46-05:00", + "DateNotified": "2019-02-12T10:25:36-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NAS4Free", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLEE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bleg.json b/data/61/vu_730261/vendor_cheu-b9bleg.json new file mode 100644 index 0000000000..58b2d49b03 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bleg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:46-05:00", + "DateNotified": "2019-02-12T10:25:37-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "netsnmp", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLEG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blek.json b/data/61/vu_730261/vendor_cheu-b9blek.json new file mode 100644 index 0000000000..b5cfc56192 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blek.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:47-05:00", + "DateNotified": "2019-02-12T10:25:42-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microsoft Vulnerability Research", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLEK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blem.json b/data/61/vu_730261/vendor_cheu-b9blem.json new file mode 100644 index 0000000000..81c3f84ebf --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blem.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:47-05:00", + "DateNotified": "2019-02-12T10:25:43-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Micro Focus", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLEM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blep.json b/data/61/vu_730261/vendor_cheu-b9blep.json new file mode 100644 index 0000000000..c2456b590b --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blep.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:47-05:00", + "DateNotified": "2019-02-12T10:25:43-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NetBurner", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLEP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bler.json b/data/61/vu_730261/vendor_cheu-b9bler.json new file mode 100644 index 0000000000..9b9a1c1dfa --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bler.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:47-05:00", + "DateNotified": "2019-02-12T10:25:44-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OleumTech", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLER", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bleu.json b/data/61/vu_730261/vendor_cheu-b9bleu.json new file mode 100644 index 0000000000..99746fb819 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bleu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:48-05:00", + "DateNotified": "2019-02-12T10:25:53-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SafeNet", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLEU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blew.json b/data/61/vu_730261/vendor_cheu-b9blew.json new file mode 100644 index 0000000000..fa0c2a01cc --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blew.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-13T09:53:00-05:00", + "DateNotified": "2019-02-12T10:25:55-05:00", + "DateResponded": "2019-02-13T09:31:26-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Ubiquiti Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLEW", + "VendorReferences": "None", + "VendorStatement": "Ubiquiti Networks products don't use Marvell Avast WiFi chips, consequently we were not affected by this vulnerability." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blez.json b/data/61/vu_730261/vendor_cheu-b9blez.json new file mode 100644 index 0000000000..22595229d2 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blez.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:48-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "PHPIDS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLEZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blf3.json b/data/61/vu_730261/vendor_cheu-b9blf3.json new file mode 100644 index 0000000000..d689f64e4a --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blf3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:49-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Unisys", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLF3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blf5.json b/data/61/vu_730261/vendor_cheu-b9blf5.json new file mode 100644 index 0000000000..ef5bc1bb1d --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blf5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:49-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Philips Electronics", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLF5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blf8.json b/data/61/vu_730261/vendor_cheu-b9blf8.json new file mode 100644 index 0000000000..792c4a9881 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blf8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:49-05:00", + "DateNotified": "2019-02-12T10:25:51-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Secure64 Software Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLF8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfa.json b/data/61/vu_730261/vendor_cheu-b9blfa.json new file mode 100644 index 0000000000..87ebffc518 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfa.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:49-05:00", + "DateNotified": "2019-02-12T10:25:51-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "WizNET Technology", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLFA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfc.json b/data/61/vu_730261/vendor_cheu-b9blfc.json new file mode 100644 index 0000000000..514da2538e --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:49-05:00", + "DateNotified": "2019-02-12T10:25:52-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell SecureWorks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLFC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfe.json b/data/61/vu_730261/vendor_cheu-b9blfe.json new file mode 100644 index 0000000000..1d5d17b17b --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfe.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:50-05:00", + "DateNotified": "2019-02-12T10:25:51-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Technicolor", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLFE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfg.json b/data/61/vu_730261/vendor_cheu-b9blfg.json new file mode 100644 index 0000000000..feb411135c --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:50-05:00", + "DateNotified": "2019-02-12T10:25:29-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Espressif Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLFG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfk.json b/data/61/vu_730261/vendor_cheu-b9blfk.json new file mode 100644 index 0000000000..c088b9832c --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:50-05:00", + "DateNotified": "2019-02-12T10:25:30-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Grandstream", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLFK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfm.json b/data/61/vu_730261/vendor_cheu-b9blfm.json new file mode 100644 index 0000000000..3d26d7db70 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:50-05:00", + "DateNotified": "2019-02-12T10:25:46-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NLnet Labs", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLFM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfp.json b/data/61/vu_730261/vendor_cheu-b9blfp.json new file mode 100644 index 0000000000..ab70929cb6 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:51-05:00", + "DateNotified": "2019-02-12T10:25:55-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ruckus Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLFP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfr.json b/data/61/vu_730261/vendor_cheu-b9blfr.json new file mode 100644 index 0000000000..f550044b21 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:51-05:00", + "DateNotified": "2019-02-12T10:25:56-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Semiconductor Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLFR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfu.json b/data/61/vu_730261/vendor_cheu-b9blfu.json new file mode 100644 index 0000000000..c4da3c5d58 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:51-05:00", + "DateNotified": "2019-02-12T10:25:30-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Interniche Technologies, inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLFU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfw.json b/data/61/vu_730261/vendor_cheu-b9blfw.json new file mode 100644 index 0000000000..32b727839d --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-12T16:49:00-05:00", + "DateNotified": "2019-02-12T10:25:31-05:00", + "DateResponded": "2019-02-12T14:51:15-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Extreme Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLFW", + "VendorReferences": "None", + "VendorStatement": "I have confirmed that EXTR products are not vulnerable to this since we do not use the Marvell Avastar WiFi chips." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blfy.json b/data/61/vu_730261/vendor_cheu-b9blfy.json new file mode 100644 index 0000000000..7b3215add6 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blfy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:52-05:00", + "DateNotified": "2019-02-12T10:25:59-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Zebra Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLFY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blg2.json b/data/61/vu_730261/vendor_cheu-b9blg2.json new file mode 100644 index 0000000000..ae6a2de478 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blg2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:52-05:00", + "DateNotified": "2019-02-12T10:26:00-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Zephyr Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLG2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blg4.json b/data/61/vu_730261/vendor_cheu-b9blg4.json new file mode 100644 index 0000000000..0d1adc1372 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blg4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:52-05:00", + "DateNotified": "2019-02-12T10:25:36-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nexenta", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLG4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blg6.json b/data/61/vu_730261/vendor_cheu-b9blg6.json new file mode 100644 index 0000000000..0905b010f8 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blg6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-18T05:49:00-04:00", + "DateNotified": "2019-02-12T10:25:37-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Muonics, Inc.", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLG6", + "VendorReferences": "None", + "VendorStatement": "Not vulnerable. Muonics, Inc. does not have any products using Marvell Avastar SoC." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blg8.json b/data/61/vu_730261/vendor_cheu-b9blg8.json new file mode 100644 index 0000000000..a962ba3c98 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blg8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:53-05:00", + "DateNotified": "2019-02-12T10:25:38-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NEC Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLG8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgb.json b/data/61/vu_730261/vendor_cheu-b9blgb.json new file mode 100644 index 0000000000..ed425cfcc8 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:53-05:00", + "DateNotified": "2019-02-12T10:25:29-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "EfficientIP SAS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgf.json b/data/61/vu_730261/vendor_cheu-b9blgf.json new file mode 100644 index 0000000000..5f0e5324a8 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:53-05:00", + "DateNotified": "2019-02-12T10:25:41-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Paessler", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgh.json b/data/61/vu_730261/vendor_cheu-b9blgh.json new file mode 100644 index 0000000000..cc720b6f47 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:54-05:00", + "DateNotified": "2019-02-12T10:25:37-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nominum", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgk.json b/data/61/vu_730261/vendor_cheu-b9blgk.json new file mode 100644 index 0000000000..dbcb9c72c1 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:54-05:00", + "DateNotified": "2019-02-12T10:25:42-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "LG Electronics", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgm.json b/data/61/vu_730261/vendor_cheu-b9blgm.json new file mode 100644 index 0000000000..6267f960d6 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:54-05:00", + "DateNotified": "2019-02-12T10:25:43-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microchip Technology", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgp.json b/data/61/vu_730261/vendor_cheu-b9blgp.json new file mode 100644 index 0000000000..621f13ab96 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:54-05:00", + "DateNotified": "2019-02-12T10:25:43-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NETSCOUT", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgr.json b/data/61/vu_730261/vendor_cheu-b9blgr.json new file mode 100644 index 0000000000..c50f1e91e5 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:54-05:00", + "DateNotified": "2019-02-12T10:25:41-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NetBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgt.json b/data/61/vu_730261/vendor_cheu-b9blgt.json new file mode 100644 index 0000000000..04cadd9a12 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:55-05:00", + "DateNotified": "2019-02-12T10:25:45-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Red Hat, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgv.json b/data/61/vu_730261/vendor_cheu-b9blgv.json new file mode 100644 index 0000000000..c40f9a01f4 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:55-05:00", + "DateNotified": "2019-02-12T10:25:41-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nokia", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgx.json b/data/61/vu_730261/vendor_cheu-b9blgx.json new file mode 100644 index 0000000000..5b4dc12faa --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:55-05:00", + "DateNotified": "2019-02-12T10:25:45-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MetaSwitch", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blgz.json b/data/61/vu_730261/vendor_cheu-b9blgz.json new file mode 100644 index 0000000000..1c93d29bb9 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blgz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:55-05:00", + "DateNotified": "2019-02-12T10:25:49-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SonicWall", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLGZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blh3.json b/data/61/vu_730261/vendor_cheu-b9blh3.json new file mode 100644 index 0000000000..47c2e14168 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blh3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:56-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Tizen", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLH3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blh5.json b/data/61/vu_730261/vendor_cheu-b9blh5.json new file mode 100644 index 0000000000..6c5ff3b146 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blh5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:56-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Oracle Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLH5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blh7.json b/data/61/vu_730261/vendor_cheu-b9blh7.json new file mode 100644 index 0000000000..d33ffc8f60 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blh7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:56-05:00", + "DateNotified": "2019-02-12T10:25:49-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quadros Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLH7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blha.json b/data/61/vu_730261/vendor_cheu-b9blha.json new file mode 100644 index 0000000000..cb84ab0b8c --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blha.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:56-05:00", + "DateNotified": "2019-02-12T10:25:46-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QUALCOMM Incorporated", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLHA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blhd.json b/data/61/vu_730261/vendor_cheu-b9blhd.json new file mode 100644 index 0000000000..e080f005c5 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blhd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:57-05:00", + "DateNotified": "2019-02-12T10:25:52-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Toshiba Commerce Solutions", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLHD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blhf.json b/data/61/vu_730261/vendor_cheu-b9blhf.json new file mode 100644 index 0000000000..37774d9eec --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blhf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:57-05:00", + "DateNotified": "2019-02-12T10:25:52-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "VMware", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLHF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blhh.json b/data/61/vu_730261/vendor_cheu-b9blhh.json new file mode 100644 index 0000000000..eee701910f --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blhh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:57-05:00", + "DateNotified": "2019-02-12T10:25:43-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "McAfee", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLHH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blhk.json b/data/61/vu_730261/vendor_cheu-b9blhk.json new file mode 100644 index 0000000000..e8ff6ff44b --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blhk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:57-05:00", + "DateNotified": "2019-02-12T10:25:50-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenIndiana", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLHK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blhm.json b/data/61/vu_730261/vendor_cheu-b9blhm.json new file mode 100644 index 0000000000..f1a05c59c6 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blhm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:58-05:00", + "DateNotified": "2019-02-12T10:25:54-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sophos, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLHM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blhp.json b/data/61/vu_730261/vendor_cheu-b9blhp.json new file mode 100644 index 0000000000..48ff123054 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blhp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:58-05:00", + "DateNotified": "2019-02-12T10:25:55-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SUSE Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLHP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blhr.json b/data/61/vu_730261/vendor_cheu-b9blhr.json new file mode 100644 index 0000000000..317ebeb2f8 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blhr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:58-05:00", + "DateNotified": "2019-02-12T10:25:52-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Symantec", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLHR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blht.json b/data/61/vu_730261/vendor_cheu-b9blht.json new file mode 100644 index 0000000000..d2ddcc2881 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blht.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:58-05:00", + "DateNotified": "2019-02-12T10:25:57-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ubuntu", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLHT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blhw.json b/data/61/vu_730261/vendor_cheu-b9blhw.json new file mode 100644 index 0000000000..f3e055eaaa --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blhw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-12T16:50:00-05:00", + "DateNotified": "2019-02-12T10:25:55-05:00", + "DateResponded": "2019-02-12T16:02:14-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Sierra Wireless", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLHW", + "VendorReferences": "None", + "VendorStatement": "We do not use the Avastar chipset so according to Marvell's disclosure we are not affected by this issue." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blhy.json b/data/61/vu_730261/vendor_cheu-b9blhy.json new file mode 100644 index 0000000000..7ac578eecc --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blhy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:59-05:00", + "DateNotified": "2019-02-12T10:26:00-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Xiaomi", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLHY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blj3.json b/data/61/vu_730261/vendor_cheu-b9blj3.json new file mode 100644 index 0000000000..b67fef6699 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blj3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:59-05:00", + "DateNotified": "2019-02-12T10:25:56-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Mobile", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJ3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blj5.json b/data/61/vu_730261/vendor_cheu-b9blj5.json new file mode 100644 index 0000000000..9c4554752f --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blj5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:29:59-05:00", + "DateNotified": "2019-02-12T10:26:00-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Wind River", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJ5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blj7.json b/data/61/vu_730261/vendor_cheu-b9blj7.json new file mode 100644 index 0000000000..1453bddb6c --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blj7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-14T07:44:00-05:00", + "DateNotified": "2019-02-12T10:25:52-05:00", + "DateResponded": "2019-02-13T21:21:27-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Synology", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLJ7", + "VendorReferences": "None", + "VendorStatement": "We do not employ Marvell Avastar SoCs for our products. By convention, we will publish a security advisory after public disclosure." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blj9.json b/data/61/vu_730261/vendor_cheu-b9blj9.json new file mode 100644 index 0000000000..4845a2358b --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blj9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:00-05:00", + "DateNotified": "2019-02-12T10:25:42-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Miredo", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJ9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bljb.json b/data/61/vu_730261/vendor_cheu-b9bljb.json new file mode 100644 index 0000000000..78d6333fa5 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bljb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:00-05:00", + "DateNotified": "2019-02-12T10:26:02-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Xilinx", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bljd.json b/data/61/vu_730261/vendor_cheu-b9bljd.json new file mode 100644 index 0000000000..8b049a6385 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bljd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:00-05:00", + "DateNotified": "2019-02-12T10:25:29-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lenovo", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bljf.json b/data/61/vu_730261/vendor_cheu-b9bljf.json new file mode 100644 index 0000000000..5883a1071d --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bljf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:00-05:00", + "DateNotified": "2019-02-12T10:25:30-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Joyent", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bljh.json b/data/61/vu_730261/vendor_cheu-b9bljh.json new file mode 100644 index 0000000000..90ecc31e80 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bljh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:01-05:00", + "DateNotified": "2019-02-12T10:25:30-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Hewlett Packard Enterprise", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bljk.json b/data/61/vu_730261/vendor_cheu-b9bljk.json new file mode 100644 index 0000000000..7e9f20addb --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bljk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:01-05:00", + "DateNotified": "2019-02-12T10:25:29-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fedora Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bljm.json b/data/61/vu_730261/vendor_cheu-b9bljm.json new file mode 100644 index 0000000000..bf1bad268b --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bljm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:01-05:00", + "DateNotified": "2019-02-12T10:25:36-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "LANCOM Systems GmbH", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bljq.json b/data/61/vu_730261/vendor_cheu-b9bljq.json new file mode 100644 index 0000000000..d32e274132 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bljq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:01-05:00", + "DateNotified": "2019-02-12T10:25:37-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MediaTek", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bljs.json b/data/61/vu_730261/vendor_cheu-b9bljs.json new file mode 100644 index 0000000000..34360f744f --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bljs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:02-05:00", + "DateNotified": "2019-02-12T10:25:37-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "INTEROP", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blju.json b/data/61/vu_730261/vendor_cheu-b9blju.json new file mode 100644 index 0000000000..fcf3ac5a6a --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blju.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:02-05:00", + "DateNotified": "2019-02-12T10:25:36-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Systems Consortium", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bljw.json b/data/61/vu_730261/vendor_cheu-b9bljw.json new file mode 100644 index 0000000000..d2f8104609 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bljw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-02-18T09:24:00-05:00", + "DateNotified": "2019-02-12T10:25:37-05:00", + "DateResponded": "2019-02-14T11:09:07-05:00", + "ID": "VU#730261", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Juniper Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B9BLJW", + "VendorReferences": "None", + "VendorStatement": "We've evaluated our wireless products and we are not affected by this report." +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bljy.json b/data/61/vu_730261/vendor_cheu-b9bljy.json new file mode 100644 index 0000000000..879445a3dc --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bljy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:03-05:00", + "DateNotified": "2019-02-12T10:25:41-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NIKSUN", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLJY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blk2.json b/data/61/vu_730261/vendor_cheu-b9blk2.json new file mode 100644 index 0000000000..9ea6363486 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blk2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:03-05:00", + "DateNotified": "2019-02-12T10:25:41-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QLogic", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLK2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blk4.json b/data/61/vu_730261/vendor_cheu-b9blk4.json new file mode 100644 index 0000000000..8e542e68e0 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blk4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:03-05:00", + "DateNotified": "2019-02-12T10:25:37-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CZ.NIC", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLK4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blk6.json b/data/61/vu_730261/vendor_cheu-b9blk6.json new file mode 100644 index 0000000000..ab0381b828 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blk6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:03-05:00", + "DateNotified": "2019-02-12T10:25:42-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Men & Mice", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLK6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blk8.json b/data/61/vu_730261/vendor_cheu-b9blk8.json new file mode 100644 index 0000000000..78f64b3ac0 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blk8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:03-05:00", + "DateNotified": "2019-02-12T10:25:42-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenConnect", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLK8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blka.json b/data/61/vu_730261/vendor_cheu-b9blka.json new file mode 100644 index 0000000000..556283f212 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blka.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:04-05:00", + "DateNotified": "2019-02-12T10:25:42-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "netsnmpj", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blkc.json b/data/61/vu_730261/vendor_cheu-b9blkc.json new file mode 100644 index 0000000000..d39bdf414f --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blkc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:04-05:00", + "DateNotified": "2019-02-12T10:25:42-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Rocket RTOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blke.json b/data/61/vu_730261/vendor_cheu-b9blke.json new file mode 100644 index 0000000000..d7c71c9cd3 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blke.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:04-05:00", + "DateNotified": "2019-02-12T10:25:43-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quagga", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blkg.json b/data/61/vu_730261/vendor_cheu-b9blkg.json new file mode 100644 index 0000000000..e9d55c05c9 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blkg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:04-05:00", + "DateNotified": "2019-02-12T10:25:43-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenDNS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blkj.json b/data/61/vu_730261/vendor_cheu-b9blkj.json new file mode 100644 index 0000000000..e8f5706e89 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blkj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:05-05:00", + "DateNotified": "2019-02-12T10:25:43-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Pulse Secure", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blkl.json b/data/61/vu_730261/vendor_cheu-b9blkl.json new file mode 100644 index 0000000000..41b7c48159 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blkl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:05-05:00", + "DateNotified": "2019-02-12T10:25:43-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Roku", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blkn.json b/data/61/vu_730261/vendor_cheu-b9blkn.json new file mode 100644 index 0000000000..9b68b3daf6 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blkn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:05-05:00", + "DateNotified": "2019-02-12T10:25:44-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Openwall GNU/*/Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blkq.json b/data/61/vu_730261/vendor_cheu-b9blkq.json new file mode 100644 index 0000000000..add09fecb7 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blkq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:05-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Slackware Linux Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blks.json b/data/61/vu_730261/vendor_cheu-b9blks.json new file mode 100644 index 0000000000..4b3869a3ce --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blks.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:06-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Peplink", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blku.json b/data/61/vu_730261/vendor_cheu-b9blku.json new file mode 100644 index 0000000000..9c8ae092a8 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blku.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:06-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "pfSense", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blkw.json b/data/61/vu_730261/vendor_cheu-b9blkw.json new file mode 100644 index 0000000000..35afdda251 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blkw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:06-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quantenna Communications", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blky.json b/data/61/vu_730261/vendor_cheu-b9blky.json new file mode 100644 index 0000000000..41f743343a --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blky.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:06-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TippingPoint Technologies Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLKY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bll2.json b/data/61/vu_730261/vendor_cheu-b9bll2.json new file mode 100644 index 0000000000..1fe3244f37 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bll2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:06-05:00", + "DateNotified": "2019-02-12T10:25:48-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Proxim, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLL2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bll4.json b/data/61/vu_730261/vendor_cheu-b9bll4.json new file mode 100644 index 0000000000..38b8692610 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bll4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:07-05:00", + "DateNotified": "2019-02-12T10:25:49-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TCPWave", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLL4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bll6.json b/data/61/vu_730261/vendor_cheu-b9bll6.json new file mode 100644 index 0000000000..0758da7c2a --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bll6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:07-05:00", + "DateNotified": "2019-02-12T10:25:49-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Snort", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLL6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bll8.json b/data/61/vu_730261/vendor_cheu-b9bll8.json new file mode 100644 index 0000000000..30729451f3 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bll8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:07-05:00", + "DateNotified": "2019-02-12T10:25:50-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLL8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blla.json b/data/61/vu_730261/vendor_cheu-b9blla.json new file mode 100644 index 0000000000..715457e775 --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blla.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:07-05:00", + "DateNotified": "2019-02-12T10:25:50-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QNX Software Systems Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLLA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9bllc.json b/data/61/vu_730261/vendor_cheu-b9bllc.json new file mode 100644 index 0000000000..d10694bace --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9bllc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:08-05:00", + "DateNotified": "2019-02-12T10:25:52-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TrueOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLLC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_cheu-b9blle.json b/data/61/vu_730261/vendor_cheu-b9blle.json new file mode 100644 index 0000000000..cd7d0755cb --- /dev/null +++ b/data/61/vu_730261/vendor_cheu-b9blle.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-12T10:30:08-05:00", + "DateNotified": "2019-02-12T10:25:52-05:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TP-LINK", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9BLLE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/61/vu_730261/vendor_naln-b84sxu.json b/data/61/vu_730261/vendor_naln-b84sxu.json new file mode 100644 index 0000000000..ddcfcb50ed --- /dev/null +++ b/data/61/vu_730261/vendor_naln-b84sxu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-18T08:13:00-04:00", + "DateNotified": "2019-01-04T00:00:00", + "DateResponded": "", + "ID": "VU#730261", + "Revision": 10, + "Status": "Affected", + "Vendor": "Marvell Semiconductor", + "VendorInformation": "Marvell issued a statement and encourages customers to contact their Marvell representative for additional support.", + "VendorRecordID": "NALN-B84SXU", + "VendorReferences": "https://www.marvell.com/documents/pub6kqag6uk6ubau75ep/", + "VendorStatement": "Marvell was made aware of a potential vulnerability (CVE-2019-6496), which was presented at the ZeroNights conference on November 21-22, 2018, with regard to our 88W8897 device. As Marvell places the highest priority on addressing security concerns, we immediately acted to understand the issue and implemented a fix. In the presentation, detail was provided to manipulate the open-source Valve Steamlink platform to exploit a memory buffer overflow issue in the device firmware. Unlike this nonsecure\nValve Steamlink platform, the other systems mentioned in the presentation are all closed systems with high-level security protections in place such as DRM. As noted in the presenter\u2019s blog, this would eliminate the ability for an individual to compromise the system\nsecurity: \u201cYou may notice, that the majority of devices which use Marvell Wi-Fi are gaming devices, like PS 4 (maybe because of high-performance 802.11ac and Bluetooth COMBO). It\u2019s difficult to research them because of the DRM protection.\u201d Marvell is not aware of any real world exploitation of this vulnerability outside of a controlled environment. Marvell deployed a fix to address this issue which we have made available in our standard driver and firmware. We have communicated to our direct customers to update to Marvell\u2019s latest firmware and driver to get the most recent security enhancements, including support for WPA3. Marvell encourages customers to contact their Marvell representative for additional support." +} \ No newline at end of file diff --git a/data/61/vu_730261/vu_730261.json b/data/61/vu_730261/vu_730261.json new file mode 100644 index 0000000000..4fc6f46e1c --- /dev/null +++ b/data/61/vu_730261/vu_730261.json @@ -0,0 +1,71 @@ +{ + "Author": "This document was written by Will Dormann and David Warren.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2019-6496", + "CVSS_AccessComplexity": "L", + "CVSS_AccessVector": "A", + "CVSS_Authenication": "N", + "CVSS_AvailabilityImpact": "C", + "CVSS_BaseScore": 8.3, + "CVSS_BaseVector": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 4.61992175261568, + "CVSS_EnvironmentalVector": "CDP:ND/TD:M/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "U", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "OF", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "M", + "CVSS_TemporalScore": 6.1, + "CVSS_TemporalVector": "E:U/RL:OF/RC:C", + "DateCreated": "2018-09-10T10:11:48-04:00", + "DateFirstPublished": "2019-02-05T12:45:37-05:00", + "DateLastUpdated": "2019-05-14T08:22:00-04:00", + "DatePublic": "2018-11-21T00:00:00", + "Description": "A presentation at the ZeroNights 2018 conference describes multiple security issues with Marvell Avastar SoCs (models 88W8787, 88W8797, 88W8801, 88W8897, and 88W8997). The presentation provides some detail about a block pool memory overflow. During Wi-Fi network scans, an overflow condition can be triggered, overwriting certain block pool data structures. Because many devices conduct automatic background network scans, this vulnerability could be exploited regardless of whether the target is connected to a Wi-Fi network and without user interaction.", + "ID": "VU#730261", + "IDNumber": "730261", + "IPProtocol": "", + "Impact": "An unauthenticated attacker within Wi-Fi radio range may be able to use a specially-crafted series of Wi-Fi frames execute arbitrary code on a system with a vulnerable Marvell SoC. Depending on implementation, the compromised SoC may then be used to intercept network traffic or achieve code execution on the host system.", + "Keywords": [ + "marvell", + "avastar", + "Wi-Fi", + "wireless" + ], + "Overview": "Some Marvell Avastar wireless system on chip (SoC) models have multiple vulnerabilities, including a block pool overflow during Wi-Fi network scan.", + "References": [ + "https://2018.zeronights.ru/wp-content/uploads/materials/19-Researching-Marvell-Avastar-Wi-Fi.pdf", + "https://embedi.org/blog/remotely-compromise-devices-by-using-bugs-in-marvell-avastar-wi-fi-from-zero-knowledge-to-zero-click-rce/", + "https://youtu.be/Him_Lf5ZJ38", + "https://www.scribd.com/document/398350818/WiFi-CVE-2019-6496-Marvell-s-Statement", + "https://www.marvell.com/documents/pub6kqag6uk6ubau75ep/", + "https://github.com/kaloz/mwlwifi/issues/344", + "https://twitter.com/wdormann/status/1093941091043291136" + ], + "Resolution": "Marvell issued a statement and encourages customers to contact their Marvell representative for additional support. Microsoft issued an update to multiple Surface devices. See also the\nVendor Information section below.", + "Revision": 104, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "This vulnerability was presented by Denis Selianin at the ZeroNights 2018 conference.", + "Title": "Marvell Avastar wireless SoCs have multiple vulnerabilities", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "Restrict physical access\nAn attacker needs to be within Wi-Fi radio range of the target to exploit the block pool overflow. Restricting access to the area around vulnerable devices may limit an attacker's ability to exploit this vulnerability. Disable Wi-Fi\nFor systems that have other connectivity options like wired ethernet, it may be possible and practical to disable Wi-Fi." +} \ No newline at end of file diff --git a/data/61/vu_836861/vu_836861.json b/data/61/vu_836861/vu_836861.json new file mode 100644 index 0000000000..5c8ef4ed60 --- /dev/null +++ b/data/61/vu_836861/vu_836861.json @@ -0,0 +1,61 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-04-30T09:10:14-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-07T14:40:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#836861", + "IDNumber": "836861", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "[VRF#19-04-NJVHV]", + "Overview": "", + "References": [ + "https://fprint.freedesktop.org/", + "https://gitlab.freedesktop.org/libfprint/fprintd/issues" + ], + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 4, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "freedesktop.org fprintd insecurely stores fingerprint templates", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/61/vu_990561/vu_990561.json b/data/61/vu_990561/vu_990561.json index 0f4de41102..8d3a3a2719 100644 --- a/data/61/vu_990561/vu_990561.json +++ b/data/61/vu_990561/vu_990561.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "CVE-2007-5263", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2007-10-22T14:26:26-04:00", "DateFirstPublished": "", "DateLastUpdated": "2007-10-22T14:28:00-04:00", diff --git a/data/65/vu_737465/vu_737465.json b/data/65/vu_737465/vu_737465.json new file mode 100644 index 0000000000..e4061f0201 --- /dev/null +++ b/data/65/vu_737465/vu_737465.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-02-12T08:24:13-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-03-19T08:15:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#737465", + "IDNumber": "737465", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "Privilege Escalation A malicious attacker can gain root-level code execution on the host from a privileged runC container \"runC is used as the default runtime for containers with Docker, containerd, Podman, and CRI-O.\"", + "References": "", + "Resolution": "Apply an update", + "Revision": 5, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "LXC discussion on CVE-2019-5736", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "Use correct user namespaces" +} \ No newline at end of file diff --git a/data/66/vu_991166/vu_991166.json b/data/66/vu_991166/vu_991166.json index 057634eee0..230547134a 100644 --- a/data/66/vu_991166/vu_991166.json +++ b/data/66/vu_991166/vu_991166.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "CVE-2007-5392", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2007-11-09T12:18:53-05:00", "DateFirstPublished": "", "DateLastUpdated": "2008-02-26T13:21:00-05:00", diff --git a/data/67/vu_991067/vu_991067.json b/data/67/vu_991067/vu_991067.json index 8357dfb40e..8ff94919c9 100644 --- a/data/67/vu_991067/vu_991067.json +++ b/data/67/vu_991067/vu_991067.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2002-06-04T12:52:05-04:00", "DateFirstPublished": "", "DateLastUpdated": "2002-06-06T16:08:00-04:00", diff --git a/data/68/vu_573168/vendor_wdon-b7ltvz.json b/data/68/vu_573168/vendor_wdon-b7ltvz.json new file mode 100644 index 0000000000..7d9a00fd49 --- /dev/null +++ b/data/68/vu_573168/vendor_wdon-b7ltvz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-19T17:04:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#573168", + "Revision": 1, + "Status": "Affected", + "Vendor": "Microsoft", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "WDON-B7LTVZ", + "VendorReferences": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-8653", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/68/vu_573168/vu_573168.json b/data/68/vu_573168/vu_573168.json new file mode 100644 index 0000000000..ade7c885ae --- /dev/null +++ b/data/68/vu_573168/vu_573168.json @@ -0,0 +1,61 @@ +{ + "Author": "This document was written by Will Dormann.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2018-8653", + "CVSS_AccessComplexity": "L", + "CVSS_AccessVector": "N", + "CVSS_Authenication": "N", + "CVSS_AvailabilityImpact": "P", + "CVSS_BaseScore": 7.5, + "CVSS_BaseVector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "P", + "CVSS_EnvironmentalScore": 6.18607074015787, + "CVSS_EnvironmentalVector": "CDP:ND/TD:H/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "F", + "CVSS_IntegrityImpact": "P", + "CVSS_RemediationLevel": "OF", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "H", + "CVSS_TemporalScore": 6.2, + "CVSS_TemporalVector": "E:F/RL:OF/RC:C", + "DateCreated": "2018-12-19T17:02:39-05:00", + "DateFirstPublished": "2018-12-19T17:35:27-05:00", + "DateLastUpdated": "2018-12-21T11:41:00-05:00", + "DatePublic": "2018-12-19T00:00:00", + "Description": "Microsoft Internet Explorer contains a scripting engine, which handles execution of scripting languages such as VBScript and JScript. The scripting engine JScript component contains an unspecified memory corruption vulnerability. Any application that supports embedding Internet Explorer or its scripting engine component may be used as an attack vector for this vulnerability. This vulnerability was detected in exploits in the wild.", + "ID": "VU#573168", + "IDNumber": "573168", + "IPProtocol": "", + "Impact": "By convincing a user to view a specially crafted HTML document (e.g., a web page an email attachment), PDF file, Microsoft Office document, or any other document that supports embedded Internet Explorer scripting engine content, an attacker may be able to execute arbitrary code.", + "Keywords": [ + "jscript. scripting engine", + "jscript.dll" + ], + "Overview": "Microsoft Internet Explorer contains a memory corruption vulnerability in the scripting engine JScript component, which can allow a remote attacker to execute arbitrary code on a vulnerable system.", + "References": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-8653", + "Resolution": "Apply an update This issue is addressed in the update for CVE-2018-8653. If you cannot install the update, please consider the following workaround:", + "Revision": 24, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "This vulnerability was disclosed by Microsoft, who in turn credit Clement Lecigne of Google\u2019s Threat Analysis Group.", + "Title": "Microsoft Internet Explorer scripting engine JScript memory corruption vulnerability", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "3", + "VRDA_D1_Population": "4", + "VulnerabilityCount": 1, + "Workarounds": "Restrict access to JScript.dll According to the update for CVE-2018-8653, this vulnerability can be mitigated by restricting access to the jscript.dll file. This can be accomplished by running the following command in a command prompt that has administrative privileges on 32-bit systems: takeown /f %windir%\\system32\\jscript.dll\ncacls %windir%\\system32\\jscript.dll /E /P everyone:N On 64-bit Windows platforms, the following command should be used: takeown /f %windir%\\syswow64\\jscript.dll\ncacls %windir%\\syswow64\\jscript.dll /E /P everyone:N\ntakeown /f %windir%\\system32\\jscript.dll\ncacls %windir%\\system32\\jscript.dll /E /P everyone:N According to the Microsoft advisory: By default, IE11, IE10, and IE9 uses Jscript9.dll which is not impacted by this vulnerability. This vulnerability only affects certain websites that utilizes jscript as the scripting engine. As a result, most websites should not be affected by this mitigation. Only sites that explicitly request the use of script decoding with jscript.dll may be affected. Note that Windows Scripting Host uses jscript.dll instead of jscript9.dll. As a result, deploying this mitigation can prevent the use of .JS and other similar stand-alone scripts. The above change can be reverted by running the following command with administrative privileges on a 32-bit Windows system: cacls %windir%\\system32\\jscript.dll /E /R everyone On 64-bit Windows platforms, the following commands should be used: cacls %windir%\\system32\\jscript.dll /E /R everyone\ncacls %windir%\\syswow64\\jscript.dll /E /R everyone" +} \ No newline at end of file diff --git a/data/68/vu_991168/vu_991168.json b/data/68/vu_991168/vu_991168.json index c7593be0cd..1b685be86c 100644 --- a/data/68/vu_991168/vu_991168.json +++ b/data/68/vu_991168/vu_991168.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2006-10-27T08:45:13-04:00", "DateFirstPublished": "", "DateLastUpdated": "2006-10-27T08:47:00-04:00", diff --git a/data/69/vu_956069/vu_956069.json b/data/69/vu_956069/vu_956069.json new file mode 100644 index 0000000000..f01d29904f --- /dev/null +++ b/data/69/vu_956069/vu_956069.json @@ -0,0 +1,62 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-04-18T07:07:28-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-07T09:25:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#956069", + "IDNumber": "956069", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "[VRF#19-04-YFYMW]", + "Overview": "", + "References": [ + "https://youtu.be/Grirez2xeast=0s", + "https://youtu.be/wEXJDyEOatM=0s", + "https://github.com/sungjungk/fp-scanner-hacking" + ], + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 5, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Digital Persona U.are.U 4500 USB Fingerprint Reader", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/69/vu_990469/vu_990469.json b/data/69/vu_990469/vu_990469.json index a6bf43af60..9f0724b52b 100644 --- a/data/69/vu_990469/vu_990469.json +++ b/data/69/vu_990469/vu_990469.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2005-08-01T15:12:55-04:00", "DateFirstPublished": "", "DateLastUpdated": "2005-08-01T15:37:00-04:00", diff --git a/data/7/vu_289907/vendor_molr-b84hzq.json b/data/7/vu_289907/vendor_molr-b84hzq.json new file mode 100644 index 0000000000..30dd0c632e --- /dev/null +++ b/data/7/vu_289907/vendor_molr-b84hzq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-01-04T09:21:00-05:00", + "DateNotified": "", + "DateResponded": "2018-12-11T00:00:00", + "ID": "VU#289907", + "Revision": 3, + "Status": "Affected", + "Vendor": "Microsoft", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-B84HZQ", + "VendorReferences": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8611", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/7/vu_289907/vu_289907.json b/data/7/vu_289907/vu_289907.json new file mode 100644 index 0000000000..41123d4c57 --- /dev/null +++ b/data/7/vu_289907/vu_289907.json @@ -0,0 +1,70 @@ +{ + "Author": "This document was written by Madison Oliver.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2018-8611", + "CVSS_AccessComplexity": "H", + "CVSS_AccessVector": "L", + "CVSS_Authenication": "S", + "CVSS_AvailabilityImpact": "C", + "CVSS_BaseScore": 6, + "CVSS_BaseVector": "AV:L/AC:H/Au:S/C:C/I:C/A:C", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 4.97583362304, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "F", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "OF", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 5, + "CVSS_TemporalVector": "E:F/RL:OF/RC:C", + "DateCreated": "2019-01-03T15:24:17-05:00", + "DateFirstPublished": "2019-01-04T11:11:36-05:00", + "DateLastUpdated": "2019-01-24T12:58:00-05:00", + "DatePublic": "2018-11-12T00:00:00", + "Description": "CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') - CVE-2018-8611 According to Microsoft, the Windows kernel fails \"to properly handle objects in memory\". A successful attacker could run arbitrary code in kernel mode, and then \"install programs; view, change, or delete data; or create new accounts with full user rights.\"", + "ID": "VU#289907", + "IDNumber": "289907", + "IPProtocol": "", + "Impact": "After logging into the system, an attacker could run a maliciously crafted application to exploit the race condition. They could then elevate their local privileges, create user accounts, install new programs, or change, view, or delete data. Kaspersky experts state that \"the exploit can also be used to escape the sandbox in modern Web browsers, including Chrome and Edge.\"", + "Keywords": [ + "Microsoft", + "Windows", + "kernel", + "KTM", + "race condition" + ], + "Overview": "The Microsoft Windows Kernel Transaction Manager (KTM) is vulnerable to a race condition because it fails to properly handle objects in memory, which can result in local privilege escalation.", + "References": [ + "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8611", + "https://securelist.com/zero-day-in-windows-kernel-transaction-manager-cve-2018-8611/89253/", + "https://usa.kaspersky.com/blog/cve-2018-8611-detected/16833/", + "https://www.us-cert.gov/ncas/current-activity/2018/12/11/Microsoft-Releases-December-2018-Security-Updates", + "https://cwe.mitre.org/data/definitions/362.html" + ], + "Resolution": "Apply an update This issue is addressed in the Microsoft update for CVE-2018-8611.", + "Revision": 21, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to researchers Boris Larin and Igor Soumenkov from Kaspersky Lab for reporting this vulnerability to Microsoft.", + "Title": "Microsoft Windows Kernel Transaction Manager (KTM) is vulnerable to a race condition", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/7/vu_790507/vu_790507.json b/data/7/vu_790507/vu_790507.json new file mode 100644 index 0000000000..12bf189575 --- /dev/null +++ b/data/7/vu_790507/vu_790507.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by Trent Novelly.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "M", + "CVSS_AccessVector": "L", + "CVSS_Authenication": "S", + "CVSS_AvailabilityImpact": "C", + "CVSS_BaseScore": 6.6, + "CVSS_BaseVector": "AV:L/AC:M/Au:S/C:C/I:C/A:C", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 3.853205790336, + "CVSS_EnvironmentalVector": "CDP:ND/TD:M/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "POC", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "OF", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "M", + "CVSS_TemporalScore": 5.2, + "CVSS_TemporalVector": "E:POC/RL:OF/RC:C", + "DateCreated": "2018-10-12T14:58:11-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-14T08:20:00-04:00", + "DatePublic": "", + "Description": "The process file system (/proc) in Oracle Solaris 11 and Solaris 10 provides a self/ alias that refers to the current executing process's PID subdirectory with state information about the process. Protection mechanisms for /proc in Solaris 11/10 did not properly restrict the current (self) process from modifying itself via /proc. For services strictly providing file IO this lack of restriction allows an attacker to modify the process providing the file IO and execute arbitrary code.", + "ID": "VU#790507", + "IDNumber": "790507", + "IPProtocol": "", + "Impact": "An authenticated attacker with read and write access to the /proc/self directory via a vulnerable service providing file IO, may be able to gain arbitrary code execution on a target host.", + "Keywords": "", + "Overview": "Oracle Solaris 11 and Solaris 10 are vulnerable to arbitrary code execution if an attacker has read/write access to /proc/self in the process file system.", + "References": "https://docs.oracle.com/cd/E19253-01/816-5174/proc-4/index.html", + "Resolution": "Apply an update\nOracle has released updates for Solaris 11 and Solaris 10 to address the vulnerability.", + "Revision": 13, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to the reporter who wishes to remain anonymous.", + "Title": "Oracle Solaris vulnerable to arbitrary code execution via /proc/self", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "Restrict access to /proc\nIn general any service providing file IO remotely should have its access to /proc restricted. This can be achieved by correctly chrooting the shared environment." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkj9.json b/data/71/vu_192371/vendor_cheu-b8xkj9.json new file mode 100644 index 0000000000..1ac98eddbe --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkj9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T09:56:16-05:00", + "DateNotified": "2019-01-31T09:56:06-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "3com Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKJ9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkjb.json b/data/71/vu_192371/vendor_cheu-b8xkjb.json new file mode 100644 index 0000000000..1b74cb4f4e --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkjb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T09:56:17-05:00", + "DateNotified": "2019-01-31T09:56:07-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ADTRAN", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKJB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkn8.json b/data/71/vu_192371/vendor_cheu-b8xkn8.json new file mode 100644 index 0000000000..e719e7ccf7 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkn8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:19-05:00", + "DateNotified": "2019-01-31T09:56:12-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Appgate Network Security", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKN8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xknb.json b/data/71/vu_192371/vendor_cheu-b8xknb.json new file mode 100644 index 0000000000..ce9ebc5fe5 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xknb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:20-05:00", + "DateNotified": "2019-01-31T09:56:12-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Alcatel-Lucent Enterprise", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKNB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xknd.json b/data/71/vu_192371/vendor_cheu-b8xknd.json new file mode 100644 index 0000000000..e59e6a2232 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xknd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:20-05:00", + "DateNotified": "2019-01-31T09:56:12-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Actelis Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKND", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xknf.json b/data/71/vu_192371/vendor_cheu-b8xknf.json new file mode 100644 index 0000000000..c241f48f92 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xknf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:20-05:00", + "DateNotified": "2019-01-31T09:56:12-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Aerohive", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKNF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xknh.json b/data/71/vu_192371/vendor_cheu-b8xknh.json new file mode 100644 index 0000000000..3e392422b6 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xknh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:20-05:00", + "DateNotified": "2019-01-31T09:56:12-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Actiontec", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKNH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xknk.json b/data/71/vu_192371/vendor_cheu-b8xknk.json new file mode 100644 index 0000000000..cfe382a323 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xknk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:20-05:00", + "DateNotified": "2019-01-31T09:56:12-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Arista Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKNK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xknm.json b/data/71/vu_192371/vendor_cheu-b8xknm.json new file mode 100644 index 0000000000..db3430f24a --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xknm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:21-05:00", + "DateNotified": "2019-01-31T09:56:12-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "A10 Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKNM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xknp.json b/data/71/vu_192371/vendor_cheu-b8xknp.json new file mode 100644 index 0000000000..bce987678f --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xknp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:21-05:00", + "DateNotified": "2019-01-31T09:56:12-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ANTlabs", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKNP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xknr.json b/data/71/vu_192371/vendor_cheu-b8xknr.json new file mode 100644 index 0000000000..768dee1520 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xknr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:21-05:00", + "DateNotified": "2019-01-31T09:56:13-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ACCESS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKNR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xknt.json b/data/71/vu_192371/vendor_cheu-b8xknt.json new file mode 100644 index 0000000000..16d92f83ee --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xknt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:21-05:00", + "DateNotified": "2019-01-31T09:56:13-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ARRIS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKNT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkp5.json b/data/71/vu_192371/vendor_cheu-b8xkp5.json new file mode 100644 index 0000000000..190d5e2994 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkp5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:23-05:00", + "DateNotified": "2019-01-31T09:56:18-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Belkin, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKP5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkpa.json b/data/71/vu_192371/vendor_cheu-b8xkpa.json new file mode 100644 index 0000000000..a5681ed54b --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkpa.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:24-05:00", + "DateNotified": "2019-01-31T09:56:18-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AirWatch", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKPA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkpd.json b/data/71/vu_192371/vendor_cheu-b8xkpd.json new file mode 100644 index 0000000000..a191c7ea26 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkpd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:24-05:00", + "DateNotified": "2019-01-31T09:56:19-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cradlepoint", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKPD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkph.json b/data/71/vu_192371/vendor_cheu-b8xkph.json new file mode 100644 index 0000000000..f06baf30e5 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkph.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:25-05:00", + "DateNotified": "2019-01-31T09:56:19-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Blue Coat Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKPH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkpk.json b/data/71/vu_192371/vendor_cheu-b8xkpk.json new file mode 100644 index 0000000000..9f1a640886 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkpk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:25-05:00", + "DateNotified": "2019-01-31T09:56:19-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Android Open Source Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKPK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkpn.json b/data/71/vu_192371/vendor_cheu-b8xkpn.json new file mode 100644 index 0000000000..6313393177 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkpn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:25-05:00", + "DateNotified": "2019-01-31T09:56:19-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AhnLab Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKPN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkpq.json b/data/71/vu_192371/vendor_cheu-b8xkpq.json new file mode 100644 index 0000000000..5d6c1040ee --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkpq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:26-05:00", + "DateNotified": "2019-01-31T09:56:19-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Barracuda Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKPQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkpu.json b/data/71/vu_192371/vendor_cheu-b8xkpu.json new file mode 100644 index 0000000000..422da03144 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkpu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:26-05:00", + "DateNotified": "2019-01-31T09:56:19-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "aep NETWORKS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKPU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkpx.json b/data/71/vu_192371/vendor_cheu-b8xkpx.json new file mode 100644 index 0000000000..3ae22d107e --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkpx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:27-05:00", + "DateNotified": "2019-01-31T09:56:20-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Alpine Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKPX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkpz.json b/data/71/vu_192371/vendor_cheu-b8xkpz.json new file mode 100644 index 0000000000..14657242d1 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkpz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:27-05:00", + "DateNotified": "2019-01-31T09:56:20-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Certicom", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKPZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkq3.json b/data/71/vu_192371/vendor_cheu-b8xkq3.json new file mode 100644 index 0000000000..92beae40b0 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkq3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:27-05:00", + "DateNotified": "2019-01-31T09:56:20-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AT&T", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKQ3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkq5.json b/data/71/vu_192371/vendor_cheu-b8xkq5.json new file mode 100644 index 0000000000..02d960d3c2 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkq5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:27-05:00", + "DateNotified": "2019-01-31T09:56:20-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cambium Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKQ5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkq7.json b/data/71/vu_192371/vendor_cheu-b8xkq7.json new file mode 100644 index 0000000000..bd98b648f6 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkq7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:28-05:00", + "DateNotified": "2019-01-31T09:56:20-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Apple", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKQ7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkqa.json b/data/71/vu_192371/vendor_cheu-b8xkqa.json new file mode 100644 index 0000000000..1d4f64e621 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkqa.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:28-05:00", + "DateNotified": "2019-01-31T09:56:20-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Akamai Technologies, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKQA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkqc.json b/data/71/vu_192371/vendor_cheu-b8xkqc.json new file mode 100644 index 0000000000..58eb7b243d --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkqc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:28-05:00", + "DateNotified": "2019-01-31T09:56:20-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Aruba Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKQC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkqe.json b/data/71/vu_192371/vendor_cheu-b8xkqe.json new file mode 100644 index 0000000000..a784d8f027 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkqe.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:28-05:00", + "DateNotified": "2019-01-31T09:56:20-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ceragon Networks Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKQE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkqg.json b/data/71/vu_192371/vendor_cheu-b8xkqg.json new file mode 100644 index 0000000000..801e6c8b16 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkqg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:29-05:00", + "DateNotified": "2019-01-31T09:56:20-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Bell Canada Enterprises", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKQG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkr5.json b/data/71/vu_192371/vendor_cheu-b8xkr5.json new file mode 100644 index 0000000000..dc7f61e7dd --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkr5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:32-05:00", + "DateNotified": "2019-01-31T09:56:23-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Express Logic", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKR5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkr8.json b/data/71/vu_192371/vendor_cheu-b8xkr8.json new file mode 100644 index 0000000000..521e4dc0be --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkr8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:33-05:00", + "DateNotified": "2019-01-31T09:56:23-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKR8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkrc.json b/data/71/vu_192371/vendor_cheu-b8xkrc.json new file mode 100644 index 0000000000..594860ae57 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkrc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:33-05:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "EfficientIP SAS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKRC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkre.json b/data/71/vu_192371/vendor_cheu-b8xkre.json new file mode 100644 index 0000000000..cfb97448b8 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkre.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:34-05:00", + "DateNotified": "2019-01-31T09:56:24-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BlueCat Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKRE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkrg.json b/data/71/vu_192371/vendor_cheu-b8xkrg.json new file mode 100644 index 0000000000..e8dcd9ca86 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkrg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:34-05:00", + "DateNotified": "2019-01-31T09:56:24-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Force10 Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKRG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkrj.json b/data/71/vu_192371/vendor_cheu-b8xkrj.json new file mode 100644 index 0000000000..832afbeef5 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkrj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:34-05:00", + "DateNotified": "2019-01-31T09:56:24-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Atheros Communications Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKRJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkrl.json b/data/71/vu_192371/vendor_cheu-b8xkrl.json new file mode 100644 index 0000000000..9884e476b9 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkrl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:34-05:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Devicescape", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKRL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkrn.json b/data/71/vu_192371/vendor_cheu-b8xkrn.json new file mode 100644 index 0000000000..01894566c6 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkrn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:34-05:00", + "DateNotified": "2019-01-31T09:56:31-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell EMC", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKRN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkru.json b/data/71/vu_192371/vendor_cheu-b8xkru.json new file mode 100644 index 0000000000..2658ecf8e6 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkru.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:35-05:00", + "DateNotified": "2019-01-31T09:56:36-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Google", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKRU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkrw.json b/data/71/vu_192371/vendor_cheu-b8xkrw.json new file mode 100644 index 0000000000..d03ec66f91 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkrw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:36-05:00", + "DateNotified": "2019-01-31T09:56:37-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Marvell Semiconductors", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKRW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkrz.json b/data/71/vu_192371/vendor_cheu-b8xkrz.json new file mode 100644 index 0000000000..12741af9c8 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkrz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-01-31T10:02:36-05:00", + "DateNotified": "2019-01-31T09:56:31-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fortinet, Inc.", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8XKRZ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xks6.json b/data/71/vu_192371/vendor_cheu-b8xks6.json new file mode 100644 index 0000000000..519c847b47 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xks6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:37-05:00", + "DateNotified": "2019-01-31T09:56:47-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SSH Communications Security", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKS6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xksk.json b/data/71/vu_192371/vendor_cheu-b8xksk.json new file mode 100644 index 0000000000..0229c7a131 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xksk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:39-05:00", + "DateNotified": "2019-01-31T09:56:46-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Slackware Linux Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKSK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xksm.json b/data/71/vu_192371/vendor_cheu-b8xksm.json new file mode 100644 index 0000000000..f8b23cc758 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xksm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:40-05:00", + "DateNotified": "2019-01-31T09:56:46-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Toshiba Commerce Solutions", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKSM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xksp.json b/data/71/vu_192371/vendor_cheu-b8xksp.json new file mode 100644 index 0000000000..3af774b4d3 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xksp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:40-05:00", + "DateNotified": "2019-01-31T09:56:47-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TrueOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKSP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkss.json b/data/71/vu_192371/vendor_cheu-b8xkss.json new file mode 100644 index 0000000000..abb38525c8 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkss.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:40-05:00", + "DateNotified": "2019-01-31T09:56:59-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Turbolinux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKSS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xksu.json b/data/71/vu_192371/vendor_cheu-b8xksu.json new file mode 100644 index 0000000000..0baa08942c --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xksu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:41-05:00", + "DateNotified": "2019-01-31T09:56:56-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Wind River", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKSU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkt2.json b/data/71/vu_192371/vendor_cheu-b8xkt2.json new file mode 100644 index 0000000000..8f8240a177 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkt2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:42-05:00", + "DateNotified": "2019-01-31T09:56:58-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Watchguard Technologies, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKT2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkt6.json b/data/71/vu_192371/vendor_cheu-b8xkt6.json new file mode 100644 index 0000000000..d56d3b5f45 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkt6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:42-05:00", + "DateNotified": "2019-01-31T09:56:41-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "KAME Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKT6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkt8.json b/data/71/vu_192371/vendor_cheu-b8xkt8.json new file mode 100644 index 0000000000..756f527193 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkt8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:42-05:00", + "DateNotified": "2019-01-31T09:56:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lenovo", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKT8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkta.json b/data/71/vu_192371/vendor_cheu-b8xkta.json new file mode 100644 index 0000000000..5ec48e4115 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkta.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:43-05:00", + "DateNotified": "2019-01-31T09:56:54-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Unisys", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKTA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xktc.json b/data/71/vu_192371/vendor_cheu-b8xktc.json new file mode 100644 index 0000000000..58e7516d7e --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xktc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:43-05:00", + "DateNotified": "2019-01-31T09:56:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nokia", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKTC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkte.json b/data/71/vu_192371/vendor_cheu-b8xkte.json new file mode 100644 index 0000000000..12bc5ea6c2 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkte.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:43-05:00", + "DateNotified": "2019-01-31T09:56:56-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "VMware", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKTE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xktg.json b/data/71/vu_192371/vendor_cheu-b8xktg.json new file mode 100644 index 0000000000..c1e3cdcdab --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xktg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:43-05:00", + "DateNotified": "2019-01-31T09:56:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NEC Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKTG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xktj.json b/data/71/vu_192371/vendor_cheu-b8xktj.json new file mode 100644 index 0000000000..70d9471067 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xktj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:44-05:00", + "DateNotified": "2019-01-31T09:56:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NetBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKTJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xktm.json b/data/71/vu_192371/vendor_cheu-b8xktm.json new file mode 100644 index 0000000000..0057008f55 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xktm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:44-05:00", + "DateNotified": "2019-01-31T09:56:46-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Openwall GNU/*/Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKTM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xktr.json b/data/71/vu_192371/vendor_cheu-b8xktr.json new file mode 100644 index 0000000000..4f7559b89f --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xktr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-01T12:57:00-04:00", + "DateNotified": "2019-01-31T09:56:47-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "pfSense", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8XKTR", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xktt.json b/data/71/vu_192371/vendor_cheu-b8xktt.json new file mode 100644 index 0000000000..94be218bcf --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xktt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-17T21:54:00-04:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "2019-02-12T21:09:50-05:00", + "ID": "VU#192371", + "Revision": 4, + "Status": "Affected", + "Vendor": "Cisco", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8XKTT", + "VendorReferences": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk10249", + "VendorStatement": "We are not aware of any situation where a currently valid session token is written to log files. The storage of the session cookie within process memory of the client and in cases of clientless sessions the web browser while the sessions are active are not considered to be an unwarranted exposure. These values are required to maintain the operation of the session per design of the feature should session re-establishment be required due to network interruption. We have documented the concerns and the engineering teams will incorporate this feedback into discussions for future design improvements of the Cisco AnyConnect VPN solution. It should also be noted that all session material stored by both the Client and Clientless solutions are destroyed once the sessions is deliberately terminated by the client." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xktx.json b/data/71/vu_192371/vendor_cheu-b8xktx.json new file mode 100644 index 0000000000..f6cfd7e733 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xktx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:46-05:00", + "DateNotified": "2019-01-31T09:56:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TP-LINK", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKTX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xktz.json b/data/71/vu_192371/vendor_cheu-b8xktz.json new file mode 100644 index 0000000000..31f316ee6c --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xktz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:46-05:00", + "DateNotified": "2019-01-31T09:56:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Zephyr Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKTZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xku4.json b/data/71/vu_192371/vendor_cheu-b8xku4.json new file mode 100644 index 0000000000..5b84f461bb --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xku4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:46-05:00", + "DateNotified": "2019-01-31T09:56:31-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "F-Secure Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKU4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xku6.json b/data/71/vu_192371/vendor_cheu-b8xku6.json new file mode 100644 index 0000000000..7d7f7dcdf9 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xku6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:46-05:00", + "DateNotified": "2019-01-31T09:56:31-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Deutsche Telekom", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKU6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xku8.json b/data/71/vu_192371/vendor_cheu-b8xku8.json new file mode 100644 index 0000000000..a54ed9c8f4 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xku8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:47-05:00", + "DateNotified": "2019-01-31T09:56:32-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Digi International", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKU8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkua.json b/data/71/vu_192371/vendor_cheu-b8xkua.json new file mode 100644 index 0000000000..67632c57e9 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkua.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:47-05:00", + "DateNotified": "2019-01-31T09:56:32-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Espressif Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKUA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkuc.json b/data/71/vu_192371/vendor_cheu-b8xkuc.json new file mode 100644 index 0000000000..d095dafcb9 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkuc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-11T09:37:00-04:00", + "DateNotified": "2019-01-31T09:56:46-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 2, + "Status": "Affected", + "Vendor": "Palo Alto Networks", + "VendorInformation": "CVE-2019-1573\nUpdate to GlobalProtect Agent 4.1.1 and later for Windows, and GlobalProtect Agent 4.1.11 and later for macOS.", + "VendorRecordID": "CHEU-B8XKUC", + "VendorReferences": "https://securityadvisories.paloaltonetworks.com/Home/Detail/146", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkue.json b/data/71/vu_192371/vendor_cheu-b8xkue.json new file mode 100644 index 0000000000..b8819da221 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkue.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:47-05:00", + "DateNotified": "2019-01-31T09:56:32-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "DesktopBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKUE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkug.json b/data/71/vu_192371/vendor_cheu-b8xkug.json new file mode 100644 index 0000000000..acee5cdac4 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkug.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:47-05:00", + "DateNotified": "2019-01-31T09:56:31-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "eSoft, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKUG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkuj.json b/data/71/vu_192371/vendor_cheu-b8xkuj.json new file mode 100644 index 0000000000..382648b154 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkuj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:48-05:00", + "DateNotified": "2019-01-31T09:56:32-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Comcast", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKUJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkul.json b/data/71/vu_192371/vendor_cheu-b8xkul.json new file mode 100644 index 0000000000..2ba4a12563 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkul.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:48-05:00", + "DateNotified": "2019-01-31T09:56:47-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "netsnmp", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKUL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkur.json b/data/71/vu_192371/vendor_cheu-b8xkur.json new file mode 100644 index 0000000000..2039f7d575 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkur.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:49-05:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Debian GNU/Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKUR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkut.json b/data/71/vu_192371/vendor_cheu-b8xkut.json new file mode 100644 index 0000000000..2dfc1c0179 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkut.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:49-05:00", + "DateNotified": "2019-01-31T09:56:36-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Intel", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKUT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkuv.json b/data/71/vu_192371/vendor_cheu-b8xkuv.json new file mode 100644 index 0000000000..808413f204 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkuv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:49-05:00", + "DateNotified": "2019-01-31T09:56:37-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Hitachi", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKUV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkuz.json b/data/71/vu_192371/vendor_cheu-b8xkuz.json new file mode 100644 index 0000000000..39f40ef6a2 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkuz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:50-05:00", + "DateNotified": "2019-01-31T09:56:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CZ.NIC", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKUZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkv4.json b/data/71/vu_192371/vendor_cheu-b8xkv4.json new file mode 100644 index 0000000000..f5bea50ca0 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkv4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:50-05:00", + "DateNotified": "2019-01-31T09:56:35-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "FreeS/Wan", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKV4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkv6.json b/data/71/vu_192371/vendor_cheu-b8xkv6.json new file mode 100644 index 0000000000..412925f172 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkv6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:50-05:00", + "DateNotified": "2019-01-31T09:56:36-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "FreeBSD Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKV6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkv9.json b/data/71/vu_192371/vendor_cheu-b8xkv9.json new file mode 100644 index 0000000000..0d5d965e30 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkv9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:51-05:00", + "DateNotified": "2019-01-31T09:56:41-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Philips Electronics", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKV9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkvb.json b/data/71/vu_192371/vendor_cheu-b8xkvb.json new file mode 100644 index 0000000000..4886829beb --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkvb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:51-05:00", + "DateNotified": "2019-01-31T09:56:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Riverbed Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKVB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkvd.json b/data/71/vu_192371/vendor_cheu-b8xkvd.json new file mode 100644 index 0000000000..186f92c3a4 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkvd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:51-05:00", + "DateNotified": "2019-01-31T09:56:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenDNS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKVD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkvf.json b/data/71/vu_192371/vendor_cheu-b8xkvf.json new file mode 100644 index 0000000000..e23b2f6311 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkvf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:51-05:00", + "DateNotified": "2019-01-31T09:56:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SafeNet", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKVF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkvh.json b/data/71/vu_192371/vendor_cheu-b8xkvh.json new file mode 100644 index 0000000000..6770a986cf --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkvh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:51-05:00", + "DateNotified": "2019-01-31T09:56:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lantronix", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKVH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkvk.json b/data/71/vu_192371/vendor_cheu-b8xkvk.json new file mode 100644 index 0000000000..20381bc32a --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkvk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:52-05:00", + "DateNotified": "2019-01-31T09:56:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quagga", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKVK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkvr.json b/data/71/vu_192371/vendor_cheu-b8xkvr.json new file mode 100644 index 0000000000..8f729c46a5 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkvr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:53-05:00", + "DateNotified": "2019-01-31T09:56:47-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "PowerDNS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKVR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkvv.json b/data/71/vu_192371/vendor_cheu-b8xkvv.json new file mode 100644 index 0000000000..e804480efe --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkvv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:53-05:00", + "DateNotified": "2019-01-31T09:56:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Stonesoft", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKVV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkvx.json b/data/71/vu_192371/vendor_cheu-b8xkvx.json new file mode 100644 index 0000000000..0210c7c225 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkvx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:54-05:00", + "DateNotified": "2019-01-31T09:56:31-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fastly", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKVX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkvz.json b/data/71/vu_192371/vendor_cheu-b8xkvz.json new file mode 100644 index 0000000000..672dbadb58 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkvz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:54-05:00", + "DateNotified": "2019-01-31T09:56:32-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "InfoExpress, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKVZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkw9.json b/data/71/vu_192371/vendor_cheu-b8xkw9.json new file mode 100644 index 0000000000..b44a595ebf --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkw9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:55-05:00", + "DateNotified": "2019-01-31T09:56:48-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Mobile", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKW9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkwn.json b/data/71/vu_192371/vendor_cheu-b8xkwn.json new file mode 100644 index 0000000000..7d7ad98ade --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkwn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:57-05:00", + "DateNotified": "2019-01-31T09:56:24-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ericsson", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKWN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkwq.json b/data/71/vu_192371/vendor_cheu-b8xkwq.json new file mode 100644 index 0000000000..442fb6b0de --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkwq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:57-05:00", + "DateNotified": "2019-01-31T09:56:24-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "eero", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKWQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkws.json b/data/71/vu_192371/vendor_cheu-b8xkws.json new file mode 100644 index 0000000000..e2f9dd408e --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkws.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:57-05:00", + "DateNotified": "2019-01-31T09:56:24-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Broadcom", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKWS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkwu.json b/data/71/vu_192371/vendor_cheu-b8xkwu.json new file mode 100644 index 0000000000..4a85959975 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkwu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:58-05:00", + "DateNotified": "2019-01-31T09:56:24-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Command Software Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKWU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkwx.json b/data/71/vu_192371/vendor_cheu-b8xkwx.json new file mode 100644 index 0000000000..48e37a10ba --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkwx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-18T15:19:00-04:00", + "DateNotified": "2019-01-31T09:56:24-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Brocade Communication Systems", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8XKWX", + "VendorReferences": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783", + "VendorStatement": "No Brocade Fibre Channel technology products from Broadcom are currently known to be affected by these\u00a0vulnerabilities." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkx2.json b/data/71/vu_192371/vendor_cheu-b8xkx2.json new file mode 100644 index 0000000000..d7bfed90b5 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkx2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-11T09:40:00-04:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 2, + "Status": "Affected", + "Vendor": "F5 Networks, Inc.", + "VendorInformation": "F5 has been aware of the insecure memory storage since 2013 and has not yet been patched. More information can be found here https://support.f5.com/csp/article/K14969. They have been aware of the insecure log storage since 2017 and fixed it in version 12.1.3 and 13.1.0 and onwards. More information can be found here https://support.f5.com/csp/article/K45432295", + "VendorRecordID": "CHEU-B8XKX2", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkx4.json b/data/71/vu_192371/vendor_cheu-b8xkx4.json new file mode 100644 index 0000000000..dd0b9379ba --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkx4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:59-05:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Avaya, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKX4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkx6.json b/data/71/vu_192371/vendor_cheu-b8xkx6.json new file mode 100644 index 0000000000..4f2efe0521 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkx6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:59-05:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AsusTek Computer Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKX6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkx8.json b/data/71/vu_192371/vendor_cheu-b8xkx8.json new file mode 100644 index 0000000000..9816548fcf --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkx8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:59-05:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "D-Link Systems, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKX8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkxa.json b/data/71/vu_192371/vendor_cheu-b8xkxa.json new file mode 100644 index 0000000000..0b7658dfd4 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkxa.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:02:59-05:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "dnsmasq", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKXA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkxc.json b/data/71/vu_192371/vendor_cheu-b8xkxc.json new file mode 100644 index 0000000000..ec70c28e61 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkxc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-01T12:56:00-04:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Check Point Software Technologies", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8XKXC", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkxe.json b/data/71/vu_192371/vendor_cheu-b8xkxe.json new file mode 100644 index 0000000000..12660fae7f --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkxe.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:00-05:00", + "DateNotified": "2019-01-31T09:56:26-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CA Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKXE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkxj.json b/data/71/vu_192371/vendor_cheu-b8xkxj.json new file mode 100644 index 0000000000..5bd0c36749 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkxj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:00-05:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CoreOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKXJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkxm.json b/data/71/vu_192371/vendor_cheu-b8xkxm.json new file mode 100644 index 0000000000..63cd2d9f2c --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkxm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:01-05:00", + "DateNotified": "2019-01-31T09:56:31-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Juniper Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKXM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkxp.json b/data/71/vu_192371/vendor_cheu-b8xkxp.json new file mode 100644 index 0000000000..bcc7c745e8 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkxp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:01-05:00", + "DateNotified": "2019-01-31T09:56:32-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "DragonFly BSD Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKXP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkxr.json b/data/71/vu_192371/vendor_cheu-b8xkxr.json new file mode 100644 index 0000000000..ae5b4fa072 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkxr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:01-05:00", + "DateNotified": "2019-01-31T09:56:32-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Joyent", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKXR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkxt.json b/data/71/vu_192371/vendor_cheu-b8xkxt.json new file mode 100644 index 0000000000..ce41bc0052 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkxt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:01-05:00", + "DateNotified": "2019-01-31T09:56:33-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GNU glibc", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKXT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkxw.json b/data/71/vu_192371/vendor_cheu-b8xkxw.json new file mode 100644 index 0000000000..df577c9c02 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkxw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:02-05:00", + "DateNotified": "2019-01-31T09:56:34-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HTC", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKXW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkxz.json b/data/71/vu_192371/vendor_cheu-b8xkxz.json new file mode 100644 index 0000000000..a7d38186a2 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkxz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:02-05:00", + "DateNotified": "2019-01-31T09:56:36-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Interniche Technologies, inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKXZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xky3.json b/data/71/vu_192371/vendor_cheu-b8xky3.json new file mode 100644 index 0000000000..e04b0831d0 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xky3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:02-05:00", + "DateNotified": "2019-01-31T09:56:37-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "McAfee", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKY3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkym.json b/data/71/vu_192371/vendor_cheu-b8xkym.json new file mode 100644 index 0000000000..2d4fcc65b1 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkym.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:06-05:00", + "DateNotified": "2019-01-31T09:56:46-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKYM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkyp.json b/data/71/vu_192371/vendor_cheu-b8xkyp.json new file mode 100644 index 0000000000..5036cd5000 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkyp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:06-05:00", + "DateNotified": "2019-01-31T09:56:48-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Snort", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKYP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkyr.json b/data/71/vu_192371/vendor_cheu-b8xkyr.json new file mode 100644 index 0000000000..728e3492f5 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkyr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:06-05:00", + "DateNotified": "2019-01-31T09:56:48-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell SecureWorks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKYR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkyv.json b/data/71/vu_192371/vendor_cheu-b8xkyv.json new file mode 100644 index 0000000000..52e13aa9c1 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkyv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-17T22:00:00-04:00", + "DateNotified": "2019-01-31T09:56:48-05:00", + "DateResponded": "2019-04-13T00:00:00", + "ID": "VU#192371", + "Revision": 3, + "Status": "Affected", + "Vendor": "Pulse Secure", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8XKYV", + "VendorReferences": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114/", + "VendorStatement": "SA44114 - 2019-04: Out-of-Cycle Advisory: Pulse Desktop Client and Network \nConnect improper handling of session cookies (CVE-2016-8201) Affected Products: Pulse Desktop Client Pulse Desktop Client 9.0R1 - 9.0R2\nPulse Desktop Client 5.3R1 - 5.3R6 Pulse Connect Secure (for Network Connect customers) Pulse Connect Secure 9.0R1 - 9.0R2\nPulse Connect Secure 8.3R1 - 8.3R6\nPulse Connect Secure 8.1R1 - 8.1R13 CVE-2016-8201 has been applied to this vulnerability. This issue is resolved in the following releases: Pulse Desktop Client\nPulse Secure Desktop 9.0R3 and above\nPulse Secure Desktop 5.3R7 and above\nNote: For Pulse Desktop Client customer, this is a client-side fix only and does not require a server-side upgrade. Network Connect\nPulse Connect Secure 9.0R3 and above\nPulse Connect Secure 8.3R7 and above\nPulse Connect Secure 8.1R14 and above https://nvd.nist.gov/vuln/detail/CVE-2016-8201" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkyy.json b/data/71/vu_192371/vendor_cheu-b8xkyy.json new file mode 100644 index 0000000000..91708b4917 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkyy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:07-05:00", + "DateNotified": "2019-01-31T09:56:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Unicoi", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKYY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkz2.json b/data/71/vu_192371/vendor_cheu-b8xkz2.json new file mode 100644 index 0000000000..3741d0c0ec --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkz2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:07-05:00", + "DateNotified": "2019-01-31T09:56:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sony Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKZ2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkz4.json b/data/71/vu_192371/vendor_cheu-b8xkz4.json new file mode 100644 index 0000000000..17d6d37e2a --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkz4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:08-05:00", + "DateNotified": "2019-01-31T09:56:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SonicWall", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKZ4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkz7.json b/data/71/vu_192371/vendor_cheu-b8xkz7.json new file mode 100644 index 0000000000..67dd4bfff8 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkz7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:08-05:00", + "DateNotified": "2019-01-31T09:56:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sonos", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKZ7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkza.json b/data/71/vu_192371/vendor_cheu-b8xkza.json new file mode 100644 index 0000000000..97b4ee43f4 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkza.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:08-05:00", + "DateNotified": "2019-01-31T09:56:57-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Xilinx", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKZA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkzc.json b/data/71/vu_192371/vendor_cheu-b8xkzc.json new file mode 100644 index 0000000000..7de3931d71 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkzc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:09-05:00", + "DateNotified": "2019-01-31T09:56:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Technicolor", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKZC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkze.json b/data/71/vu_192371/vendor_cheu-b8xkze.json new file mode 100644 index 0000000000..3a17624f96 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkze.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:09-05:00", + "DateNotified": "2019-01-31T09:56:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Symantec", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKZE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkzh.json b/data/71/vu_192371/vendor_cheu-b8xkzh.json new file mode 100644 index 0000000000..5923bb05de --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkzh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:03:09-05:00", + "DateNotified": "2019-01-31T09:56:25-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BlackBerry", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKZH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkzp.json b/data/71/vu_192371/vendor_cheu-b8xkzp.json new file mode 100644 index 0000000000..bafe965edc --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkzp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:17-05:00", + "DateNotified": "2019-01-31T10:09:13-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Global Technology Associates, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKZP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xkzr.json b/data/71/vu_192371/vendor_cheu-b8xkzr.json new file mode 100644 index 0000000000..bef41c1501 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xkzr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:18-05:00", + "DateNotified": "2019-01-31T10:09:13-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Openswan Linux IPsec software", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XKZR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl26.json b/data/71/vu_192371/vendor_cheu-b8xl26.json new file mode 100644 index 0000000000..c818501143 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl26.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:20-05:00", + "DateNotified": "2019-01-31T10:09:20-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Extreme Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL26", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl2v.json b/data/71/vu_192371/vendor_cheu-b8xl2v.json new file mode 100644 index 0000000000..96f3de8475 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl2v.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:24-05:00", + "DateNotified": "2019-01-31T10:09:32-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Semiconductor Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL2V", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl2x.json b/data/71/vu_192371/vendor_cheu-b8xl2x.json new file mode 100644 index 0000000000..b3c7f33b95 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl2x.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:24-05:00", + "DateNotified": "2019-01-31T10:09:32-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fujitsu", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL2X", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl2z.json b/data/71/vu_192371/vendor_cheu-b8xl2z.json new file mode 100644 index 0000000000..6310acc10c --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl2z.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:24-05:00", + "DateNotified": "2019-01-31T10:09:33-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AVM GmbH", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL2Z", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl33.json b/data/71/vu_192371/vendor_cheu-b8xl33.json new file mode 100644 index 0000000000..ab5fe37e45 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl33.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:25-05:00", + "DateNotified": "2019-01-31T10:09:34-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Mitel Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL33", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl35.json b/data/71/vu_192371/vendor_cheu-b8xl35.json new file mode 100644 index 0000000000..3b82c6120a --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl35.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:25-05:00", + "DateNotified": "2019-01-31T10:09:35-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Netgear, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL35", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl37.json b/data/71/vu_192371/vendor_cheu-b8xl37.json new file mode 100644 index 0000000000..4754230e16 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl37.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:25-05:00", + "DateNotified": "2019-01-31T10:09:36-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Zebra Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL37", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3a.json b/data/71/vu_192371/vendor_cheu-b8xl3a.json new file mode 100644 index 0000000000..b01dbb82e7 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3a.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:25-05:00", + "DateNotified": "2019-01-31T10:09:37-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Intoto", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3A", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3c.json b/data/71/vu_192371/vendor_cheu-b8xl3c.json new file mode 100644 index 0000000000..15b22f02cf --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3c.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:26-05:00", + "DateNotified": "2019-01-31T10:09:37-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Foundry Brocade", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3C", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3e.json b/data/71/vu_192371/vendor_cheu-b8xl3e.json new file mode 100644 index 0000000000..7d27d3d0eb --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3e.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:26-05:00", + "DateNotified": "2019-01-31T10:09:38-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MetaSwitch", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3E", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3g.json b/data/71/vu_192371/vendor_cheu-b8xl3g.json new file mode 100644 index 0000000000..0d976ba09d --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3g.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:26-05:00", + "DateNotified": "2019-01-31T10:09:38-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NETSCOUT", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3G", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3j.json b/data/71/vu_192371/vendor_cheu-b8xl3j.json new file mode 100644 index 0000000000..a387a7507b --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3j.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:26-05:00", + "DateNotified": "2019-01-31T10:09:39-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quantenna Communications", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3J", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3m.json b/data/71/vu_192371/vendor_cheu-b8xl3m.json new file mode 100644 index 0000000000..6484d2a70f --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3m.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:27-05:00", + "DateNotified": "2019-01-31T10:09:41-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ruckus Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3M", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3p.json b/data/71/vu_192371/vendor_cheu-b8xl3p.json new file mode 100644 index 0000000000..940dbc8fa0 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3p.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:27-05:00", + "DateNotified": "2019-01-31T10:09:41-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Micro Focus", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3P", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3r.json b/data/71/vu_192371/vendor_cheu-b8xl3r.json new file mode 100644 index 0000000000..3682c0399c --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:27-05:00", + "DateNotified": "2019-01-31T10:09:42-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Huawei Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3R", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3t.json b/data/71/vu_192371/vendor_cheu-b8xl3t.json new file mode 100644 index 0000000000..6e34fb39cd --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3t.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:27-05:00", + "DateNotified": "2019-01-31T10:09:43-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenBSD IPSec", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3T", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3v.json b/data/71/vu_192371/vendor_cheu-b8xl3v.json new file mode 100644 index 0000000000..662162f906 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3v.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:28-05:00", + "DateNotified": "2019-01-31T10:09:44-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "IBM Corporation (zseries)", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3V", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3x.json b/data/71/vu_192371/vendor_cheu-b8xl3x.json new file mode 100644 index 0000000000..8cabb22593 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3x.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:28-05:00", + "DateNotified": "2019-01-31T10:09:45-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Paessler", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3X", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl3z.json b/data/71/vu_192371/vendor_cheu-b8xl3z.json new file mode 100644 index 0000000000..28d59195c9 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl3z.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:28-05:00", + "DateNotified": "2019-01-31T10:09:45-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Roku", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL3Z", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl43.json b/data/71/vu_192371/vendor_cheu-b8xl43.json new file mode 100644 index 0000000000..99198389d5 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl43.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:28-05:00", + "DateNotified": "2019-01-31T10:09:46-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QLogic", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL43", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl45.json b/data/71/vu_192371/vendor_cheu-b8xl45.json new file mode 100644 index 0000000000..c2613a5137 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl45.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:29-05:00", + "DateNotified": "2019-01-31T10:09:46-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "m0n0wall", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL45", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl47.json b/data/71/vu_192371/vendor_cheu-b8xl47.json new file mode 100644 index 0000000000..a2ac41f191 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl47.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:29-05:00", + "DateNotified": "2019-01-31T10:09:47-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microsoft", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL47", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl49.json b/data/71/vu_192371/vendor_cheu-b8xl49.json new file mode 100644 index 0000000000..7e332666c1 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl49.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:29-05:00", + "DateNotified": "2019-01-31T10:09:47-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Geexbox", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL49", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4b.json b/data/71/vu_192371/vendor_cheu-b8xl4b.json new file mode 100644 index 0000000000..8e5f51b534 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4b.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:29-05:00", + "DateNotified": "2019-01-31T10:09:48-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Infoblox", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4B", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4d.json b/data/71/vu_192371/vendor_cheu-b8xl4d.json new file mode 100644 index 0000000000..f8cbe346b0 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4d.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:30-05:00", + "DateNotified": "2019-01-31T10:09:48-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Systems Consortium - DHCP", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4D", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4f.json b/data/71/vu_192371/vendor_cheu-b8xl4f.json new file mode 100644 index 0000000000..c7456a2133 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4f.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:30-05:00", + "DateNotified": "2019-01-31T10:09:50-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Honeywell", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4F", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4h.json b/data/71/vu_192371/vendor_cheu-b8xl4h.json new file mode 100644 index 0000000000..7c4cfe974d --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4h.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:30-05:00", + "DateNotified": "2019-01-31T10:09:50-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HP Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4H", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4k.json b/data/71/vu_192371/vendor_cheu-b8xl4k.json new file mode 100644 index 0000000000..2eb2e3bb67 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4k.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:30-05:00", + "DateNotified": "2019-01-31T10:09:51-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Linksys", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4K", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4m.json b/data/71/vu_192371/vendor_cheu-b8xl4m.json new file mode 100644 index 0000000000..2492a8d2fb --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4m.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:30-05:00", + "DateNotified": "2019-01-31T10:09:51-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fedora Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4M", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4p.json b/data/71/vu_192371/vendor_cheu-b8xl4p.json new file mode 100644 index 0000000000..aeb0a3f7db --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4p.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:31-05:00", + "DateNotified": "2019-01-31T10:09:52-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SUSE Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4P", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4r.json b/data/71/vu_192371/vendor_cheu-b8xl4r.json new file mode 100644 index 0000000000..8ac7eb4110 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4r.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:31-05:00", + "DateNotified": "2019-01-31T10:09:52-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Synology", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4R", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4t.json b/data/71/vu_192371/vendor_cheu-b8xl4t.json new file mode 100644 index 0000000000..fbf92e24db --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4t.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:31-05:00", + "DateNotified": "2019-01-31T10:09:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MikroTik", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4T", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4v.json b/data/71/vu_192371/vendor_cheu-b8xl4v.json new file mode 100644 index 0000000000..30bea231db --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4v.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:31-05:00", + "DateNotified": "2019-01-31T10:09:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NLnet Labs", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4V", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4x.json b/data/71/vu_192371/vendor_cheu-b8xl4x.json new file mode 100644 index 0000000000..10e5731036 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4x.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:32-05:00", + "DateNotified": "2019-01-31T10:09:53-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Secure64 Software Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4X", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl4z.json b/data/71/vu_192371/vendor_cheu-b8xl4z.json new file mode 100644 index 0000000000..edb0f749e1 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl4z.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:32-05:00", + "DateNotified": "2019-01-31T10:09:54-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Red Hat, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL4Z", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl53.json b/data/71/vu_192371/vendor_cheu-b8xl53.json new file mode 100644 index 0000000000..dd5041276f --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl53.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:32-05:00", + "DateNotified": "2019-01-31T10:09:55-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Miredo", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL53", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl55.json b/data/71/vu_192371/vendor_cheu-b8xl55.json new file mode 100644 index 0000000000..7a2d59fc1e --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl55.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:32-05:00", + "DateNotified": "2019-01-31T10:09:56-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HardenedBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL55", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl57.json b/data/71/vu_192371/vendor_cheu-b8xl57.json new file mode 100644 index 0000000000..d35de31529 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl57.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:33-05:00", + "DateNotified": "2019-01-31T10:09:57-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QUALCOMM Incorporated", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL57", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5a.json b/data/71/vu_192371/vendor_cheu-b8xl5a.json new file mode 100644 index 0000000000..57185ecf15 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5a.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-24T11:01:00-04:00", + "DateNotified": "2019-01-31T10:09:58-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Zyxel", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8XL5A", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5c.json b/data/71/vu_192371/vendor_cheu-b8xl5c.json new file mode 100644 index 0000000000..82295e0ed0 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5c.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:33-05:00", + "DateNotified": "2019-01-31T10:09:59-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Systems Consortium", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL5C", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5e.json b/data/71/vu_192371/vendor_cheu-b8xl5e.json new file mode 100644 index 0000000000..43fc353cda --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5e.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:33-05:00", + "DateNotified": "2019-01-31T10:09:59-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "strongSwan", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL5E", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5g.json b/data/71/vu_192371/vendor_cheu-b8xl5g.json new file mode 100644 index 0000000000..bc59f52a43 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5g.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:34-05:00", + "DateNotified": "2019-01-31T10:10:00-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MediaTek", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL5G", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5j.json b/data/71/vu_192371/vendor_cheu-b8xl5j.json new file mode 100644 index 0000000000..90aab579a8 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5j.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-24T10:40:00-04:00", + "DateNotified": "2019-01-31T10:10:00-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Peplink", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8XL5J", + "VendorReferences": "None", + "VendorStatement": "Peplink/Pepwave products are not affected by this vulnerability." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5l.json b/data/71/vu_192371/vendor_cheu-b8xl5l.json new file mode 100644 index 0000000000..61d37c9318 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5l.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:34-05:00", + "DateNotified": "2019-01-31T10:10:01-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TippingPoint Technologies Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL5L", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5n.json b/data/71/vu_192371/vendor_cheu-b8xl5n.json new file mode 100644 index 0000000000..2ef3dfdd93 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5n.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-17T23:46:00-04:00", + "DateNotified": "2019-01-31T10:10:01-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Sophos, Inc.", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-B8XL5N", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5q.json b/data/71/vu_192371/vendor_cheu-b8xl5q.json new file mode 100644 index 0000000000..584261a8bb --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5q.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:34-05:00", + "DateNotified": "2019-01-31T10:10:02-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nixu", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL5Q", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5s.json b/data/71/vu_192371/vendor_cheu-b8xl5s.json new file mode 100644 index 0000000000..3b09c17558 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5s.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:35-05:00", + "DateNotified": "2019-01-31T10:10:03-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microchip Technology", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL5S", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5u.json b/data/71/vu_192371/vendor_cheu-b8xl5u.json new file mode 100644 index 0000000000..6db3f2ced1 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5u.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:35-05:00", + "DateNotified": "2019-01-31T10:10:03-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sourcefire", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL5U", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5w.json b/data/71/vu_192371/vendor_cheu-b8xl5w.json new file mode 100644 index 0000000000..57a4caab4b --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5w.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:35-05:00", + "DateNotified": "2019-01-31T10:10:04-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Novell, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL5W", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-b8xl5y.json b/data/71/vu_192371/vendor_cheu-b8xl5y.json new file mode 100644 index 0000000000..db9e127d18 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-b8xl5y.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-01-31T10:13:35-05:00", + "DateNotified": "2019-01-31T10:10:05-05:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ubuntu", + "VendorInformation": "", + "VendorRecordID": "CHEU-B8XL5Y", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kkl.json b/data/71/vu_192371/vendor_cheu-bb5kkl.json new file mode 100644 index 0000000000..25155cfa47 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kkl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:30-04:00", + "DateNotified": "2019-04-11T10:54:36-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GNU adns", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KKL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kkr.json b/data/71/vu_192371/vendor_cheu-bb5kkr.json new file mode 100644 index 0000000000..f3b25cd70f --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kkr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:30-04:00", + "DateNotified": "2019-04-11T10:54:38-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ADATA", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KKR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kl4.json b/data/71/vu_192371/vendor_cheu-bb5kl4.json new file mode 100644 index 0000000000..40dd05a149 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kl4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:32-04:00", + "DateNotified": "2019-04-11T10:54:46-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Belden", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KL4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kl6.json b/data/71/vu_192371/vendor_cheu-bb5kl6.json new file mode 100644 index 0000000000..57026e422d --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kl6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:32-04:00", + "DateNotified": "2019-04-11T10:54:46-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Buffalo Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KL6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kla.json b/data/71/vu_192371/vendor_cheu-bb5kla.json new file mode 100644 index 0000000000..4b91316897 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kla.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:33-04:00", + "DateNotified": "2019-04-11T10:54:46-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BoringSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KLA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5klf.json b/data/71/vu_192371/vendor_cheu-bb5klf.json new file mode 100644 index 0000000000..181b4d12dd --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5klf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:34-04:00", + "DateNotified": "2019-04-11T10:54:47-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Contiki OS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KLF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5klh.json b/data/71/vu_192371/vendor_cheu-bb5klh.json new file mode 100644 index 0000000000..35c0c9a6f0 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5klh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:34-04:00", + "DateNotified": "2019-04-11T10:54:47-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Allied Telesis", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KLH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5klm.json b/data/71/vu_192371/vendor_cheu-bb5klm.json new file mode 100644 index 0000000000..78d7efb5b5 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5klm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:34-04:00", + "DateNotified": "2019-04-11T10:54:47-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CMX Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KLM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kls.json b/data/71/vu_192371/vendor_cheu-bb5kls.json new file mode 100644 index 0000000000..2d6f04277f --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kls.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:35-04:00", + "DateNotified": "2019-04-11T10:54:47-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cirpack", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KLS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kly.json b/data/71/vu_192371/vendor_cheu-bb5kly.json new file mode 100644 index 0000000000..cb1c92b030 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kly.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:36-04:00", + "DateNotified": "2019-04-11T10:54:49-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cricket Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KLY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kmd.json b/data/71/vu_192371/vendor_cheu-bb5kmd.json new file mode 100644 index 0000000000..853dc06871 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kmd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:38-04:00", + "DateNotified": "2019-04-11T10:54:49-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Arch Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KMD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kmf.json b/data/71/vu_192371/vendor_cheu-bb5kmf.json new file mode 100644 index 0000000000..d6a79d2aad --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kmf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:38-04:00", + "DateNotified": "2019-04-11T10:54:50-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Blunk Microsystems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KMF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kmk.json b/data/71/vu_192371/vendor_cheu-bb5kmk.json new file mode 100644 index 0000000000..7dc56629f8 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kmk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:39-04:00", + "DateNotified": "2019-04-11T10:54:50-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Aspera Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KMK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kmn.json b/data/71/vu_192371/vendor_cheu-bb5kmn.json new file mode 100644 index 0000000000..22228294b9 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kmn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:39-04:00", + "DateNotified": "2019-04-11T10:54:50-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Amazon", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KMN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kne.json b/data/71/vu_192371/vendor_cheu-bb5kne.json new file mode 100644 index 0000000000..711d138110 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kne.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:43-04:00", + "DateNotified": "2019-04-11T10:54:58-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "eCosCentric", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KNE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5knl.json b/data/71/vu_192371/vendor_cheu-bb5knl.json new file mode 100644 index 0000000000..18097d75e7 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5knl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:44-04:00", + "DateNotified": "2019-04-11T10:54:58-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GFI Software, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KNL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5knq.json b/data/71/vu_192371/vendor_cheu-bb5knq.json new file mode 100644 index 0000000000..6953021aee --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5knq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:45-04:00", + "DateNotified": "2019-04-11T10:54:58-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Inmarsat", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KNQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5knx.json b/data/71/vu_192371/vendor_cheu-bb5knx.json new file mode 100644 index 0000000000..e5749416e3 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5knx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:46-04:00", + "DateNotified": "2019-04-11T10:54:59-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ENEA", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KNX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kp4.json b/data/71/vu_192371/vendor_cheu-bb5kp4.json new file mode 100644 index 0000000000..6965eb926b --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kp4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:46-04:00", + "DateNotified": "2019-04-11T10:55:00-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "IBM, INC.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KP4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kp7.json b/data/71/vu_192371/vendor_cheu-bb5kp7.json new file mode 100644 index 0000000000..25420b05e6 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kp7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:47-04:00", + "DateNotified": "2019-04-11T10:55:02-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Hewlett Packard Enterprise", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KP7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kpc.json b/data/71/vu_192371/vendor_cheu-bb5kpc.json new file mode 100644 index 0000000000..185d5250f5 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kpc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:48-04:00", + "DateNotified": "2019-04-11T10:55:09-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Oryx Embedded", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KPC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kph.json b/data/71/vu_192371/vendor_cheu-bb5kph.json new file mode 100644 index 0000000000..ecbcfac8f6 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kph.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:48-04:00", + "DateNotified": "2019-04-11T10:55:11-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "LITE-ON Technology Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KPH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kpk.json b/data/71/vu_192371/vendor_cheu-bb5kpk.json new file mode 100644 index 0000000000..221f64aa50 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kpk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:49-04:00", + "DateNotified": "2019-04-11T10:55:11-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OleumTech", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KPK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kps.json b/data/71/vu_192371/vendor_cheu-bb5kps.json new file mode 100644 index 0000000000..62444db9dd --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kps.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:50-04:00", + "DateNotified": "2019-04-11T10:55:22-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Tizen", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KPS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kpu.json b/data/71/vu_192371/vendor_cheu-bb5kpu.json new file mode 100644 index 0000000000..7efac6c72c --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kpu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:50-04:00", + "DateNotified": "2019-04-11T10:55:02-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Gentoo Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KPU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kqd.json b/data/71/vu_192371/vendor_cheu-bb5kqd.json new file mode 100644 index 0000000000..0214ca38f9 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kqd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:53-04:00", + "DateNotified": "2019-04-11T10:55:12-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KQD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kqg.json b/data/71/vu_192371/vendor_cheu-bb5kqg.json new file mode 100644 index 0000000000..3a458a3a05 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kqg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:54-04:00", + "DateNotified": "2019-04-11T10:55:14-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NIKSUN", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KQG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kqm.json b/data/71/vu_192371/vendor_cheu-bb5kqm.json new file mode 100644 index 0000000000..700960f3d4 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kqm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:55-04:00", + "DateNotified": "2019-04-11T10:55:29-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "European Registry for Internet Domains", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KQM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kqr.json b/data/71/vu_192371/vendor_cheu-bb5kqr.json new file mode 100644 index 0000000000..2d99715146 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kqr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:56-04:00", + "DateNotified": "2019-04-11T10:55:30-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Xiaomi", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KQR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kr6.json b/data/71/vu_192371/vendor_cheu-bb5kr6.json new file mode 100644 index 0000000000..6c2ddb9473 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kr6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:58:59-04:00", + "DateNotified": "2019-04-11T10:55:30-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "wolfSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KR6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5krc.json b/data/71/vu_192371/vendor_cheu-bb5krc.json new file mode 100644 index 0000000000..2f1db6335a --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5krc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:01-04:00", + "DateNotified": "2019-04-11T10:55:08-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lancope", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KRC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kre.json b/data/71/vu_192371/vendor_cheu-bb5kre.json new file mode 100644 index 0000000000..f9af70908a --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kre.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:01-04:00", + "DateNotified": "2019-04-11T10:55:08-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OmniTI", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KRE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5krj.json b/data/71/vu_192371/vendor_cheu-bb5krj.json new file mode 100644 index 0000000000..752b92ab73 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5krj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:02-04:00", + "DateNotified": "2019-04-11T10:55:09-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "netsnmpj", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KRJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5krn.json b/data/71/vu_192371/vendor_cheu-bb5krn.json new file mode 100644 index 0000000000..55ca5353e1 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5krn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:03-04:00", + "DateNotified": "2019-04-11T10:55:11-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Medtronic", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KRN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5krs.json b/data/71/vu_192371/vendor_cheu-bb5krs.json new file mode 100644 index 0000000000..0406beba3e --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5krs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:04-04:00", + "DateNotified": "2019-04-11T10:55:10-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "LG Electronics", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KRS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kru.json b/data/71/vu_192371/vendor_cheu-bb5kru.json new file mode 100644 index 0000000000..bcca95c42d --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kru.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:04-04:00", + "DateNotified": "2019-04-11T10:55:12-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Muonics, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KRU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5krw.json b/data/71/vu_192371/vendor_cheu-bb5krw.json new file mode 100644 index 0000000000..2449a3bf3b --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5krw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:05-04:00", + "DateNotified": "2019-04-11T10:55:30-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "WizNET Technology", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KRW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kry.json b/data/71/vu_192371/vendor_cheu-bb5kry.json new file mode 100644 index 0000000000..f015990fc4 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kry.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:05-04:00", + "DateNotified": "2019-04-11T10:55:13-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QNX Software Systems Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KRY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ks3.json b/data/71/vu_192371/vendor_cheu-bb5ks3.json new file mode 100644 index 0000000000..06f31e95db --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ks3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:06-04:00", + "DateNotified": "2019-04-11T10:55:08-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenConnect", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KS3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ks5.json b/data/71/vu_192371/vendor_cheu-bb5ks5.json new file mode 100644 index 0000000000..c89a288925 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ks5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:06-04:00", + "DateNotified": "2019-04-11T10:55:22-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ubiquiti Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KS5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ksb.json b/data/71/vu_192371/vendor_cheu-bb5ksb.json new file mode 100644 index 0000000000..181d42492a --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ksb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:08-04:00", + "DateNotified": "2019-04-11T10:55:20-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TDS Telecom", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KSB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ksj.json b/data/71/vu_192371/vendor_cheu-bb5ksj.json new file mode 100644 index 0000000000..47dba20719 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ksj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:09-04:00", + "DateNotified": "2019-04-11T10:55:23-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SMC Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KSJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ksm.json b/data/71/vu_192371/vendor_cheu-bb5ksm.json new file mode 100644 index 0000000000..3915fa7cbc --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ksm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:10-04:00", + "DateNotified": "2019-04-11T10:55:19-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SmoothWall", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KSM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ksv.json b/data/71/vu_192371/vendor_cheu-bb5ksv.json new file mode 100644 index 0000000000..640119cf6d --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ksv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:12-04:00", + "DateNotified": "2019-04-11T10:55:00-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "JH Software", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KSV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kt3.json b/data/71/vu_192371/vendor_cheu-bb5kt3.json new file mode 100644 index 0000000000..1de63e4711 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kt3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-12T17:31:00-04:00", + "DateNotified": "2019-04-11T10:55:01-04:00", + "DateResponded": "2019-04-12T11:28:27-04:00", + "ID": "VU#192371", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "LANCOM Systems GmbH", + "VendorInformation": "LANCOM products are not affected by this vulnerability because session cookies are not used.", + "VendorRecordID": "CHEU-BB5KT3", + "VendorReferences": "https://www.lancom-systems.com/service-support/instant-help/general-security-information/#c166517", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kt8.json b/data/71/vu_192371/vendor_cheu-bb5kt8.json new file mode 100644 index 0000000000..42fe53ae23 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kt8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:14-04:00", + "DateNotified": "2019-04-11T10:55:01-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Illumos", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KT8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kta.json b/data/71/vu_192371/vendor_cheu-bb5kta.json new file mode 100644 index 0000000000..75081b9123 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kta.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:15-04:00", + "DateNotified": "2019-04-11T10:55:01-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "INTEROP", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KTA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ktd.json b/data/71/vu_192371/vendor_cheu-bb5ktd.json new file mode 100644 index 0000000000..4af96cad65 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ktd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:15-04:00", + "DateNotified": "2019-04-11T10:55:01-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Grandstream", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KTD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ktn.json b/data/71/vu_192371/vendor_cheu-bb5ktn.json new file mode 100644 index 0000000000..949a908842 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ktn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:18-04:00", + "DateNotified": "2019-04-11T10:55:08-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenIndiana", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KTN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ktr.json b/data/71/vu_192371/vendor_cheu-bb5ktr.json new file mode 100644 index 0000000000..0bda6bc3da --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ktr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:18-04:00", + "DateNotified": "2019-04-11T10:55:09-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NetBurner", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KTR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ktt.json b/data/71/vu_192371/vendor_cheu-bb5ktt.json new file mode 100644 index 0000000000..89830abe23 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ktt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:19-04:00", + "DateNotified": "2019-04-11T10:55:09-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Marconi, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KTT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ktv.json b/data/71/vu_192371/vendor_cheu-bb5ktv.json new file mode 100644 index 0000000000..1fff83bac6 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ktv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:19-04:00", + "DateNotified": "2019-04-11T10:55:09-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microsoft Vulnerability Research", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KTV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ku3.json b/data/71/vu_192371/vendor_cheu-bb5ku3.json new file mode 100644 index 0000000000..ad2e08e7d4 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ku3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:21-04:00", + "DateNotified": "2019-04-11T10:55:09-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "LibreSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KU3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ku5.json b/data/71/vu_192371/vendor_cheu-bb5ku5.json new file mode 100644 index 0000000000..c861206a73 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ku5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:21-04:00", + "DateNotified": "2019-04-11T10:55:10-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Oracle Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KU5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5ku8.json b/data/71/vu_192371/vendor_cheu-bb5ku8.json new file mode 100644 index 0000000000..ea4982e25d --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5ku8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:22-04:00", + "DateNotified": "2019-04-11T10:55:10-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Motorola, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KU8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kua.json b/data/71/vu_192371/vendor_cheu-bb5kua.json new file mode 100644 index 0000000000..9f3f7e6497 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kua.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:22-04:00", + "DateNotified": "2019-04-11T10:55:10-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nexenta", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KUA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kud.json b/data/71/vu_192371/vendor_cheu-bb5kud.json new file mode 100644 index 0000000000..afd764defa --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kud.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:23-04:00", + "DateNotified": "2019-04-11T10:55:11-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "PHPIDS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KUD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kuh.json b/data/71/vu_192371/vendor_cheu-bb5kuh.json new file mode 100644 index 0000000000..239680842c --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kuh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:24-04:00", + "DateNotified": "2019-04-11T10:55:12-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lynx Software Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KUH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kuk.json b/data/71/vu_192371/vendor_cheu-bb5kuk.json new file mode 100644 index 0000000000..3808ae8ddc --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kuk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:24-04:00", + "DateNotified": "2019-04-11T10:55:11-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Proxim, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KUK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kum.json b/data/71/vu_192371/vendor_cheu-bb5kum.json new file mode 100644 index 0000000000..5f586d944e --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kum.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:25-04:00", + "DateNotified": "2019-04-11T10:55:11-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nominum", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KUM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kur.json b/data/71/vu_192371/vendor_cheu-bb5kur.json new file mode 100644 index 0000000000..9c1b953957 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kur.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:26-04:00", + "DateNotified": "2019-04-11T10:55:20-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Rocket RTOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KUR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kuu.json b/data/71/vu_192371/vendor_cheu-bb5kuu.json new file mode 100644 index 0000000000..e2faf39cc1 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kuu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:27-04:00", + "DateNotified": "2019-04-11T10:55:20-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Vertical Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KUU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kux.json b/data/71/vu_192371/vendor_cheu-bb5kux.json new file mode 100644 index 0000000000..d423f91462 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kux.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:27-04:00", + "DateNotified": "2019-04-11T10:55:20-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quadros Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KUX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kv2.json b/data/71/vu_192371/vendor_cheu-bb5kv2.json new file mode 100644 index 0000000000..65b1e175f9 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kv2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:27-04:00", + "DateNotified": "2019-04-11T10:55:21-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TCPWave", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KV2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kv8.json b/data/71/vu_192371/vendor_cheu-bb5kv8.json new file mode 100644 index 0000000000..cdc0797e64 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kv8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T10:59:28-04:00", + "DateNotified": "2019-04-11T10:55:22-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sierra Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KV8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kw8.json b/data/71/vu_192371/vendor_cheu-bb5kw8.json new file mode 100644 index 0000000000..4fe3df651a --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kw8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T11:15:26-04:00", + "DateNotified": "2019-04-11T11:09:36-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NAS4Free", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KW8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kwb.json b/data/71/vu_192371/vendor_cheu-bb5kwb.json new file mode 100644 index 0000000000..87c671e5b6 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kwb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T11:15:27-04:00", + "DateNotified": "2019-04-11T11:09:36-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SEIKO EPSON Corp. / Epson America Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KWB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_cheu-bb5kwh.json b/data/71/vu_192371/vendor_cheu-bb5kwh.json new file mode 100644 index 0000000000..18b48b5858 --- /dev/null +++ b/data/71/vu_192371/vendor_cheu-bb5kwh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-11T11:15:28-04:00", + "DateNotified": "2019-04-11T11:09:39-04:00", + "DateResponded": "", + "ID": "VU#192371", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Men & Mice", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB5KWH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/71/vu_192371/vendor_molr-bbcj3y.json b/data/71/vu_192371/vendor_molr-bbcj3y.json new file mode 100644 index 0000000000..341b135799 --- /dev/null +++ b/data/71/vu_192371/vendor_molr-bbcj3y.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-18T15:04:00-04:00", + "DateNotified": "", + "DateResponded": "2019-04-18T07:11:13-04:00", + "ID": "VU#192371", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "Zscaler", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "MOLR-BBCJ3Y", + "VendorReferences": "https://trust.zscaler.com/posts/3401", + "VendorStatement": "Last week, CERT released Vulnerability Note VU#192371 to highlight that authentication and/or session cookies that are stored insecurely in memory and/or log files can be potentially used in a replay attack. The use of hardware fingerprinting, client certificates, and SAML assertions in Zscaler App make it impractical to replay authentication session cookies obtained from memory and use these on another system. In addition, no personal or confidential information is stored in the Zscaler App logs. Zscaler App is not vulnerable to the replay attack as described under Vulnerability Note VU#192371. Validated on Zscaler App v1.5 and earlier versions About Zscaler App The Zscaler App automatically forwards user traffic to the Zscaler cloud and ensures that security and access policies are enforced, regardless of device, location or application. The app automatically determines if a user is looking to access the open internet, a SaaS app or an internal app running in public, private or the datacenter and routes traffic through the appropriate Zscaler security service. The client supports both Zscaler Internet Access (ZIA) as well as Zscaler Private Access (ZPA) by default, allowing teams to combine best in class internet security with zero trust access to internal apps." +} \ No newline at end of file diff --git a/data/71/vu_192371/vu_192371.json b/data/71/vu_192371/vu_192371.json new file mode 100644 index 0000000000..a3593be2cb --- /dev/null +++ b/data/71/vu_192371/vu_192371.json @@ -0,0 +1,72 @@ +{ + "Author": "This document was written by Madison Oliver.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": [ + "CVE-2019-1573", + "CVE-2019-11213" + ], + "CVSS_AccessComplexity": "L", + "CVSS_AccessVector": "L", + "CVSS_Authenication": "S", + "CVSS_AvailabilityImpact": "P", + "CVSS_BaseScore": 5.7, + "CVSS_BaseVector": "AV:L/AC:L/Au:S/C:C/I:P/A:P", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 4.4992315386018, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "POC", + "CVSS_IntegrityImpact": "P", + "CVSS_RemediationLevel": "OF", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 4.5, + "CVSS_TemporalVector": "E:POC/RL:OF/RC:C", + "DateCreated": "2019-01-17T09:08:18-05:00", + "DateFirstPublished": "2019-04-11T09:55:21-04:00", + "DateLastUpdated": "2019-04-24T11:29:00-04:00", + "DatePublic": "2019-04-10T00:00:00", + "Description": "Virtual Private Networks (VPNs) are used to create a secure connection with another network over the internet. Multiple VPN applications store the authentication and/or session cookies insecurely in memory and/or log files. CWE-311: Missing Encryption of Sensitive Data\nThe following products and versions store the cookie insecurely in log files: - CVE-2019-1573: Palo Alto Networks GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS0\n- CVE-2019-11213: Pulse Desktop Client 9.0R2 and earlier and 5.3R6 and earlier; Pulse Connect Secure (for Network Connect customers) 9.0R2 and earlier, 8.3R6 and earlier, and 8.1R13 and earlier The following products and versions store the cookie insecurely in memory: - CVE-2019-1573: Palo Alto Networks GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS0\n- CVE-2019-11213: Pulse Desktop Client 9.0R2 and earlier and 5.3R6 and earlier; Pulse Connect Secure (for Network Connect customers) 9.0R2 and earlier, 8.3R6 and earlier, and 8.1R13 and earlier\n- Cisco AnyConnect 4.7.x and prior It is likely that this configuration is generic to additional VPN applications. If you believe that your organization is vulnerable, please contact CERT/CC at cert@cert.org with the affected products, version numbers, patch information, and self-assigned CVE.", + "ID": "VU#192371", + "IDNumber": "192371", + "IPProtocol": "", + "Impact": "If an attacker has persistent access to a VPN user's endpoint or exfiltrates the cookie using other methods, they can replay the session and bypass other authentication methods. An attacker would then have access to the same applications that the user does through their VPN session.", + "Keywords": [ + "VPN", + "session cookies", + "CVE-2019-1573", + "CVE-2019-11213" + ], + "Overview": "Multiple Virtual Private Network (VPN) applications store the authentication and/or session cookies insecurely in memory and/or log files.", + "References": [ + "https://securityadvisories.paloaltonetworks.com/Home/Detail/146", + "https://vuldb.com/?id.133258", + "https://cwe.mitre.org/data/definitions/311.html", + "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114/", + "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1573" + ], + "Resolution": "Apply an update\nCVE-2019-1573\nPalo Alto Networks GlobalProtect Agent version 4.1.1 and later for Windows and GlobalProtect Agent version 4.1.11 and later for macOS patch this vulnerability. CVE-2019-11213\nUpdate Pulse Secure Desktop Client and Network Connect to the following versions: Desktop Client\n- Pulse Secure Desktop 9.0R3 and above\n- Pulse Secure Desktop 5.3R7 and above\n- Note: For Pulse Desktop Client customer, this is a client-side fix only and does not require a server-side upgrade. Network Connect\n- Pulse Connect Secure 9.0R3 and above\n- Pulse Connect Secure 8.3R7 and above\n- Pulse Connect Secure 8.1R14 and above CERT/CC is unaware of any patches at the time of publishing for Cisco AnyConnect.", + "Revision": 67, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to the National Defense ISAC Remote Access Working Group for reporting this vulnerability.", + "Title": "VPN applications insecurely store session cookies", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/72/vu_974272/vu_974272.json b/data/72/vu_974272/vu_974272.json index a23d6192c2..c41a7e5511 100644 --- a/data/72/vu_974272/vu_974272.json +++ b/data/72/vu_974272/vu_974272.json @@ -34,7 +34,7 @@ "CVSS_TemporalVector": "E:F/RL:OF/RC:ND", "DateCreated": "2018-02-22T13:22:08-05:00", "DateFirstPublished": "2018-04-10T13:17:32-04:00", - "DateLastUpdated": "2018-04-10T13:30:00-04:00", + "DateLastUpdated": "2019-01-10T11:36:00-05:00", "DatePublic": "2018-04-10T00:00:00", "Description": "Microsoft Outlook will automatically retrieve remote OLE content when an RTF email is previewed. When remote OLE content is hosted on a SMB/CIFS server, the Windows client system will attempt to authenticate with the server using single sign-on (SSO). This may leak the user's IP address, domain name, user name, host name, and password hash. If the user's password is not complex enough, then an attacker may be able to crack the password in a short amount of time.", "ID": "VU#974272", @@ -54,8 +54,8 @@ "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0950", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV170014" ], - "Resolution": "Apply and update This vulnerability is addressed in the Microsoft update for CVE-2018-0950. This update prevents Outlook from automatically initiating SMB connections when an RTF email is previewed. Note that other techniques requiring additional user interaction will still function after this patch is installed. For example, if an email contains a UNC link, like \\\\attacker\\foo, Outlook will automatically make this link clickable. If a user clicks such a link, the impact will be the same as with this vulnerability. For this reason, please also consider the following workarounds.", - "Revision": 25, + "Resolution": "Apply an update This vulnerability is addressed in the Microsoft update for CVE-2018-0950. This update prevents Outlook from automatically initiating SMB connections when an RTF email is previewed. Note that other techniques requiring additional user interaction will still function after this patch is installed. For example, if an email contains a UNC link, like \\\\attacker\\foo, Outlook will automatically make this link clickable. If a user clicks such a link, the impact will be the same as with this vulnerability. For this reason, please also consider the following workarounds.", + "Revision": 30, "SystemsAffectedPreamble": "", "ThanksAndCredit": "This vulnerability was reported by Will Dormann of the CERT/CC.", "Title": "Microsoft Outlook retrieves remote OLE content without prompting", diff --git a/data/73/vu_17473/vendor_cheu-b9qkdx.json b/data/73/vu_17473/vendor_cheu-b9qkdx.json new file mode 100644 index 0000000000..c1b867676a --- /dev/null +++ b/data/73/vu_17473/vendor_cheu-b9qkdx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-25T09:49:22-05:00", + "DateNotified": "2019-02-25T09:45:13-05:00", + "DateResponded": "", + "ID": "VU#17473", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ubiquiti Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9QKDX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba3ncy.json b/data/75/vu_871675/vendor_cheu-ba3ncy.json new file mode 100644 index 0000000000..095437c37c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba3ncy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-12T10:20:00-04:00", + "DateNotified": "2019-03-08T12:21:09-05:00", + "DateResponded": "2019-04-09T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Intel", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA3NCY", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mgb.json b/data/75/vu_871675/vendor_cheu-ba6mgb.json new file mode 100644 index 0000000000..c3d85e03d4 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mgb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:39-04:00", + "DateNotified": "2019-03-11T12:29:32-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "A10 Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MGB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mge.json b/data/75/vu_871675/vendor_cheu-ba6mge.json new file mode 100644 index 0000000000..4a576ed183 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mge.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:39-04:00", + "DateNotified": "2019-03-11T12:29:32-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Actelis Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MGE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mgg.json b/data/75/vu_871675/vendor_cheu-ba6mgg.json new file mode 100644 index 0000000000..093309f73c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mgg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:39-04:00", + "DateNotified": "2019-03-11T12:29:32-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Actiontec", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MGG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mgj.json b/data/75/vu_871675/vendor_cheu-ba6mgj.json new file mode 100644 index 0000000000..02740d3cc6 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mgj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:40-04:00", + "DateNotified": "2019-03-11T12:29:33-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ACCESS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MGJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mgq.json b/data/75/vu_871675/vendor_cheu-ba6mgq.json new file mode 100644 index 0000000000..7e70cd3483 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mgq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:41-04:00", + "DateNotified": "2019-03-11T12:29:35-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GNU adns", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MGQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mgs.json b/data/75/vu_871675/vendor_cheu-ba6mgs.json new file mode 100644 index 0000000000..11266dcc36 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mgs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:41-04:00", + "DateNotified": "2019-03-11T12:29:42-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Aspera Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MGS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mgu.json b/data/75/vu_871675/vendor_cheu-ba6mgu.json new file mode 100644 index 0000000000..775b2f9bec --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mgu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:42-04:00", + "DateNotified": "2019-03-11T12:29:42-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Blunk Microsystems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MGU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mgw.json b/data/75/vu_871675/vendor_cheu-ba6mgw.json new file mode 100644 index 0000000000..3dd506f278 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mgw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-15T15:38:00-04:00", + "DateNotified": "2019-03-11T12:29:42-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 1, + "Status": "Unknown", + "Vendor": "Arch Linux", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MGW", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mgy.json b/data/75/vu_871675/vendor_cheu-ba6mgy.json new file mode 100644 index 0000000000..5a897c0f02 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mgy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:42-04:00", + "DateNotified": "2019-03-11T12:29:43-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ADTRAN", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MGY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mh2.json b/data/75/vu_871675/vendor_cheu-ba6mh2.json new file mode 100644 index 0000000000..d882c21738 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mh2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:43-04:00", + "DateNotified": "2019-03-11T12:29:43-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AirWatch", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MH2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mh4.json b/data/75/vu_871675/vendor_cheu-ba6mh4.json new file mode 100644 index 0000000000..31eda2f7a6 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mh4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:43-04:00", + "DateNotified": "2019-03-11T12:29:44-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Alcatel-Lucent Enterprise", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MH4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mh6.json b/data/75/vu_871675/vendor_cheu-ba6mh6.json new file mode 100644 index 0000000000..be7b97cead --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mh6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-05-14T08:09:00-04:00", + "DateNotified": "2019-03-11T12:29:44-04:00", + "DateResponded": "2019-05-13T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Apple", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MH6", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mh8.json b/data/75/vu_871675/vendor_cheu-ba6mh8.json new file mode 100644 index 0000000000..87b83861e1 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mh8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-16T07:14:00-04:00", + "DateNotified": "2019-03-11T12:29:45-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 3, + "Status": "Not Affected", + "Vendor": "AVM GmbH", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MH8", + "VendorReferences": "https://en.avm.de/service/current-security-notifications/", + "VendorStatement": "Please find all AVM security notifications here: https://en.avm.de/service/current-security-notifications/ The FRITZ!Box is not affected by this vulnerability. The recently announced FRITZ!Repeater 3000 is the only AVM product that already supports WPA3. The new WPA3 WiFi standard is not active in the repeater's factory settings. AVM has already released an update for the FRITZ!Repeater 3000 as a Lab version, which addresses the points of the current WPA3 vulnerability. AVM also recommends always choosing a really long, strong network password. The password evaluation in FRITZ!OS helps you find a strong password. AVM strongly recommends deploying the provided updates from manufacturers for all wireless clients, for example notebooks, smart TVs or tablets." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mha.json b/data/75/vu_871675/vendor_cheu-ba6mha.json new file mode 100644 index 0000000000..4e52d7314b --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mha.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:44-04:00", + "DateNotified": "2019-03-11T12:29:45-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BlueCat Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MHA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhc.json b/data/75/vu_871675/vendor_cheu-ba6mhc.json new file mode 100644 index 0000000000..ed6a32a902 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:45-04:00", + "DateNotified": "2019-03-11T12:29:45-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Barracuda Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MHC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhe.json b/data/75/vu_871675/vendor_cheu-ba6mhe.json new file mode 100644 index 0000000000..8b40468700 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhe.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:45-04:00", + "DateNotified": "2019-03-11T12:29:45-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Bell Canada Enterprises", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MHE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhg.json b/data/75/vu_871675/vendor_cheu-ba6mhg.json new file mode 100644 index 0000000000..35a4139608 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:45-04:00", + "DateNotified": "2019-03-11T12:29:45-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Buffalo Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MHG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhj.json b/data/75/vu_871675/vendor_cheu-ba6mhj.json new file mode 100644 index 0000000000..545622507c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:46-04:00", + "DateNotified": "2019-03-11T12:29:46-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AhnLab Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MHJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhl.json b/data/75/vu_871675/vendor_cheu-ba6mhl.json new file mode 100644 index 0000000000..d5ca10bf17 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-03T16:27:00-04:00", + "DateNotified": "2019-03-11T12:29:46-04:00", + "DateResponded": "2019-04-03T00:00:00", + "ID": "VU#871675", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "Belden", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MHL", + "VendorReferences": "None", + "VendorStatement": "to the WPA3 Vulnerability. The OpenSSL." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhn.json b/data/75/vu_871675/vendor_cheu-ba6mhn.json new file mode 100644 index 0000000000..9db66d8100 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-01T09:43:00-04:00", + "DateNotified": "2019-03-11T12:29:51-04:00", + "DateResponded": "2019-03-29T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Affected", + "Vendor": "Broadcom", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MHN", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhq.json b/data/75/vu_871675/vendor_cheu-ba6mhq.json new file mode 100644 index 0000000000..80ac4012be --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:47-04:00", + "DateNotified": "2019-03-11T12:29:53-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Aerohive", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MHQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhs.json b/data/75/vu_871675/vendor_cheu-ba6mhs.json new file mode 100644 index 0000000000..9663a3273e --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-29T12:39:00-04:00", + "DateNotified": "2019-03-11T12:29:54-04:00", + "DateResponded": "2019-04-19T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Aruba Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MHS", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhu.json b/data/75/vu_871675/vendor_cheu-ba6mhu.json new file mode 100644 index 0000000000..b597629d2c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:47-04:00", + "DateNotified": "2019-03-11T12:29:54-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Android Open Source Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MHU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhw.json b/data/75/vu_871675/vendor_cheu-ba6mhw.json new file mode 100644 index 0000000000..b3252820f1 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:48-04:00", + "DateNotified": "2019-03-11T12:29:55-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Alpine Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MHW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mhy.json b/data/75/vu_871675/vendor_cheu-ba6mhy.json new file mode 100644 index 0000000000..5655b8c2e5 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mhy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:48-04:00", + "DateNotified": "2019-03-11T12:29:55-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ANTlabs", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MHY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mj2.json b/data/75/vu_871675/vendor_cheu-ba6mj2.json new file mode 100644 index 0000000000..00c4aab781 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mj2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:48-04:00", + "DateNotified": "2019-03-11T12:29:56-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CA Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MJ2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mj5.json b/data/75/vu_871675/vendor_cheu-ba6mj5.json new file mode 100644 index 0000000000..359640263b --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mj5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:49-04:00", + "DateNotified": "2019-03-11T12:29:57-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Atheros Communications Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MJ5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mj9.json b/data/75/vu_871675/vendor_cheu-ba6mj9.json new file mode 100644 index 0000000000..4cce80d6b6 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mj9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:49-04:00", + "DateNotified": "2019-03-11T12:29:57-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ceragon Networks Inc", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MJ9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mje.json b/data/75/vu_871675/vendor_cheu-ba6mje.json new file mode 100644 index 0000000000..82baab2e3a --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mje.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:50-04:00", + "DateNotified": "2019-03-11T12:29:57-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AT&T", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MJE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mjg.json b/data/75/vu_871675/vendor_cheu-ba6mjg.json new file mode 100644 index 0000000000..a4b44c5f39 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mjg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:51-04:00", + "DateNotified": "2019-03-11T12:29:57-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Avaya, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MJG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mjj.json b/data/75/vu_871675/vendor_cheu-ba6mjj.json new file mode 100644 index 0000000000..febb3e0f64 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mjj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:51-04:00", + "DateNotified": "2019-03-11T12:29:57-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "aep NETWORKS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MJJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mjm.json b/data/75/vu_871675/vendor_cheu-ba6mjm.json new file mode 100644 index 0000000000..546c25bf26 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mjm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:52-04:00", + "DateNotified": "2019-03-11T12:29:58-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Belkin, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MJM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mjp.json b/data/75/vu_871675/vendor_cheu-ba6mjp.json new file mode 100644 index 0000000000..1d000b1f12 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mjp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-18T15:01:00-04:00", + "DateNotified": "2019-03-11T12:29:58-04:00", + "DateResponded": "2019-03-11T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Cambium Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MJP", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mjs.json b/data/75/vu_871675/vendor_cheu-ba6mjs.json new file mode 100644 index 0000000000..620814a669 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mjs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:52-04:00", + "DateNotified": "2019-03-11T12:29:58-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ARRIS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MJS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mju.json b/data/75/vu_871675/vendor_cheu-ba6mju.json new file mode 100644 index 0000000000..f999c1bab1 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mju.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:53-04:00", + "DateNotified": "2019-03-11T12:29:58-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Appgate Network Security", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MJU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mjx.json b/data/75/vu_871675/vendor_cheu-ba6mjx.json new file mode 100644 index 0000000000..22b253ce50 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mjx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-15T09:27:00-04:00", + "DateNotified": "2019-03-11T12:29:59-04:00", + "DateResponded": "2019-03-13T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Arista Networks, Inc.", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MJX", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mjz.json b/data/75/vu_871675/vendor_cheu-ba6mjz.json new file mode 100644 index 0000000000..fb07122091 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mjz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-18T09:39:00-04:00", + "DateNotified": "2019-03-11T12:29:59-04:00", + "DateResponded": "2019-03-12T00:00:00", + "ID": "VU#871675", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "Check Point Software Technologies", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MJZ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mk5.json b/data/75/vu_871675/vendor_cheu-ba6mk5.json new file mode 100644 index 0000000000..18e1ec3f58 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mk5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:54-04:00", + "DateNotified": "2019-03-11T12:29:59-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "AsusTek Computer Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MK5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mk8.json b/data/75/vu_871675/vendor_cheu-ba6mk8.json new file mode 100644 index 0000000000..1e0123e3fc --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mk8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-27T10:11:00-04:00", + "DateNotified": "2019-03-11T12:29:59-04:00", + "DateResponded": "2019-03-13T00:00:00", + "ID": "VU#871675", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "BlackBerry", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MK8", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mkb.json b/data/75/vu_871675/vendor_cheu-ba6mkb.json new file mode 100644 index 0000000000..3ec01714a4 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mkb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:55-04:00", + "DateNotified": "2019-03-11T12:30:00-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Blue Coat Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MKB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mkd.json b/data/75/vu_871675/vendor_cheu-ba6mkd.json new file mode 100644 index 0000000000..9dc5be21d7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mkd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:35:56-04:00", + "DateNotified": "2019-03-11T12:30:01-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Amazon", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MKD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mkt.json b/data/75/vu_871675/vendor_cheu-ba6mkt.json new file mode 100644 index 0000000000..4f679bc0d1 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mkt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-12T09:14:00-04:00", + "DateNotified": "2019-03-11T12:30:06-04:00", + "DateResponded": "2019-04-10T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Brocade Communication Systems", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MKT", + "VendorReferences": "None", + "VendorStatement": "Brocade statement related to VU#871675 Not Affected. No Brocade Fibre Channel technology products from Broadcom are currently known to be affected by these vulnerabilities. We will provide the link to Brocade Security Advisory once the issue is public. Thank you. Regards. Brocade Security." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6ml3.json b/data/75/vu_871675/vendor_cheu-ba6ml3.json new file mode 100644 index 0000000000..1722b529b7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6ml3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:00-04:00", + "DateNotified": "2019-03-11T12:30:13-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cirpack", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6ML3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6ml6.json b/data/75/vu_871675/vendor_cheu-ba6ml6.json new file mode 100644 index 0000000000..6bbcffa6df --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6ml6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:00-04:00", + "DateNotified": "2019-03-11T12:30:15-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Akamai Technologies, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6ML6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6ml9.json b/data/75/vu_871675/vendor_cheu-ba6ml9.json new file mode 100644 index 0000000000..97f6a6cd16 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6ml9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:01-04:00", + "DateNotified": "2019-03-11T12:30:28-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GFI Software, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6ML9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mlb.json b/data/75/vu_871675/vendor_cheu-ba6mlb.json new file mode 100644 index 0000000000..38544153a9 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mlb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:01-04:00", + "DateNotified": "2019-03-11T12:30:29-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CMX Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MLB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mld.json b/data/75/vu_871675/vendor_cheu-ba6mld.json new file mode 100644 index 0000000000..798ed6bcef --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mld.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:02-04:00", + "DateNotified": "2019-03-11T12:30:33-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cricket Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MLD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mlf.json b/data/75/vu_871675/vendor_cheu-ba6mlf.json new file mode 100644 index 0000000000..6a5db01908 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mlf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:02-04:00", + "DateNotified": "2019-03-11T12:30:33-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SEIKO EPSON Corp. / Epson America Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MLF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mlh.json b/data/75/vu_871675/vendor_cheu-ba6mlh.json new file mode 100644 index 0000000000..98442a5a26 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mlh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:02-04:00", + "DateNotified": "2019-03-11T12:30:34-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "EfficientIP SAS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MLH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mll.json b/data/75/vu_871675/vendor_cheu-ba6mll.json new file mode 100644 index 0000000000..336e95ed46 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mll.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:03-04:00", + "DateNotified": "2019-03-11T12:30:34-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "InfoExpress, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MLL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mln.json b/data/75/vu_871675/vendor_cheu-ba6mln.json new file mode 100644 index 0000000000..79daae70db --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mln.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:03-04:00", + "DateNotified": "2019-03-11T12:30:34-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Geexbox", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MLN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mlq.json b/data/75/vu_871675/vendor_cheu-ba6mlq.json new file mode 100644 index 0000000000..b7eabccef6 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mlq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:03-04:00", + "DateNotified": "2019-03-11T12:30:34-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ericsson", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MLQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mls.json b/data/75/vu_871675/vendor_cheu-ba6mls.json new file mode 100644 index 0000000000..89e2403bba --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mls.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:04-04:00", + "DateNotified": "2019-03-11T12:30:35-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "eCosCentric", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MLS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mlu.json b/data/75/vu_871675/vendor_cheu-ba6mlu.json new file mode 100644 index 0000000000..d112bc2a7d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mlu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:04-04:00", + "DateNotified": "2019-03-11T12:30:35-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "INTEROP", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MLU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mlw.json b/data/75/vu_871675/vendor_cheu-ba6mlw.json new file mode 100644 index 0000000000..466888b313 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mlw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:04-04:00", + "DateNotified": "2019-03-11T12:30:35-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fedora Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MLW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mly.json b/data/75/vu_871675/vendor_cheu-ba6mly.json new file mode 100644 index 0000000000..d404b45e84 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mly.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-27T10:09:00-04:00", + "DateNotified": "2019-03-11T12:30:35-04:00", + "DateResponded": "2019-03-26T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Dell", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MLY", + "VendorReferences": "None", + "VendorStatement": "Not affected on the SERVER side. Waiting for a response from Microsoft to determine if there are issues with the OS.." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mm3.json b/data/75/vu_871675/vendor_cheu-ba6mm3.json new file mode 100644 index 0000000000..b842c6b51d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mm3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:05-04:00", + "DateNotified": "2019-03-11T12:30:36-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "eero", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MM3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mm5.json b/data/75/vu_871675/vendor_cheu-ba6mm5.json new file mode 100644 index 0000000000..c917729bc4 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mm5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:06-04:00", + "DateNotified": "2019-03-11T12:30:36-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Express Logic", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MM5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mm7.json b/data/75/vu_871675/vendor_cheu-ba6mm7.json new file mode 100644 index 0000000000..106da8d271 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mm7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:06-04:00", + "DateNotified": "2019-03-11T12:30:36-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell EMC", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MM7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mm9.json b/data/75/vu_871675/vendor_cheu-ba6mm9.json new file mode 100644 index 0000000000..0167ea3146 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mm9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:06-04:00", + "DateNotified": "2019-03-11T12:30:36-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ENEA", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MM9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmb.json b/data/75/vu_871675/vendor_cheu-ba6mmb.json new file mode 100644 index 0000000000..b702bfafb7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:07-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Hitachi", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MMB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmd.json b/data/75/vu_871675/vendor_cheu-ba6mmd.json new file mode 100644 index 0000000000..8fe8c24b73 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-18T09:47:00-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "2019-03-16T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "FreeBSD Project", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MMD", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmf.json b/data/75/vu_871675/vendor_cheu-ba6mmf.json new file mode 100644 index 0000000000..f50e34e0ca --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:07-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Deutsche Telekom", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MMF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmh.json b/data/75/vu_871675/vendor_cheu-ba6mmh.json new file mode 100644 index 0000000000..dffe6f612e --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:08-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Espressif Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MMH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmk.json b/data/75/vu_871675/vendor_cheu-ba6mmk.json new file mode 100644 index 0000000000..9c361a1e9a --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:08-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Force10 Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MMK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmm.json b/data/75/vu_871675/vendor_cheu-ba6mmm.json new file mode 100644 index 0000000000..eb7cd24820 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-26T14:40:00-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "2019-03-26T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "HP Inc.", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MMM", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmp.json b/data/75/vu_871675/vendor_cheu-ba6mmp.json new file mode 100644 index 0000000000..4d6ca8131b --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:09-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "GNU glibc", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MMP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmr.json b/data/75/vu_871675/vendor_cheu-ba6mmr.json new file mode 100644 index 0000000000..252d322e06 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:09-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lynx Software Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MMR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmt.json b/data/75/vu_871675/vendor_cheu-ba6mmt.json new file mode 100644 index 0000000000..1a48608b33 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-15T09:19:00-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "2019-03-14T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Juniper Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MMT", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmv.json b/data/75/vu_871675/vendor_cheu-ba6mmv.json new file mode 100644 index 0000000000..d84c302cad --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:10-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Grandstream", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MMV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mmy.json b/data/75/vu_871675/vendor_cheu-ba6mmy.json new file mode 100644 index 0000000000..39f692cb25 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mmy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:10-04:00", + "DateNotified": "2019-03-11T12:30:37-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Honeywell", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MMY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mn5.json b/data/75/vu_871675/vendor_cheu-ba6mn5.json new file mode 100644 index 0000000000..4e0c1e4dda --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mn5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:12-04:00", + "DateNotified": "2019-03-11T12:31:04-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Mobile", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MN5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mn7.json b/data/75/vu_871675/vendor_cheu-ba6mn7.json new file mode 100644 index 0000000000..67fab23955 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mn7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:12-04:00", + "DateNotified": "2019-03-11T12:31:06-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Riverbed Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MN7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mn9.json b/data/75/vu_871675/vendor_cheu-ba6mn9.json new file mode 100644 index 0000000000..82b8c52d90 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mn9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:12-04:00", + "DateNotified": "2019-03-11T12:31:03-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Secure64 Software Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MN9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mnb.json b/data/75/vu_871675/vendor_cheu-ba6mnb.json new file mode 100644 index 0000000000..ca8fac4131 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mnb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:13-04:00", + "DateNotified": "2019-03-11T12:30:46-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Systems Consortium - DHCP", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MNB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mnd.json b/data/75/vu_871675/vendor_cheu-ba6mnd.json new file mode 100644 index 0000000000..c4629a1ca7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mnd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:13-04:00", + "DateNotified": "2019-03-11T12:30:59-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quadros Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MND", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mng.json b/data/75/vu_871675/vendor_cheu-ba6mng.json new file mode 100644 index 0000000000..ef3737ee8a --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mng.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:13-04:00", + "DateNotified": "2019-03-11T12:31:09-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NETSCOUT", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MNG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mnj.json b/data/75/vu_871675/vendor_cheu-ba6mnj.json new file mode 100644 index 0000000000..431c043847 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mnj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:14-04:00", + "DateNotified": "2019-03-11T12:31:06-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "PowerDNS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MNJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mnm.json b/data/75/vu_871675/vendor_cheu-ba6mnm.json new file mode 100644 index 0000000000..33dcf2dbe9 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mnm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:14-04:00", + "DateNotified": "2019-03-11T12:31:02-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Micro Focus", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MNM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mnp.json b/data/75/vu_871675/vendor_cheu-ba6mnp.json new file mode 100644 index 0000000000..a998d7efc0 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mnp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:15-04:00", + "DateNotified": "2019-03-11T12:31:11-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nominum", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MNP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mns.json b/data/75/vu_871675/vendor_cheu-ba6mns.json new file mode 100644 index 0000000000..3c9623bdbe --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mns.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:15-04:00", + "DateNotified": "2019-03-11T12:31:11-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microchip Technology", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MNS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mnu.json b/data/75/vu_871675/vendor_cheu-ba6mnu.json new file mode 100644 index 0000000000..0a319f17b9 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mnu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:15-04:00", + "DateNotified": "2019-03-11T12:31:03-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Roku", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MNU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mny.json b/data/75/vu_871675/vendor_cheu-ba6mny.json new file mode 100644 index 0000000000..4e45315929 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mny.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:16-04:00", + "DateNotified": "2019-03-11T12:31:11-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Snort", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MNY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mp2.json b/data/75/vu_871675/vendor_cheu-ba6mp2.json new file mode 100644 index 0000000000..2ba1f4c046 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mp2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:16-04:00", + "DateNotified": "2019-03-11T12:31:11-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nokia", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MP2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mpa.json b/data/75/vu_871675/vendor_cheu-ba6mpa.json new file mode 100644 index 0000000000..b38a7a5161 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mpa.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:18-04:00", + "DateNotified": "2019-03-11T12:31:10-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sony Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MPA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mpf.json b/data/75/vu_871675/vendor_cheu-ba6mpf.json new file mode 100644 index 0000000000..2d5eb26a71 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mpf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:19-04:00", + "DateNotified": "2019-03-11T12:31:36-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Motorola, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MPF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mpj.json b/data/75/vu_871675/vendor_cheu-ba6mpj.json new file mode 100644 index 0000000000..2760eff271 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mpj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:19-04:00", + "DateNotified": "2019-03-11T12:30:55-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Proxim, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MPJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mpl.json b/data/75/vu_871675/vendor_cheu-ba6mpl.json new file mode 100644 index 0000000000..d364b33130 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mpl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:20-04:00", + "DateNotified": "2019-03-11T12:31:00-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MetaSwitch", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MPL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mpq.json b/data/75/vu_871675/vendor_cheu-ba6mpq.json new file mode 100644 index 0000000000..e17e6fc6c6 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mpq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:21-04:00", + "DateNotified": "2019-03-11T12:31:11-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Paessler", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MPQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mpv.json b/data/75/vu_871675/vendor_cheu-ba6mpv.json new file mode 100644 index 0000000000..dd60ead81c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mpv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:21-04:00", + "DateNotified": "2019-03-11T12:30:59-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Symantec", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MPV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mpx.json b/data/75/vu_871675/vendor_cheu-ba6mpx.json new file mode 100644 index 0000000000..458e4baea2 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mpx.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:22-04:00", + "DateNotified": "2019-03-11T12:31:17-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "McAfee", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MPX", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mpz.json b/data/75/vu_871675/vendor_cheu-ba6mpz.json new file mode 100644 index 0000000000..03ed1cac9c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mpz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:22-04:00", + "DateNotified": "2019-03-11T12:31:09-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quagga", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MPZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mq4.json b/data/75/vu_871675/vendor_cheu-ba6mq4.json new file mode 100644 index 0000000000..1009956242 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mq4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-20T09:52:00-04:00", + "DateNotified": "2019-03-11T12:31:56-04:00", + "DateResponded": "2019-03-20T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "VMware", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MQ4", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mq7.json b/data/75/vu_871675/vendor_cheu-ba6mq7.json new file mode 100644 index 0000000000..d731798a14 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mq7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:23-04:00", + "DateNotified": "2019-03-11T12:31:40-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SafeNet", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MQ7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mqc.json b/data/75/vu_871675/vendor_cheu-ba6mqc.json new file mode 100644 index 0000000000..602140d5b4 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mqc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:24-04:00", + "DateNotified": "2019-03-11T12:31:57-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Turbolinux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MQC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mqj.json b/data/75/vu_871675/vendor_cheu-ba6mqj.json new file mode 100644 index 0000000000..e6e36f72f7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mqj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:25-04:00", + "DateNotified": "2019-03-11T12:31:19-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Peplink", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MQJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mqp.json b/data/75/vu_871675/vendor_cheu-ba6mqp.json new file mode 100644 index 0000000000..a14e3fda33 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mqp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:26-04:00", + "DateNotified": "2019-03-11T12:30:39-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Inmarsat", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MQP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mqv.json b/data/75/vu_871675/vendor_cheu-ba6mqv.json new file mode 100644 index 0000000000..7987856b01 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mqv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:27-04:00", + "DateNotified": "2019-03-11T12:31:31-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Tizen", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MQV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mqy.json b/data/75/vu_871675/vendor_cheu-ba6mqy.json new file mode 100644 index 0000000000..206b190e3f --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mqy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:28-04:00", + "DateNotified": "2019-03-11T12:30:43-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Command Software Systems", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MQY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mr2.json b/data/75/vu_871675/vendor_cheu-ba6mr2.json new file mode 100644 index 0000000000..1840bc036c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mr2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:28-04:00", + "DateNotified": "2019-03-11T12:30:44-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lantronix", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MR2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mr5.json b/data/75/vu_871675/vendor_cheu-ba6mr5.json new file mode 100644 index 0000000000..da79445954 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mr5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-18T15:42:00-04:00", + "DateNotified": "2019-03-11T12:30:44-04:00", + "DateResponded": "2019-03-11T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Cisco", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MR5", + "VendorReferences": "None", + "VendorStatement": "\u201cWe are aware of the vulnerabilities and confirmed no Cisco products are impacted. Cisco is engaged with the appropriate groups to address the concerns in future products.\u201d" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mr7.json b/data/75/vu_871675/vendor_cheu-ba6mr7.json new file mode 100644 index 0000000000..4d408c4abd --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mr7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:29-04:00", + "DateNotified": "2019-03-11T12:30:44-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Joyent", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MR7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mr9.json b/data/75/vu_871675/vendor_cheu-ba6mr9.json new file mode 100644 index 0000000000..9f547a8469 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mr9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:29-04:00", + "DateNotified": "2019-03-11T12:30:44-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Internet Systems Consortium", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MR9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mrg.json b/data/75/vu_871675/vendor_cheu-ba6mrg.json new file mode 100644 index 0000000000..9c2420f683 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mrg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:31-04:00", + "DateNotified": "2019-03-11T12:31:45-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ubiquiti Networks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MRG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mrj.json b/data/75/vu_871675/vendor_cheu-ba6mrj.json new file mode 100644 index 0000000000..f7938fa7cf --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mrj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:31-04:00", + "DateNotified": "2019-03-11T12:30:53-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Hewlett Packard Enterprise", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MRJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mrm.json b/data/75/vu_871675/vendor_cheu-ba6mrm.json new file mode 100644 index 0000000000..5e3a33bd46 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mrm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:31-04:00", + "DateNotified": "2019-03-11T12:30:58-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "m0n0wall", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MRM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mrp.json b/data/75/vu_871675/vendor_cheu-ba6mrp.json new file mode 100644 index 0000000000..bcea750666 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mrp.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:32-04:00", + "DateNotified": "2019-03-11T12:30:58-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenIndiana", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MRP", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mrr.json b/data/75/vu_871675/vendor_cheu-ba6mrr.json new file mode 100644 index 0000000000..66d22d380d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mrr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-29T12:43:00-04:00", + "DateNotified": "2019-03-11T12:30:58-04:00", + "DateResponded": "2019-04-22T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Lenovo", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MRR", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mrt.json b/data/75/vu_871675/vendor_cheu-ba6mrt.json new file mode 100644 index 0000000000..16e438e435 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mrt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-11T16:17:00-04:00", + "DateNotified": "2019-03-11T12:30:38-04:00", + "DateResponded": "2019-03-11T14:26:41-04:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "CoreOS", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MRT", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mrw.json b/data/75/vu_871675/vendor_cheu-ba6mrw.json new file mode 100644 index 0000000000..e184318804 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mrw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:33-04:00", + "DateNotified": "2019-03-11T12:31:11-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Red Hat, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MRW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mrz.json b/data/75/vu_871675/vendor_cheu-ba6mrz.json new file mode 100644 index 0000000000..d8c0ac1f11 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mrz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:33-04:00", + "DateNotified": "2019-03-11T12:31:09-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Samsung Semiconductor Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MRZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6ms3.json b/data/75/vu_871675/vendor_cheu-ba6ms3.json new file mode 100644 index 0000000000..1aeaa41c62 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6ms3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:34-04:00", + "DateNotified": "2019-03-11T12:31:03-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Oryx Embedded", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MS3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6ms5.json b/data/75/vu_871675/vendor_cheu-ba6ms5.json new file mode 100644 index 0000000000..f593587000 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6ms5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:34-04:00", + "DateNotified": "2019-03-11T12:31:03-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NLnet Labs", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MS5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6ms9.json b/data/75/vu_871675/vendor_cheu-ba6ms9.json new file mode 100644 index 0000000000..ca6b565992 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6ms9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-18T14:12:00-04:00", + "DateNotified": "2019-03-11T12:31:15-04:00", + "DateResponded": "2019-03-13T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Palo Alto Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MS9", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6msb.json b/data/75/vu_871675/vendor_cheu-ba6msb.json new file mode 100644 index 0000000000..a2063ad05c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6msb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:35-04:00", + "DateNotified": "2019-03-11T12:31:15-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Marconi, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MSB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mse.json b/data/75/vu_871675/vendor_cheu-ba6mse.json new file mode 100644 index 0000000000..bdb598f2a4 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mse.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:36-04:00", + "DateNotified": "2019-03-11T12:31:11-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Technicolor", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MSE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6msg.json b/data/75/vu_871675/vendor_cheu-ba6msg.json new file mode 100644 index 0000000000..61155debc6 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6msg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:36-04:00", + "DateNotified": "2019-03-11T12:31:16-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QLogic", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MSG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6msm.json b/data/75/vu_871675/vendor_cheu-ba6msm.json new file mode 100644 index 0000000000..19c8aa6a8c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6msm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:36:37-04:00", + "DateNotified": "2019-03-11T12:31:32-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Toshiba Commerce Solutions", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MSM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mw6.json b/data/75/vu_871675/vendor_cheu-ba6mw6.json new file mode 100644 index 0000000000..2d0409fe01 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mw6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:39-04:00", + "DateNotified": "2019-03-11T12:54:27-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Microsoft Vulnerability Research", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MW6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mw8.json b/data/75/vu_871675/vendor_cheu-ba6mw8.json new file mode 100644 index 0000000000..71bb5926f6 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mw8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:40-04:00", + "DateNotified": "2019-03-11T12:54:27-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NAS4Free", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MW8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwa.json b/data/75/vu_871675/vendor_cheu-ba6mwa.json new file mode 100644 index 0000000000..3f5fb02a12 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwa.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:41-04:00", + "DateNotified": "2019-03-11T12:54:28-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lancope", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwc.json b/data/75/vu_871675/vendor_cheu-ba6mwc.json new file mode 100644 index 0000000000..14364109af --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:41-04:00", + "DateNotified": "2019-03-11T12:54:29-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "PHPIDS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwe.json b/data/75/vu_871675/vendor_cheu-ba6mwe.json new file mode 100644 index 0000000000..3b052dc96d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwe.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:41-04:00", + "DateNotified": "2019-03-11T12:54:29-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NetBurner", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwg.json b/data/75/vu_871675/vendor_cheu-ba6mwg.json new file mode 100644 index 0000000000..ff95f7bffb --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:42-04:00", + "DateNotified": "2019-03-11T12:54:30-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SMC Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwj.json b/data/75/vu_871675/vendor_cheu-ba6mwj.json new file mode 100644 index 0000000000..80473a7586 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:42-04:00", + "DateNotified": "2019-03-11T12:54:31-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "JH Software", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWJ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwl.json b/data/75/vu_871675/vendor_cheu-ba6mwl.json new file mode 100644 index 0000000000..0b57806ae8 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:42-04:00", + "DateNotified": "2019-03-11T12:54:32-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OleumTech", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwn.json b/data/75/vu_871675/vendor_cheu-ba6mwn.json new file mode 100644 index 0000000000..1a5ec58ad4 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:43-04:00", + "DateNotified": "2019-03-11T12:54:32-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Xiaomi", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwr.json b/data/75/vu_871675/vendor_cheu-ba6mwr.json new file mode 100644 index 0000000000..1aeab71705 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwr.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:43-04:00", + "DateNotified": "2019-03-11T12:54:33-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Contiki OS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWR", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwt.json b/data/75/vu_871675/vendor_cheu-ba6mwt.json new file mode 100644 index 0000000000..cfc7a0e8d5 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwt.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:44-04:00", + "DateNotified": "2019-03-11T12:54:34-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QNX Software Systems Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWT", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwv.json b/data/75/vu_871675/vendor_cheu-ba6mwv.json new file mode 100644 index 0000000000..bd67247913 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:44-04:00", + "DateNotified": "2019-03-11T12:54:34-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Men & Mice", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWV", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mwy.json b/data/75/vu_871675/vendor_cheu-ba6mwy.json new file mode 100644 index 0000000000..14039d04d6 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mwy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:44-04:00", + "DateNotified": "2019-03-11T12:54:35-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "WizNET Technology", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MWY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mx2.json b/data/75/vu_871675/vendor_cheu-ba6mx2.json new file mode 100644 index 0000000000..443dab710b --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mx2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:45-04:00", + "DateNotified": "2019-03-11T12:54:36-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TCPWave", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MX2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mx9.json b/data/75/vu_871675/vendor_cheu-ba6mx9.json new file mode 100644 index 0000000000..3739dd8cdc --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mx9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:46-04:00", + "DateNotified": "2019-03-11T12:54:59-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Mitel Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MX9", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxb.json b/data/75/vu_871675/vendor_cheu-ba6mxb.json new file mode 100644 index 0000000000..816a3a030e --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:47-04:00", + "DateNotified": "2019-03-11T12:55:00-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fastly", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MXB", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxd.json b/data/75/vu_871675/vendor_cheu-ba6mxd.json new file mode 100644 index 0000000000..bce7b17d08 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-20T09:07:00-04:00", + "DateNotified": "2019-03-11T12:55:01-04:00", + "DateResponded": "2019-03-19T02:18:46-04:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "HTC", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MXD", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxf.json b/data/75/vu_871675/vendor_cheu-ba6mxf.json new file mode 100644 index 0000000000..2b216fab5b --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxf.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:47-04:00", + "DateNotified": "2019-03-11T12:55:01-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TP-LINK", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MXF", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxh.json b/data/75/vu_871675/vendor_cheu-ba6mxh.json new file mode 100644 index 0000000000..a994e5155d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:48-04:00", + "DateNotified": "2019-03-11T12:55:02-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Netgear, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MXH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxk.json b/data/75/vu_871675/vendor_cheu-ba6mxk.json new file mode 100644 index 0000000000..e7a381ff83 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-11T16:20:00-04:00", + "DateNotified": "2019-03-11T12:55:05-04:00", + "DateResponded": "2019-03-11T13:26:52-04:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Openwall GNU/*/Linux", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MXK", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxn.json b/data/75/vu_871675/vendor_cheu-ba6mxn.json new file mode 100644 index 0000000000..c59cd3a086 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:49-04:00", + "DateNotified": "2019-03-11T12:55:06-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Foundry Brocade", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MXN", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxq.json b/data/75/vu_871675/vendor_cheu-ba6mxq.json new file mode 100644 index 0000000000..ae817106ca --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:49-04:00", + "DateNotified": "2019-03-11T12:55:07-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sonos", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MXQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxs.json b/data/75/vu_871675/vendor_cheu-ba6mxs.json new file mode 100644 index 0000000000..b4e684c4a6 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:49-04:00", + "DateNotified": "2019-03-11T12:55:10-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Zebra Technologies", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MXS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxu.json b/data/75/vu_871675/vendor_cheu-ba6mxu.json new file mode 100644 index 0000000000..01d81096de --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:50-04:00", + "DateNotified": "2019-03-11T12:55:11-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Quantenna Communications", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MXU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxw.json b/data/75/vu_871675/vendor_cheu-ba6mxw.json new file mode 100644 index 0000000000..6ef9b93386 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:50-04:00", + "DateNotified": "2019-03-11T12:55:12-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NEC Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MXW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mxy.json b/data/75/vu_871675/vendor_cheu-ba6mxy.json new file mode 100644 index 0000000000..b40df3900d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mxy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:51-04:00", + "DateNotified": "2019-03-11T12:55:12-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Slackware Linux Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MXY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6my2.json b/data/75/vu_871675/vendor_cheu-ba6my2.json new file mode 100644 index 0000000000..71423ea6eb --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6my2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:51-04:00", + "DateNotified": "2019-03-11T12:55:14-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ruckus Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MY2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6my4.json b/data/75/vu_871675/vendor_cheu-ba6my4.json new file mode 100644 index 0000000000..450cea2cf9 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6my4.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:51-04:00", + "DateNotified": "2019-03-11T12:55:16-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SmoothWall", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MY4", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6my6.json b/data/75/vu_871675/vendor_cheu-ba6my6.json new file mode 100644 index 0000000000..b42488a263 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6my6.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:52-04:00", + "DateNotified": "2019-03-11T12:55:16-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Unisys", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MY6", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6my8.json b/data/75/vu_871675/vendor_cheu-ba6my8.json new file mode 100644 index 0000000000..2e1edbbc3c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6my8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:52-04:00", + "DateNotified": "2019-03-11T12:55:17-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Philips Electronics", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MY8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mya.json b/data/75/vu_871675/vendor_cheu-ba6mya.json new file mode 100644 index 0000000000..4c28f6ab88 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mya.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:52-04:00", + "DateNotified": "2019-03-11T12:55:21-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Medtronic", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MYA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6myc.json b/data/75/vu_871675/vendor_cheu-ba6myc.json new file mode 100644 index 0000000000..bb364bcba3 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6myc.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:53-04:00", + "DateNotified": "2019-03-11T12:55:21-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TrueOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MYC", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mye.json b/data/75/vu_871675/vendor_cheu-ba6mye.json new file mode 100644 index 0000000000..8b9c3ba5f8 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mye.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:53-04:00", + "DateNotified": "2019-03-11T12:55:22-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Devicescape", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MYE", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6myg.json b/data/75/vu_871675/vendor_cheu-ba6myg.json new file mode 100644 index 0000000000..ea7351eb7a --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6myg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:53-04:00", + "DateNotified": "2019-03-11T12:55:24-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Marvell Semiconductors", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MYG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6myj.json b/data/75/vu_871675/vendor_cheu-ba6myj.json new file mode 100644 index 0000000000..975b86a1e7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6myj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-18T14:07:00-04:00", + "DateNotified": "2019-03-11T12:55:25-04:00", + "DateResponded": "2019-03-14T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Huawei Technologies", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MYJ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6myl.json b/data/75/vu_871675/vendor_cheu-ba6myl.json new file mode 100644 index 0000000000..8b8fdcb742 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6myl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:54-04:00", + "DateNotified": "2019-03-11T12:55:26-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Xilinx", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MYL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6myn.json b/data/75/vu_871675/vendor_cheu-ba6myn.json new file mode 100644 index 0000000000..8239f23f21 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6myn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-08T17:15:00-04:00", + "DateNotified": "2019-03-11T12:55:26-04:00", + "DateResponded": "2019-04-08T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Extreme Networks", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MYN", + "VendorReferences": "None", + "VendorStatement": "Hello, We have determined that wireless products from Extreme Networks, Inc. are\nnot vulnerable to the WPA3 vulnerabilities described in VU#871675 since we\ndon't yet support WPA3. Going forward, once we release WPA3 support, we\nare investigating patches for these vulnerabilities prior to product release. Thanks, PSIRT Team\nExtreme Networks, Inc." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6myq.json b/data/75/vu_871675/vendor_cheu-ba6myq.json new file mode 100644 index 0000000000..07d183898e --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6myq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:55-04:00", + "DateNotified": "2019-03-11T12:55:27-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "netsnmp", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MYQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mys.json b/data/75/vu_871675/vendor_cheu-ba6mys.json new file mode 100644 index 0000000000..1db8589ee7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mys.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:55-04:00", + "DateNotified": "2019-03-11T12:55:28-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Linksys", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MYS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6myu.json b/data/75/vu_871675/vendor_cheu-ba6myu.json new file mode 100644 index 0000000000..91e4a24b88 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6myu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:56-04:00", + "DateNotified": "2019-03-11T12:55:31-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "European Registry for Internet Domains", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MYU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6myw.json b/data/75/vu_871675/vendor_cheu-ba6myw.json new file mode 100644 index 0000000000..e135960d72 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6myw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:56-04:00", + "DateNotified": "2019-03-11T12:55:32-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SonicWall", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MYW", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6myz.json b/data/75/vu_871675/vendor_cheu-ba6myz.json new file mode 100644 index 0000000000..6d12edec12 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6myz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:56-04:00", + "DateNotified": "2019-03-11T12:55:35-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenDNS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MYZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mz3.json b/data/75/vu_871675/vendor_cheu-ba6mz3.json new file mode 100644 index 0000000000..9f1bc1fc33 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mz3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:57-04:00", + "DateNotified": "2019-03-11T12:55:36-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Illumos", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MZ3", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mz5.json b/data/75/vu_871675/vendor_cheu-ba6mz5.json new file mode 100644 index 0000000000..65f21f0232 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mz5.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:57-04:00", + "DateNotified": "2019-03-11T12:55:37-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "F5 Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MZ5", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mz7.json b/data/75/vu_871675/vendor_cheu-ba6mz7.json new file mode 100644 index 0000000000..102d28721f --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mz7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:57-04:00", + "DateNotified": "2019-03-11T12:55:37-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Interniche Technologies, inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MZ7", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mz9.json b/data/75/vu_871675/vendor_cheu-ba6mz9.json new file mode 100644 index 0000000000..3b9957f882 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mz9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-15T13:29:00-04:00", + "DateNotified": "2019-03-11T12:55:38-04:00", + "DateResponded": "2019-03-13T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "F-Secure Corporation", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MZ9", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzb.json b/data/75/vu_871675/vendor_cheu-ba6mzb.json new file mode 100644 index 0000000000..80feb02b93 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-01T15:43:00-04:00", + "DateNotified": "2019-03-11T12:55:00-04:00", + "DateResponded": "2019-04-01T15:07:45-04:00", + "ID": "VU#871675", + "Revision": 3, + "Status": "Not Affected", + "Vendor": "Microsoft", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MZB", + "VendorReferences": "None", + "VendorStatement": "Microsoft's current products do not support the WPA-3 standard and are not vulnerable to this disclosure." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzd.json b/data/75/vu_871675/vendor_cheu-ba6mzd.json new file mode 100644 index 0000000000..70a0afee2d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:59-04:00", + "DateNotified": "2019-03-11T12:55:42-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Cradlepoint", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MZD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzg.json b/data/75/vu_871675/vendor_cheu-ba6mzg.json new file mode 100644 index 0000000000..00338ca17f --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:57:59-04:00", + "DateNotified": "2019-03-11T12:55:45-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "SUSE Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MZG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzj.json b/data/75/vu_871675/vendor_cheu-ba6mzj.json new file mode 100644 index 0000000000..7f17f6fb5d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzj.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-12T08:50:00-04:00", + "DateNotified": "2019-03-11T12:55:46-04:00", + "DateResponded": "2019-04-11T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Pulse Secure", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MZJ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzl.json b/data/75/vu_871675/vendor_cheu-ba6mzl.json new file mode 100644 index 0000000000..13ded0bb99 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:00-04:00", + "DateNotified": "2019-03-11T12:55:46-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "dnsmasq", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MZL", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzn.json b/data/75/vu_871675/vendor_cheu-ba6mzn.json new file mode 100644 index 0000000000..b30febadb5 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-29T12:42:00-04:00", + "DateNotified": "2019-03-11T12:55:47-04:00", + "DateResponded": "2019-04-15T00:00:00", + "ID": "VU#871675", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "LANCOM Systems GmbH", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6MZN", + "VendorReferences": "https://www.lancom-systems.com/service-support/instant-help/general-security-information/", + "VendorStatement": "Vendor Statement\nLANCOM is aware of the vulnerabilities and confirms that no LANCOM product is affected." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzq.json b/data/75/vu_871675/vendor_cheu-ba6mzq.json new file mode 100644 index 0000000000..4b6ddc238e --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzq.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:01-04:00", + "DateNotified": "2019-03-11T12:55:48-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "pfSense", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MZQ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzs.json b/data/75/vu_871675/vendor_cheu-ba6mzs.json new file mode 100644 index 0000000000..d720404a07 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzs.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:01-04:00", + "DateNotified": "2019-03-11T12:55:50-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "DragonFly BSD Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MZS", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzu.json b/data/75/vu_871675/vendor_cheu-ba6mzu.json new file mode 100644 index 0000000000..e5fbee7f2c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzu.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:01-04:00", + "DateNotified": "2019-03-11T12:55:51-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "CZ.NIC", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MZU", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzw.json b/data/75/vu_871675/vendor_cheu-ba6mzw.json new file mode 100644 index 0000000000..790a949b04 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzw.json @@ -0,0 +1,14 @@ +{ + "Addendum": "Greetings, Thank you for informing Synology regarding VU#871675 and the supplementary\nOpenSSL vulnerability. Synology has confirmed that DiskStation Manager (DSM) [1], Synology Router\nManager (SRM) [2], including RT1900ac [3], RT2600ac [4] and MR2200ac [5] are not\naffected. These products ship OpenSSL version 1.0.2 and wpa_supplicant, but EAP-PWD\n(CONFIG_EAP_PWD) is not enabled and not compiled as well. However, the RADIUS Server [6] package is potentially vulnerable. The package\nships EAP-PWD module but the module is not enabled by default and administrators\nhave to enable it manually by editing configuration file. Customers can manually remove the module or keep the configuration file default\nas mitigation for the supplementary OpenSSL vulnerability. By convention, we will publish a security advisory after public disclosure. Reference: [1] https://www.synology.com/dsm\n[2] https://www.synology.com/srm\n[3] https://www.synology.com/products/RT1900ac\n[4] https://www.synology.com/products/RT2600ac\n[5] https://www.synology.com/products/MR2200ac\n[6] https://www.synology.com/dsm/packages/RadiusServer - Synology Security Team\n (mail #22389)", + "DateLastUpdated": "2019-04-11T13:55:00-04:00", + "DateNotified": "2019-03-11T12:55:51-04:00", + "DateResponded": "2019-03-26T00:00:00", + "ID": "VU#871675", + "Revision": 3, + "Status": "Affected", + "Vendor": "Synology", + "VendorInformation": "Synology Security Team", + "VendorRecordID": "CHEU-BA6MZW", + "VendorReferences": "https://www.synology.com/security/advisory/Synology_SA_19_16", + "VendorStatement": "The mitigation, patched `hostapd` and `wpa_supplicant`, is provided by another vendor but it has not passed the WPA3 certification yet. Therefore, Synology decides to postpone the final fixes for RT2600ac and\nMR2200ac until the cert qualification." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6mzy.json b/data/75/vu_871675/vendor_cheu-ba6mzy.json new file mode 100644 index 0000000000..63416d0b8d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6mzy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:02-04:00", + "DateNotified": "2019-03-11T12:55:52-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenConnect", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6MZY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n22.json b/data/75/vu_871675/vendor_cheu-ba6n22.json new file mode 100644 index 0000000000..d5f09910b2 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n22.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-18T15:03:00-04:00", + "DateNotified": "2019-03-11T12:55:53-04:00", + "DateResponded": "2019-03-11T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "MikroTik", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6N22", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n24.json b/data/75/vu_871675/vendor_cheu-ba6n24.json new file mode 100644 index 0000000000..854fe85039 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n24.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:03-04:00", + "DateNotified": "2019-03-11T12:55:55-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Google", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N24", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n26.json b/data/75/vu_871675/vendor_cheu-ba6n26.json new file mode 100644 index 0000000000..2a805bea74 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n26.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:03-04:00", + "DateNotified": "2019-03-11T12:55:56-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Zephyr Project", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N26", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n28.json b/data/75/vu_871675/vendor_cheu-ba6n28.json new file mode 100644 index 0000000000..49d093f568 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n28.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:04-04:00", + "DateNotified": "2019-03-11T12:55:57-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Debian GNU/Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N28", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2a.json b/data/75/vu_871675/vendor_cheu-ba6n2a.json new file mode 100644 index 0000000000..3e9bcf144d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2a.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:04-04:00", + "DateNotified": "2019-03-11T12:55:57-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Digi International", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2A", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2c.json b/data/75/vu_871675/vendor_cheu-ba6n2c.json new file mode 100644 index 0000000000..f4323334fd --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2c.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:05-04:00", + "DateNotified": "2019-03-11T12:55:58-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NetBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2C", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2e.json b/data/75/vu_871675/vendor_cheu-ba6n2e.json new file mode 100644 index 0000000000..cebaf32337 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2e.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:05-04:00", + "DateNotified": "2019-03-11T12:56:00-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Miredo", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2E", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2g.json b/data/75/vu_871675/vendor_cheu-ba6n2g.json new file mode 100644 index 0000000000..c59027484a --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2g.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:06-04:00", + "DateNotified": "2019-03-11T12:56:01-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sierra Wireless", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2G", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2j.json b/data/75/vu_871675/vendor_cheu-ba6n2j.json new file mode 100644 index 0000000000..ea4b33cc31 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2j.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:06-04:00", + "DateNotified": "2019-03-11T12:56:02-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Rocket RTOS", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2J", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2l.json b/data/75/vu_871675/vendor_cheu-ba6n2l.json new file mode 100644 index 0000000000..0cad71b803 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2l.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:07-04:00", + "DateNotified": "2019-03-11T12:56:02-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "NIKSUN", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2L", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2n.json b/data/75/vu_871675/vendor_cheu-ba6n2n.json new file mode 100644 index 0000000000..6299d101c3 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2n.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:07-04:00", + "DateNotified": "2019-03-11T12:56:03-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TDS Telecom", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2N", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2q.json b/data/75/vu_871675/vendor_cheu-ba6n2q.json new file mode 100644 index 0000000000..d41cf2b909 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2q.json @@ -0,0 +1,14 @@ +{ + "Addendum": "Good Day, We have audit our projects/products globally. D-Link brand, globally)\u00c2\u00a0 has no current shipping product nor internal\ninfrastructure using the WPA3 feature. D-Link Systems, Inc. (D-Link US) has elevated this report to D-Link\nCorporation (Brand owner)\u00c2\u00a0 who has notified all R&D of such issue. Projects including the WPA3 feature will not release until their is a\nsolution and/or patch for this WAP3 security vulnerability report. Regards,\nWilliam Brown\nCISO IT/Product\nD-Link Systems, Inc. (DLS/D-Link US)", + "DateLastUpdated": "2019-03-18T10:17:00-04:00", + "DateNotified": "2019-03-11T12:56:04-04:00", + "DateResponded": "2019-03-18T09:41:59-04:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "D-Link Systems, Inc.", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6N2Q", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2s.json b/data/75/vu_871675/vendor_cheu-ba6n2s.json new file mode 100644 index 0000000000..ba8b0b993c --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2s.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:08-04:00", + "DateNotified": "2019-03-11T12:56:05-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "HardenedBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2S", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2u.json b/data/75/vu_871675/vendor_cheu-ba6n2u.json new file mode 100644 index 0000000000..3db6056486 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2u.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:09-04:00", + "DateNotified": "2019-03-11T12:56:06-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Dell SecureWorks", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2U", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2w.json b/data/75/vu_871675/vendor_cheu-ba6n2w.json new file mode 100644 index 0000000000..4aba128bf2 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2w.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:09-04:00", + "DateNotified": "2019-03-11T12:56:07-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Gentoo Linux", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2W", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n2y.json b/data/75/vu_871675/vendor_cheu-ba6n2y.json new file mode 100644 index 0000000000..f928dc4379 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n2y.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:10-04:00", + "DateNotified": "2019-03-11T12:56:08-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "QUALCOMM Incorporated", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N2Y", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n32.json b/data/75/vu_871675/vendor_cheu-ba6n32.json new file mode 100644 index 0000000000..111e9307c4 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n32.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:10-04:00", + "DateNotified": "2019-03-11T12:56:09-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Comcast", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N32", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n34.json b/data/75/vu_871675/vendor_cheu-ba6n34.json new file mode 100644 index 0000000000..644d833dd9 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n34.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-15T09:24:00-04:00", + "DateNotified": "2019-03-11T12:56:10-04:00", + "DateResponded": "2019-03-14T22:44:20-04:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "Zyxel", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6N34", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n36.json b/data/75/vu_871675/vendor_cheu-ba6n36.json new file mode 100644 index 0000000000..0bbbbd4b93 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n36.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:11-04:00", + "DateNotified": "2019-03-11T12:56:11-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "MediaTek", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N36", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n38.json b/data/75/vu_871675/vendor_cheu-ba6n38.json new file mode 100644 index 0000000000..c8e6b1b12d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n38.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:11-04:00", + "DateNotified": "2019-03-11T12:56:12-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "TippingPoint Technologies Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N38", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3a.json b/data/75/vu_871675/vendor_cheu-ba6n3a.json new file mode 100644 index 0000000000..faa19430d3 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3a.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:11-04:00", + "DateNotified": "2019-03-11T12:56:13-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "DesktopBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3A", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3c.json b/data/75/vu_871675/vendor_cheu-ba6n3c.json new file mode 100644 index 0000000000..81d09698a4 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3c.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:12-04:00", + "DateNotified": "2019-03-11T12:56:14-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nixu", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3C", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3e.json b/data/75/vu_871675/vendor_cheu-ba6n3e.json new file mode 100644 index 0000000000..46d316abb0 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3e.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:12-04:00", + "DateNotified": "2019-03-11T12:56:17-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OpenBSD", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3E", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3g.json b/data/75/vu_871675/vendor_cheu-ba6n3g.json new file mode 100644 index 0000000000..938b802511 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3g.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:13-04:00", + "DateNotified": "2019-03-11T12:56:20-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "IBM Corporation (zseries)", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3G", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3j.json b/data/75/vu_871675/vendor_cheu-ba6n3j.json new file mode 100644 index 0000000000..9cd7c13f8d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3j.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:13-04:00", + "DateNotified": "2019-03-11T12:56:21-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Infoblox", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3J", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3l.json b/data/75/vu_871675/vendor_cheu-ba6n3l.json new file mode 100644 index 0000000000..8aa1f110fb --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3l.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:13-04:00", + "DateNotified": "2019-03-11T12:56:22-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sophos, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3L", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3n.json b/data/75/vu_871675/vendor_cheu-ba6n3n.json new file mode 100644 index 0000000000..8e3bd8a6d7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3n.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:14-04:00", + "DateNotified": "2019-03-11T12:56:22-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Sourcefire", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3N", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3q.json b/data/75/vu_871675/vendor_cheu-ba6n3q.json new file mode 100644 index 0000000000..49dd808017 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3q.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:14-04:00", + "DateNotified": "2019-03-11T12:56:23-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Wind River", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3Q", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3s.json b/data/75/vu_871675/vendor_cheu-ba6n3s.json new file mode 100644 index 0000000000..c9b6e6a5cd --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3s.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:14-04:00", + "DateNotified": "2019-03-11T12:56:25-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Ubuntu", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3S", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3u.json b/data/75/vu_871675/vendor_cheu-ba6n3u.json new file mode 100644 index 0000000000..44cc62950a --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3u.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:15-04:00", + "DateNotified": "2019-03-11T12:56:26-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "IBM, INC.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3U", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3w.json b/data/75/vu_871675/vendor_cheu-ba6n3w.json new file mode 100644 index 0000000000..6f2b280974 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3w.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:15-04:00", + "DateNotified": "2019-03-11T12:56:26-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "OmniTI", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N3W", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n3y.json b/data/75/vu_871675/vendor_cheu-ba6n3y.json new file mode 100644 index 0000000000..e1720ba1c6 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n3y.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-20T09:49:00-04:00", + "DateNotified": "2019-03-11T12:56:27-04:00", + "DateResponded": "2019-03-19T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Not Affected", + "Vendor": "LG Electronics", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BA6N3Y", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n42.json b/data/75/vu_871675/vendor_cheu-ba6n42.json new file mode 100644 index 0000000000..da840595c8 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n42.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:16-04:00", + "DateNotified": "2019-03-11T12:56:29-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Fortinet, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N42", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n45.json b/data/75/vu_871675/vendor_cheu-ba6n45.json new file mode 100644 index 0000000000..8ad47ebce0 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n45.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:16-04:00", + "DateNotified": "2019-03-11T12:56:34-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Vertical Networks, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N45", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n47.json b/data/75/vu_871675/vendor_cheu-ba6n47.json new file mode 100644 index 0000000000..1d6b627a1e --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n47.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:17-04:00", + "DateNotified": "2019-03-11T12:56:35-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Muonics, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N47", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-ba6n49.json b/data/75/vu_871675/vendor_cheu-ba6n49.json new file mode 100644 index 0000000000..095890bf4d --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-ba6n49.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-11T12:58:17-04:00", + "DateNotified": "2019-03-11T12:56:36-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Oracle Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BA6N49", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-baqskz.json b/data/75/vu_871675/vendor_cheu-baqskz.json new file mode 100644 index 0000000000..9d0f993ec7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-baqskz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-29T16:57:27-04:00", + "DateNotified": "2019-03-29T16:54:40-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "ADATA", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAQSKZ", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-baqsmd.json b/data/75/vu_871675/vendor_cheu-baqsmd.json new file mode 100644 index 0000000000..b7472393e7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-baqsmd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-29T16:57:37-04:00", + "DateNotified": "2019-03-29T16:54:54-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "BoringSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAQSMD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-baqsp7.json b/data/75/vu_871675/vendor_cheu-baqsp7.json new file mode 100644 index 0000000000..e5881682b5 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-baqsp7.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-16T07:25:00-04:00", + "DateNotified": "2019-03-29T16:55:21-04:00", + "DateResponded": "2019-04-15T00:00:00", + "ID": "VU#871675", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "OpenSSL", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "CHEU-BAQSP7", + "VendorReferences": "https://github.com/openssl/openssl/pull/8750", + "VendorStatement": "Not Vulnerable: OpenSSL is not directly vulnerable to these issues. However in\norder to provide additional protection to applications that do not correctly\nvalidate elliptic curve points we are backporting commit 1e2012b to OpenSSL\n1.0.2 (see https://github.com/openssl/openssl/pull/8750). It will become\navailable in the next release of OpenSSL 1.0.2. OpenSSL 1.1.0 and OpenSSL 1.1.1\nalready have this additional protection." +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-baqspm.json b/data/75/vu_871675/vendor_cheu-baqspm.json new file mode 100644 index 0000000000..6dd0d1ec00 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-baqspm.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-29T16:57:56-04:00", + "DateNotified": "2019-03-29T16:55:35-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "wolfSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAQSPM", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-baqsr2.json b/data/75/vu_871675/vendor_cheu-baqsr2.json new file mode 100644 index 0000000000..4b844acad7 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-baqsr2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-29T16:58:05-04:00", + "DateNotified": "2019-03-29T16:55:16-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Metrobility, Inc.", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAQSR2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-baqsrd.json b/data/75/vu_871675/vendor_cheu-baqsrd.json new file mode 100644 index 0000000000..f9386c5f4b --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-baqsrd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-29T16:58:09-04:00", + "DateNotified": "2019-03-29T16:55:17-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "netsnmpj", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAQSRD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-baqsrg.json b/data/75/vu_871675/vendor_cheu-baqsrg.json new file mode 100644 index 0000000000..85f4f59324 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-baqsrg.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-29T16:58:09-04:00", + "DateNotified": "2019-03-29T16:55:28-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Pantech North America", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAQSRG", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-baqsx8.json b/data/75/vu_871675/vendor_cheu-baqsx8.json new file mode 100644 index 0000000000..e265aeb6c4 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-baqsx8.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-29T17:14:31-04:00", + "DateNotified": "2019-03-29T17:08:47-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "LITE-ON Technology Corporation", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAQSX8", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-baqsxa.json b/data/75/vu_871675/vendor_cheu-baqsxa.json new file mode 100644 index 0000000000..3d4b06ffed --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-baqsxa.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-29T17:14:31-04:00", + "DateNotified": "2019-03-29T17:08:48-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Nexenta", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAQSXA", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-baqsxk.json b/data/75/vu_871675/vendor_cheu-baqsxk.json new file mode 100644 index 0000000000..0459f380d5 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-baqsxk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-03-29T17:14:33-04:00", + "DateNotified": "2019-03-29T17:08:53-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "LibreSSL", + "VendorInformation": "", + "VendorRecordID": "CHEU-BAQSXK", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_cheu-bb4nm2.json b/data/75/vu_871675/vendor_cheu-bb4nm2.json new file mode 100644 index 0000000000..4444ff92f0 --- /dev/null +++ b/data/75/vu_871675/vendor_cheu-bb4nm2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-10T13:33:26-04:00", + "DateNotified": "2019-04-10T13:26:35-04:00", + "DateResponded": "", + "ID": "VU#871675", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Allied Telesis", + "VendorInformation": "", + "VendorRecordID": "CHEU-BB4NM2", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/75/vu_871675/vendor_ltys-batr72.json b/data/75/vu_871675/vendor_ltys-batr72.json new file mode 100644 index 0000000000..29dab901bf --- /dev/null +++ b/data/75/vu_871675/vendor_ltys-batr72.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-04-01T15:54:00-04:00", + "DateNotified": "2019-03-29T00:00:00", + "DateResponded": "2019-04-01T00:00:00", + "ID": "VU#871675", + "Revision": 1, + "Status": "Affected", + "Vendor": "FreeRADIUS", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BATR72", + "VendorReferences": "https://freeradius.org/security/", + "VendorStatement": "We have released version 3.0.19 of FreeRADIUS to address this issue. Our full response to this issue is located at https://freeradius.org/security/ The issues reported here affect only EAP-PWD. All other authentication methods are not affected. We note that EAP-PWD is not enabled in the default installation of the server, so most systems will not be vulnerable." +} \ No newline at end of file diff --git a/data/75/vu_871675/vu_871675.json b/data/75/vu_871675/vu_871675.json new file mode 100644 index 0000000000..f1ab597331 --- /dev/null +++ b/data/75/vu_871675/vu_871675.json @@ -0,0 +1,80 @@ +{ + "Author": "This document was written by Laurie Tyzenhaus and Madison Oliver.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": [ + "CVE-2019-9494", + "CVE-2019-9495", + "CVE-2019-9496", + "CVE-2019-9497", + "CVE-2019-9498", + "CVE-2019-9499" + ], + "CVSS_AccessComplexity": "M", + "CVSS_AccessVector": "A", + "CVSS_Authenication": "S", + "CVSS_AvailabilityImpact": "P", + "CVSS_BaseScore": 7, + "CVSS_BaseVector": "AV:A/AC:M/Au:S/C:C/I:C/A:P", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 7.04178397104, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 7, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:C", + "DateCreated": "2019-02-22T11:36:00-05:00", + "DateFirstPublished": "2019-04-12T13:47:23-04:00", + "DateLastUpdated": "2019-05-14T08:09:00-04:00", + "DatePublic": "2019-04-10T00:00:00", + "Description": "CERT continues to review the WPA3 protocol in support of this body of research. The root cause of the numerous \"implementation\" vulnerabilities may involve modifying the protocol. WPA3 uses Simultaneous Authentication of Equals (SAE), also known as Dragonfly Key Exchange, as the initial key exchange protocol, replacing WPA2's Pre-Shared Key (PSK) protocol. hostapd is a daemon for access point and authentication servers used by WPA3 authentication. wpa_supplicant is a wireless supplicant that implements key negotiation with the WPA Authenticator and supports WPA3. Both of these components, as implemented with Extensible Authentication Protocol Password (EAP-PWD) and SAE, are vulnerable as follows: CVE-2019-9494: SAE cache attack against ECC groups (SAE side-channel attacks) - CWE-208 and CWE-524\nThe implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. CVE-2019-9495: EAP-PWD cache attack against ECC groups (EAP-PWD side-channel attack) - CWE-524\nThe implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of cache access patterns. Versions of hostapd and wpa_supplicant versions 2.7 and earlier, with EAP-PWD support are vulnerable. CVE-2019-9496: SAE confirm missing state validation - CWE-642\nAn invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. CVE-2019-9497: EAP-PWD reflection attack (EAP-PWD missing commit validation) - CWE-301\nThe implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. CVE-2019-9498: EAP-PWD server missing commit validation for scalar/element - CWE-346 \nThe implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. CVE-2019-9499: EAP-PWD peer missing commit validation for scalar/element - CWE-346\nThe implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit.", + "ID": "VU#871675", + "IDNumber": "871675", + "IPProtocol": "", + "Impact": "CVE-2019-9494: SAE cache attack against ECC groups (SAE side-channel attacks) - CWE-208 and CWE-524\nAn attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. CVE-2019-9495: EAP-PWD cache attack against ECC groups (EAP-PWD side-channel attack) - CWE-524\nThe ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. CVE-2019-9496: SAE confirm missing state validation - CWE-642\nAn attacker may force the hostapd process to terminate, performing a denial of service attack. CVE-2019-9497: EAP-PWD reflection attack (EAP-PWD missing commit validation) - CWE-301\nThis vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. CVE-2019-9498: EAP-PWD server missing commit validation for scalar/element - CWE-346 \nAn attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. CVE-2019-9499: EAP-PWD peer missing commit validation for scalar/element - CWE-346\nAn attacker may complete authentication, session key and control of the data connection with a client.", + "Keywords": [ + "WPA", + "SAE", + "Dragonblood" + ], + "Overview": "Multiple vulnerabilities have been identified in WPA3 protocol design and implementations of hostapd and wpa_supplicant, which can allow a remote attacker to acquire a weak password, conduct a denial of service, or gain complete authorization. These vulnerabilities have also been referred to as Dragonblood.", + "References": [ + "https://wpa3.mathyvanhoef.com/", + "https://w1.fi/security/", + "https://w1.fi/security/2019-1/", + "https://w1.fi/security/2019-2/", + "https://w1.fi/security/2019-3/", + "https://w1.fi/security/2019-4/", + "https://w1.fi/wpa_supplicant/ ", + "https://w1.fi/hostapd/", + "https://w1.fi/cgit/hostap/log/", + "https://papers.mathyvanhoef.com/dragonblood.pdf" + ], + "Resolution": "Upgrade wpa_supplicant and hostapd to version 2.8, when available. Additional mitigation options are listed below.", + "Revision": 82, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) for reporting this vulnerability; Jouni Malinen for patches, and Kevin Robinson for support from Wi-Fi Alliance.", + "Title": "WPA3 design issues and implementation vulnerabilities in hostapd and wpa_supplicant", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "Check your vendor for mitigation information. Mitigations are available for \nCVE-2019-9494 https://w1.fi/security/2019-1/\nCVE-2019-9495 https://w1.fi/security/2019-2/\nCVE-2019-9496 https://w1.fi/security/2019-3/\nCVE-2019-9497 https://w1.fi/security/2019-4/\nCVE-2019-9498 https://w1.fi/security/2019-4/\nCVE-2019-9499 https://w1.fi/security/2019-4/" +} \ No newline at end of file diff --git a/data/76/vu_991076/vu_991076.json b/data/76/vu_991076/vu_991076.json index 760a9ab45a..440604e9a3 100644 --- a/data/76/vu_991076/vu_991076.json +++ b/data/76/vu_991076/vu_991076.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2003-04-29T12:57:52-04:00", "DateFirstPublished": "", "DateLastUpdated": "2003-04-29T13:00:00-04:00", diff --git a/data/77/vu_317277/vu_317277.json b/data/77/vu_317277/vu_317277.json index b5ed85d59b..7123b91fc8 100644 --- a/data/77/vu_317277/vu_317277.json +++ b/data/77/vu_317277/vu_317277.json @@ -11,7 +11,10 @@ "CAM_ScoreCurrentWidelyKnownExploited": 0, "CAM_WidelyKnown": "0", "CERTAdvisory": "", - "CVEIDs": "CVE-2018-16986", + "CVEIDs": [ + "CVE-2018-16986", + "CVE-2018-7080" + ], "CVSS_AccessComplexity": "M", "CVSS_AccessVector": "A", "CVSS_Authenication": "N", @@ -34,32 +37,34 @@ "CVSS_TemporalVector": "E:POC/RL:OF/RC:C", "DateCreated": "2018-09-18T11:09:30-04:00", "DateFirstPublished": "2018-11-01T12:37:53-04:00", - "DateLastUpdated": "2018-11-06T10:46:00-05:00", + "DateLastUpdated": "2019-01-07T16:33:00-05:00", "DatePublic": "2018-11-01T00:00:00", - "Description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer - CVE-2018-16986 Both Texas Instruments microcontrollers CC2640 and CC2650 BLE-Stacks contain a memory corruption vulnerability resulting from the mishandling of BLE advertising packets. The function llGetAdvChanPDU that is part of the embedded ROM image in both chips handles the incoming advertising packets and parses their headers. It copies the contents to a separate buffer provided by the calling function. The incorrect length of the packet is taken and ends up being parsed as larger packets than originally intended. If the incoming data is over a certain length, the function will call the halAssertHandler function, as defined by the application running on top of the stack, and not stop execution. Since the flow of execution does not stop, it will copy the overly large packet to the buffer and cause a heap overflow.", + "Description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CVE-2018-16986 - also known as BLEEDINGBIT\nThe following Texas Instrument chips are affected: CC2640 (non-R2) with BLE-STACK version 2.2.1 or an earlier version\nCC2650 with BLE-STACK version 2.2.1 or an earlier version\nCC2640R2F with SimpleLink CC2640R2 SDK version 1.00.00.22 (BLE-STACK 3.0.0)\nCC1350 with SimpleLink CC13x0 SDK version 2.20.00.38 (BLE-STACK 2.3.3) or an earlier version\nThe above Texas Instruments controllers contain BLE-Stacks with a memory corruption vulnerability resulting from the mishandling of BLE advertising packets. The function llGetAdvChanPDU that is part of the embedded ROM image in both chips handles the incoming advertising packets and parses their headers. It copies the contents to a separate buffer provided by the calling function. The incorrect length of the packet is taken and ends up being parsed as larger packets than originally intended. If the incoming data is over a certain length, the function will call the halAssertHandler function, as defined by the application running on top of the stack, and not stop execution. Since the flow of execution does not stop, it will copy the overly large packet to the buffer and cause a heap overflow. CVE-2018-7080 - also known as BLEEDINGBIT\nThe following Texas Instruments devices are affected if the Over the Air firmware Download (OAD) feature is enabled and not sufficiently secured: CC2642R\nCC2640R2\nCC2640\nCC2650\nCC2540\nCC2541\nCertain Aruba access points are affected. The OAD feature allows for remote firmware updates of some BLE chips. An attacker could connect to a BLE chip on a vulnerable access point (either without authentication or by obtaining the password through other means depending on the implementation) and upload their own malicious firmware, which could give them complete control over the access point.", "ID": "VU#317277", "IDNumber": "317277", "IPProtocol": "", - "Impact": "Using a specially crafted set of packets, an attacker can both control the data of the overflow, and the length of it, which may lead to remote code execution on the targeted BLE chip. An attacker needs to be within physical proximity to the device while it is in scanning mode to trigger vulnerable code. This memory corruption can lead to code execution on the main CPU of the device, which could have the potential to affect other devices across a network if the origin is a networked device. Given the nature of embedded devices, it is possible that a broader set of devices are impacted than what is listed in this publication. If you believe you are affected, please email us at cert@cert.org.", + "Impact": "Using a specially crafted set of packets, an attacker can both control the data of the overflow, and the length of it, which may lead to remote code execution on the targeted BLE chip. An attacker needs to be within physical proximity to the device while it is in scanning mode to trigger vulnerable code. This memory corruption can lead to code execution on the main CPU of the device, which could have the potential to affect other devices across a network if the origin is a networked device. An attacker could also exploit this vulnerability to rewrite the operating system of a device and gain full control over it. Given the nature of embedded devices, it is possible that a broader set of devices are impacted than what is listed in this publication. If you believe you are affected, please email us at cert@cert.org.", "Keywords": [ "Texas Instruments", "BLE", "BLE-Stack", "memory corruption", - "Bluetooth Low Energy" + "Bluetooth Low Energy", + "Bleedingbit" ], - "Overview": "Texas Instruments Microcontrollers CC2640 and CC2650 are vulnerable to heap overflow", + "Overview": "Texas Instruments CC2640 and CC2650 microcontrollers are vulnerable to a heap overflow and may allow unauthenticated firmware installation.", "References": [ "http://software-dl.ti.com/lprf/ble_stack/exports/release_notes_BLE_Stack_2_2_2.html", "https://cwe.mitre.org/data/definitions/119.html", "https://armis.com/bleedingbit/", - "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-006.txt" + "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-006.txt", + "http://dev.ti.com/tirex/content/simplelink_cc2640r2_sdk_2_30_00_28/docs/blestack/ble_user_guide/html/ble3-stack-oad/index-ble3-cc2640.html" ], - "Resolution": "Update the BLE-Stack\nThis vulnerability was patched in BLE-Stack v2.2.2 released by Texas Instruments on March 28, 2018. Affected devices will require a firmware update to obtain the updated BLE-Stack.", - "Revision": 53, + "Resolution": "Update the BLE-Stack\nThis vulnerability was patched in BLE-Stack v2.2.2 released by Texas Instruments on March 28, 2018. Affected devices will require a firmware update to obtain the updated BLE-Stack. Do not use the OAD feature in production\nThe OAD featrure is never meant to be used in production, so manufacturers should ensure that this feature is not enabled by default in live environments.", + "Revision": 70, "SystemsAffectedPreamble": "", "ThanksAndCredit": "We would like to thank Ben Seri at Armis for reporting this vulnerability.", - "Title": "Texas Instruments Microcontrollers CC2640 and CC2650 are vulnerable to heap overflow", + "Title": "Texas Instruments CC2640 and CC2650 microcontrollers vulnerable to heap overflow and insecure update", "US-CERTTechnicalAlert": "", "VRDA_D1_DirectReport": "0", "VRDA_D1_Impact": "", diff --git a/data/77/vu_406277/vu_406277.json b/data/77/vu_406277/vu_406277.json new file mode 100644 index 0000000000..8fc2e212b2 --- /dev/null +++ b/data/77/vu_406277/vu_406277.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-04-29T11:03:23-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-07T11:19:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#406277", + "IDNumber": "406277", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 3, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "SAP Gateway vulnerable to RCE", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/77/vu_991177/vu_991177.json b/data/77/vu_991177/vu_991177.json index a52bd7e1de..2487934988 100644 --- a/data/77/vu_991177/vu_991177.json +++ b/data/77/vu_991177/vu_991177.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2007-02-27T10:16:23-05:00", "DateFirstPublished": "", "DateLastUpdated": "2007-02-27T10:18:00-05:00", diff --git a/data/78/vu_990878/vu_990878.json b/data/78/vu_990878/vu_990878.json index 2c925993d9..eb21bd5144 100644 --- a/data/78/vu_990878/vu_990878.json +++ b/data/78/vu_990878/vu_990878.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2011-04-14T11:12:10-04:00", "DateFirstPublished": "", "DateLastUpdated": "2011-04-14T12:58:00-04:00", diff --git a/data/78/vu_991078/vu_991078.json b/data/78/vu_991078/vu_991078.json index b58757f152..1b90100673 100644 --- a/data/78/vu_991078/vu_991078.json +++ b/data/78/vu_991078/vu_991078.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2004-02-04T13:39:25-05:00", "DateFirstPublished": "", "DateLastUpdated": "2004-02-04T13:59:00-05:00", diff --git a/data/79/vu_990979/vu_990979.json b/data/79/vu_990979/vu_990979.json index 12b9cb8d35..f21529dafc 100644 --- a/data/79/vu_990979/vu_990979.json +++ b/data/79/vu_990979/vu_990979.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2002-02-20T11:52:18-05:00", "DateFirstPublished": "", "DateLastUpdated": "2002-02-20T12:09:00-05:00", diff --git a/data/80/vu_991080/vu_991080.json b/data/80/vu_991080/vu_991080.json index a80ad00ceb..b034ce0a5d 100644 --- a/data/80/vu_991080/vu_991080.json +++ b/data/80/vu_991080/vu_991080.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2004-11-16T14:41:14-05:00", "DateFirstPublished": "", "DateLastUpdated": "2004-11-29T14:32:00-05:00", diff --git a/data/81/vu_395981/vendor_cheu-b9apzy.json b/data/81/vu_395981/vendor_cheu-b9apzy.json new file mode 100644 index 0000000000..c695e378f5 --- /dev/null +++ b/data/81/vu_395981/vendor_cheu-b9apzy.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2019-02-11T13:46:17-05:00", + "DateNotified": "2019-02-11T13:41:49-05:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Lenovo", + "VendorInformation": "", + "VendorRecordID": "CHEU-B9APZY", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-b68mka.json b/data/81/vu_395981/vendor_ltys-b68mka.json new file mode 100644 index 0000000000..8134aaa2f9 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-b68mka.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-11-07T14:39:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 5, + "Status": "Affected", + "Vendor": "Microsoft", + "VendorInformation": "For details, please see the vendor's web page.", + "VendorRecordID": "LTYS-B68MKA", + "VendorReferences": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180028\nhttps://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj679890(v=ws.11)#configure-use-of-hardware-based-encryption-for-fixed-data-drives", + "VendorStatement": "Encryption with BitLocker depends on the correct setting of the Group Policy. More information about this Group Policy can be found via the following location (Microsoft URL). Changing the default setting is not sufficient to mitigate the risk because it does not affect the vulnerability in already encrypted data. Only a\u00a0complete new installation, including removal and reformatting\u00a0of data, enforces encryption via BitLocker." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-b68mvd.json b/data/81/vu_395981/vendor_ltys-b68mvd.json new file mode 100644 index 0000000000..b6c5c6b8f7 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-b68mvd.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-11-06T14:37:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 3, + "Status": "Affected", + "Vendor": "Micron", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-B68MVD", + "VendorReferences": "http://www.crucial.com/usa/en/support-ssd-firmware", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-b68mw3.json b/data/81/vu_395981/vendor_ltys-b68mw3.json new file mode 100644 index 0000000000..c65d2647b2 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-b68mw3.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2018-11-05T12:28:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 2, + "Status": "Affected", + "Vendor": "Samsung Memory", + "VendorInformation": "For details please see the Vendor's web page.", + "VendorRecordID": "LTYS-B68MW3", + "VendorReferences": "https://www.samsung.com/semiconductor/minisite/ssd/support/consumer-notice/", + "VendorStatement": "For non-portable SSDs: We recommend installing encryption software (freeware available online) that is compatible with your system. For portable SSDs: We recommend updating the firmware on your device." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8jwz.json b/data/81/vu_395981/vendor_ltys-ba8jwz.json new file mode 100644 index 0000000000..5e85ef8701 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8jwz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-05-14T08:16:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "2019-05-13T00:00:00", + "ID": "VU#395981", + "Revision": 5, + "Status": "Affected", + "Vendor": "Western Digital Technologies", + "VendorInformation": "CVE Numbers: CVE-2019-10705, CVE-2019-11686, CVE-2019-10706, CVE-2019-10636", + "VendorRecordID": "LTYS-BA8JWZ", + "VendorReferences": "https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd", + "VendorStatement": "A firmware update to address issues related to the protection of data at rest on the SanDisk X600 SED SSD is available. For details on the issues addressed by this update and availability information, please see the bulletin on the Western Digital product security portal at https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8jyn.json b/data/81/vu_395981/vendor_ltys-ba8jyn.json new file mode 100644 index 0000000000..efa39395a0 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8jyn.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T10:32:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 2, + "Status": "Unknown", + "Vendor": "Toshiba Corporation", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8JYN", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8k3s.json b/data/81/vu_395981/vendor_ltys-ba8k3s.json new file mode 100644 index 0000000000..9b7742451a --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8k3s.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-04-04T13:26:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "2019-04-02T00:00:00", + "ID": "VU#395981", + "Revision": 2, + "Status": "Not Affected", + "Vendor": "Intel", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8K3S", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8k4p.json b/data/81/vu_395981/vendor_ltys-ba8k4p.json new file mode 100644 index 0000000000..77f41065ce --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8k4p.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T10:49:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 2, + "Status": "Unknown", + "Vendor": "Seagate Technology LLC", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8K4P", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8ke2.json b/data/81/vu_395981/vendor_ltys-ba8ke2.json new file mode 100644 index 0000000000..eb40356e5a --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8ke2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-05-10T09:33:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "2019-05-07T00:00:00", + "ID": "VU#395981", + "Revision": 2, + "Status": "Affected", + "Vendor": "SanDisk Corporation", + "VendorInformation": "See statement from Western Digital", + "VendorRecordID": "LTYS-BA8KE2", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8kfl.json b/data/81/vu_395981/vendor_ltys-ba8kfl.json new file mode 100644 index 0000000000..ba5a664ac6 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8kfl.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T10:52:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "Samsung Memory", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8KFL", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8kg9.json b/data/81/vu_395981/vendor_ltys-ba8kg9.json new file mode 100644 index 0000000000..6311daf6c0 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8kg9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T10:55:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "Kingston Technology Company, Inc.", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8KG9", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8khv.json b/data/81/vu_395981/vendor_ltys-ba8khv.json new file mode 100644 index 0000000000..94bd7a1ead --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8khv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T10:56:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "HP Inc.", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8KHV", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8kj9.json b/data/81/vu_395981/vendor_ltys-ba8kj9.json new file mode 100644 index 0000000000..3a98aa9791 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8kj9.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T10:57:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "Hewlett Packard Enterprise", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8KJ9", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8kk2.json b/data/81/vu_395981/vendor_ltys-ba8kk2.json new file mode 100644 index 0000000000..d1e1dda829 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8kk2.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T10:58:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "Dell EMC", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8KK2", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8kkh.json b/data/81/vu_395981/vendor_ltys-ba8kkh.json new file mode 100644 index 0000000000..5ff63b9650 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8kkh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T10:58:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "Dell", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8KKH", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8kkv.json b/data/81/vu_395981/vendor_ltys-ba8kkv.json new file mode 100644 index 0000000000..c457943ce0 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8kkv.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T10:59:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "Crucial Technology", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8KKV", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8klk.json b/data/81/vu_395981/vendor_ltys-ba8klk.json new file mode 100644 index 0000000000..c094377af3 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8klk.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T11:00:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "Apple", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8KLK", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8klz.json b/data/81/vu_395981/vendor_ltys-ba8klz.json new file mode 100644 index 0000000000..dccd198f9a --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8klz.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T11:01:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "Acer", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8KLZ", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8m6n.json b/data/81/vu_395981/vendor_ltys-ba8m6n.json new file mode 100644 index 0000000000..075117eee8 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8m6n.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T12:20:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "Sk Hynix", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8M6N", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8m7b.json b/data/81/vu_395981/vendor_ltys-ba8m7b.json new file mode 100644 index 0000000000..e31a9d6c88 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8m7b.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T12:21:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "LITE-ON Technology Corporation", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8M7B", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vendor_ltys-ba8m83.json b/data/81/vu_395981/vendor_ltys-ba8m83.json new file mode 100644 index 0000000000..014a22abe3 --- /dev/null +++ b/data/81/vu_395981/vendor_ltys-ba8m83.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-03-13T12:22:00-04:00", + "DateNotified": "2019-03-13T00:00:00", + "DateResponded": "", + "ID": "VU#395981", + "Revision": 1, + "Status": "Unknown", + "Vendor": "ADATA", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "LTYS-BA8M83", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_395981/vu_395981.json b/data/81/vu_395981/vu_395981.json index 736bdf7d10..42cb90469b 100644 --- a/data/81/vu_395981/vu_395981.json +++ b/data/81/vu_395981/vu_395981.json @@ -1,5 +1,5 @@ { - "Author": "This document was written by Laurie Tyzenhaus.", + "Author": "This document was written by Trent Novelly and Laurie Tyzenhaus.", "CAM_AttackerAccessRequired": "0", "CAM_EaseOfExploitation": "0", "CAM_Exploitation": "0", @@ -19,49 +19,54 @@ "CVSS_AccessVector": "L", "CVSS_Authenication": "N", "CVSS_AvailabilityImpact": "N", - "CVSS_BaseScore": 6.3, - "CVSS_BaseVector": "AV:L/AC:M/Au:N/C:C/I:C/A:N", - "CVSS_CollateralDamagePotential": "N", + "CVSS_BaseScore": 4.7, + "CVSS_BaseVector": "AV:L/AC:M/Au:N/C:C/I:N/A:N", + "CVSS_CollateralDamagePotential": "ND", "CVSS_ConfidentialityImpact": "C", - "CVSS_EnvironmentalScore": 3.7161459136368, - "CVSS_EnvironmentalVector": "CDP:N/TD:M/CR:ND/IR:ND/AR:ND", + "CVSS_EnvironmentalScore": 4.0449003364224, + "CVSS_EnvironmentalVector": "CDP:ND/TD:M/CR:H/IR:ND/AR:ND", "CVSS_Exploitability": "POC", - "CVSS_IntegrityImpact": "C", + "CVSS_IntegrityImpact": "N", "CVSS_RemediationLevel": "OF", "CVSS_ReportConfidence": "C", "CVSS_SecurityRequirementsAR": "ND", - "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsCR": "H", "CVSS_SecurityRequirementsIR": "ND", "CVSS_TargetDistribution": "M", - "CVSS_TemporalScore": 4.9, + "CVSS_TemporalScore": 3.7, "CVSS_TemporalVector": "E:POC/RL:OF/RC:C", "DateCreated": "2018-10-23T09:27:31-04:00", - "DateFirstPublished": "", - "DateLastUpdated": "2018-11-06T10:46:00-05:00", - "DatePublic": "", - "Description": "CVE-2018-12037\nThere is no cryptographic relation between the password provided by the end user and the key used for the encryption of user data. CVE-2018-12038\nKey information is stored within a wear-leveled storage chip. According to National Cyber Security Centre - The Netherlands (NCSC-NL), the following products are affected by\u00a0CVE-2018-12037: Crucial (Micron) MX100, MX200 and MX300 drives\nSamsung T3 and T5 portable drives\nSamsung 840 EVO and 850 EVO drives (depending on a BIOS setting: In \"ATA high\"\u00a0mode these devices are vulnerable, In \"TCG\" or \"ATA max\" mode these devices are NOT vulnerable.) According to NCSC-NL, the following products are affected by\u00a0CVE-2018-12038: Samsung 840 EVO According to NCSC-NL, BitLocker, as bundled with\u00a0Microsoft Windows relies on hardware full-disk encryption by default if the drive indicates that it can support this. This means that this encryption implementation in combination with the above products is vulnerable. The researchers have reported the above products as vulnerable. Other products were not tested.", + "DateFirstPublished": "2018-11-06T18:20:35-05:00", + "DateLastUpdated": "2019-05-10T11:45:00-04:00", + "DatePublic": "2018-11-05T00:00:00", + "Description": "CVE-2018-12037\nThere is no cryptographic relation between the password provided by the end user and the key used for the encryption of user data. This can allow an attacker to access the key without knowing the password provided by the end user, allowing the attacker to decrypt information encrypted with that key. According to National Cyber Security Centre - The Netherlands (NCSC-NL), the following products are affected by\u00a0CVE-2018-12037: Crucial (Micron) MX100, MX200 and MX300 drives\nSamsung T3 and T5 portable drives\nSamsung 840 EVO and 850 EVO drives (In \"ATA high\"\u00a0mode these devices are vulnerable, In \"TCG\" or \"ATA max\" mode these devices are NOT vulnerable.) CVE-2018-12038\nKey information is stored within a wear-leveled storage chip. Wear-leveling does not guarantee that an old copy of updated data is fully removed. If the updated data is written to a new segment, old versions of data may exist in the previous segment for some time after it has been updated (until that previous segment is overwritten). This means that if a key is updated with a new password, the previous version of the key (either unprotected, or with an old password) could be accessible, negating the need to know the updated password. According to NCSC-NL, the following products are affected by\u00a0CVE-2018-12038: Samsung 840 EVO drives Other products were not reported to have been tested, and similar vulnerabilities may be found in those products.", "ID": "VU#395981", "IDNumber": "395981", "IPProtocol": "", "Impact": "These vulnerabilities allow for full recovery of the data without knowledge of any secret, when the attacker has physical access to the drive.", "Keywords": "VU#760533", - "Overview": "There are multiple vulnerabilities in implementations of the TCG Opal standard with Self-Encrypting Disks (SEDs), which can allow an attacker to decrypt contents of an encrypted drive.", + "Overview": "There are multiple vulnerabilities in implementations of ATA Security or TCG Opal Standards in Self-Encrypting Disks (SEDs), which can allow an attacker to decrypt contents of an encrypted drive.", "References": [ "https://www.ru.nl/english/news-agenda/news/vm/icis/cyber-security/2018/radboud-university-researchers-discover-security/", - "https://twitter.com/matthew_d_green/status/1059435094421712896", + "https://www.ru.nl/publish/pages/909282/draft-paper.pdf", + "https://www.ncsc.nl/dienstverlening/response-op-dreigingen-en-incidenten/beveiligingsadviezen/NCSC-2018-0984+1.00+Meerdere+kwetsbaarheden+ontdekt+in+implementaties+Self-Encrypting+Drives.html", + "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180028", "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj679890(v=ws.11)#configure-use-of-hardware-based-encryption-for-fixed-data-drives", "https://www.samsung.com/semiconductor/minisite/ssd/support/consumer-notice/", - "https://www.ncsc.nl/dienstverlening/response-op-dreigingen-en-incidenten/beveiligingsadviezen/NCSC-2018-0984+1.00+Meerdere+kwetsbaarheden+ontdekt+in+implementaties+Self-Encrypting+Drives.html (in Dutch)" + "https://www.crucial.com/usa/en/support-ssd-firmware/", + "https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-hdefxd", + "https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-hdeosd", + "https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-hderdd" ], - "Resolution": "Apply patches when they are available.", - "Revision": 23, + "Resolution": "Apply patches\nVendors have issued patches to address the vulnerabilities. See the Vendor pages below for additional information.", + "Revision": 62, "SystemsAffectedPreamble": "", - "ThanksAndCredit": "Thanks to National Cyber Security Centre - The Netherlands for leading the coordination of this vulnerability.", - "Title": "Self-Encrypting Drives have multiple vulnerabilities.", + "ThanksAndCredit": "Thanks to Carlo Meijer and Bernard van Gastel for reporting these vulnerabilities and the National Cyber Security Centre of the Netherlands for leading the coordination of this vulnerability.", + "Title": "Self-encrypting hard drives do not adequately protect data", "US-CERTTechnicalAlert": "", "VRDA_D1_DirectReport": "0", "VRDA_D1_Impact": "4", "VRDA_D1_Population": "4", "VulnerabilityCount": 1, - "Workarounds": "If patches are not able to be deployed, consider the following work arounds: Use software-based encryption rather than hardware-based encryption provided by hard drives." + "Workarounds": "If patches are not able to be deployed, consider the following workarounds: Do not use drive-based encryption\nUse software-based encryption rather than the hardware-based encryption provided by self-encrypting drives. Additional Information: According to NCSC-NL, BitLocker as bundled with\u00a0Microsoft Windows relies on hardware full-disk encryption by default if the drive indicates that it can support this. To determine whether BitLocker is using hardware-based encryption or software-based encryption: Run \"manage-bde.exe -status\" in an administrator command prompt. If the \"Encryption Method\" starts with \"Hardware Encryption\", then BitLocker is using the self-encrypting disk's hardware-based encryption implementation. If the \"Encryption Method\" states something other than \"Hardware Encryption\", such as \"AES-128\" or \"XTS AES-256\", then BitLocker is using software-based encryption. BitLocker's default encryption method can be controlled with Group Policy settings. Configure these settings to force BitLocker to use software-based encryption by default. Once these policy settings have been changed, BitLocker needs to be disabled and re-enabled to re-encrypt the drive with software-based encryption (if not already using software-based encryption). Group policy links to control hardware-based BitLocker encryption: Fixed data drives: https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-hdefxd\nOS drives: https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-hdeosd\nRemovable drives: https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-hderdd" } \ No newline at end of file diff --git a/data/81/vu_531281/vendor_ehak-b84lkh.json b/data/81/vu_531281/vendor_ehak-b84lkh.json new file mode 100644 index 0000000000..1aeba4a654 --- /dev/null +++ b/data/81/vu_531281/vendor_ehak-b84lkh.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2019-01-04T10:50:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#531281", + "Revision": 1, + "Status": "Affected", + "Vendor": "Microsoft", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "EHAK-B84LKH", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/81/vu_531281/vu_531281.json b/data/81/vu_531281/vu_531281.json new file mode 100644 index 0000000000..979e6fde43 --- /dev/null +++ b/data/81/vu_531281/vu_531281.json @@ -0,0 +1,68 @@ +{ + "Author": "This document was written by Eric Hatleback.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "CVE-2018-8626", + "CVSS_AccessComplexity": "L", + "CVSS_AccessVector": "N", + "CVSS_Authenication": "N", + "CVSS_AvailabilityImpact": "P", + "CVSS_BaseScore": 9.7, + "CVSS_BaseVector": "AV:N/AC:L/Au:N/C:C/I:C/A:P", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 9.66818146224, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "C", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 9.7, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-01-03T15:31:42-05:00", + "DateFirstPublished": "2019-01-04T13:01:12-05:00", + "DateLastUpdated": "2019-01-07T10:10:00-05:00", + "DatePublic": "2018-11-12T00:00:00", + "Description": "CWE-122: Heap-based Buffer Overflow - CVE-2018-8626 Microsoft Windows Domain Name System (DNS) servers are vulnerable to heap overflow attacks. Microsoft acknowledges that \"an attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account.\" This remote code execution vulnerability exists in Windows DNS servers when they fail to properly handle requests.", + "ID": "VU#531281", + "IDNumber": "531281", + "IPProtocol": "", + "Impact": "Windows servers that are configured as DNS servers are at risk from this vulnerability. A successful attack could allow the execution of arbitrary code. Symantec also notes that an unsuccessful attack results in a denial-of-service.", + "Keywords": [ + "Microsoft", + "Windows", + "heap overflow", + "DNS" + ], + "Overview": "Microsoft Windows DNS servers are vulnerable to heap overflow attacks, enabling unauthenticated attackers to send malicious requests to affected servers.", + "References": [ + "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8626", + "https://cwe.mitre.org/data/definitions/122.html", + "https://www.symantec.com/security-center/vulnerabilities/writeup/106076", + "https://www.us-cert.gov/ncas/current-activity/2018/12/11/Microsoft-Releases-December-2018-Security-Updates" + ], + "Resolution": "Apply an update Apply the security update available from Microsoft.", + "Revision": 13, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "Thanks to Mitch Adair from Microsoft for reporting this vulnerability.", + "Title": "Microsoft Windows DNS servers are vulnerable to heap overflow", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/81/vu_631381/vu_631381.json b/data/81/vu_631381/vu_631381.json new file mode 100644 index 0000000000..fccdf76a49 --- /dev/null +++ b/data/81/vu_631381/vu_631381.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-05-01T07:45:57-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-02T16:30:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#631381", + "IDNumber": "631381", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 4, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Silicom PE310G4I71L vulnerable to DoS", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/84/vu_991084/vu_991084.json b/data/84/vu_991084/vu_991084.json index f08c7b2b43..7dae111a79 100644 --- a/data/84/vu_991084/vu_991084.json +++ b/data/84/vu_991084/vu_991084.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2006-06-01T13:06:02-04:00", "DateFirstPublished": "", "DateLastUpdated": "2006-06-01T13:17:00-04:00", diff --git a/data/88/vu_990988/vu_990988.json b/data/88/vu_990988/vu_990988.json index 310a0205fa..ccbb31ece6 100644 --- a/data/88/vu_990988/vu_990988.json +++ b/data/88/vu_990988/vu_990988.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2003-07-24T10:11:13-04:00", "DateFirstPublished": "", "DateLastUpdated": "2003-08-19T16:39:00-04:00", diff --git a/data/89/vu_828589/vu_828589.json b/data/89/vu_828589/vu_828589.json new file mode 100644 index 0000000000..79acc5c90f --- /dev/null +++ b/data/89/vu_828589/vu_828589.json @@ -0,0 +1,65 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-02-27T13:11:28-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-03-14T09:34:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#828589", + "IDNumber": "828589", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": [ + "VCALL-43744", + "Will Dormann" + ], + "Overview": "", + "References": [ + "https://www.zdnet.com/article/thunderclap-flaws-impact-how-windows-mac-linux-handle-thunderbolt-peripherals/", + "https://www.theverge.com/2019/2/27/18243503/thunderclap-vulnerability-thunderbolt-computers-attack", + "https://appleinsider.com/articles/19/02/27/thunderbolt-3-thunderclap-vulnerabilities-let-malicious-peripherals-attack-a-macs-memory" + ], + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 4, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Intel Thunderbolt 3 peripherals vulnerable to memory attacks", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/89/vu_886989/vendor_cheu-b55nad.json b/data/89/vu_886989/vendor_cheu-b55nad.json new file mode 100644 index 0000000000..3689027b55 --- /dev/null +++ b/data/89/vu_886989/vendor_cheu-b55nad.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2018-10-01T13:17:19-04:00", + "DateNotified": "2018-10-01T13:15:12-04:00", + "DateResponded": "", + "ID": "VU#886989", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Apple", + "VendorInformation": "", + "VendorRecordID": "CHEU-B55NAD", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/89/vu_886989/vu_886989.json b/data/89/vu_886989/vu_886989.json new file mode 100644 index 0000000000..25f297a0f4 --- /dev/null +++ b/data/89/vu_886989/vu_886989.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-10-01T08:10:19-04:00", + "DateFirstPublished": "", + "DateLastUpdated": "2018-12-11T09:18:00-05:00", + "DatePublic": "", + "Description": "", + "ID": "VU#886989", + "IDNumber": "886989", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "[VRF#18-09-MJRDQ]", + "Overview": "Mac OS and iOS vulnerable to MITM due to DHCP config", + "References": "https://support.apple.com/HT209341", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 9, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Mac OS and iOS vulnerable to MITM due to DHCP config", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/9/vu_882709/vu_882709.json b/data/9/vu_882709/vu_882709.json new file mode 100644 index 0000000000..c53ce9eb62 --- /dev/null +++ b/data/9/vu_882709/vu_882709.json @@ -0,0 +1,64 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": [ + "CVE-2018-19487", + "CVE-2018-19488" + ], + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-11-26T07:47:08-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-01-15T12:37:00-05:00", + "DatePublic": "", + "Description": "", + "ID": "VU#882709", + "IDNumber": "882709", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": [ + "[VRF#18-11-JKPLG]", + "RCE" + ], + "Overview": "", + "References": "https://github.com/Antho59/wp-jobhunt-exploit.", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 4, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "wp-jobhunt plugin for WordPress", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/90/vu_990990/vu_990990.json b/data/90/vu_990990/vu_990990.json index 3555b82ee5..094753863f 100644 --- a/data/90/vu_990990/vu_990990.json +++ b/data/90/vu_990990/vu_990990.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2005-01-11T10:49:42-05:00", "DateFirstPublished": "", "DateLastUpdated": "2005-01-11T11:02:00-05:00", diff --git a/data/93/vu_990793/vu_990793.json b/data/93/vu_990793/vu_990793.json index e3574ec377..320b6e943d 100644 --- a/data/93/vu_990793/vu_990793.json +++ b/data/93/vu_990793/vu_990793.json @@ -12,26 +12,26 @@ "CAM_WidelyKnown": "0", "CERTAdvisory": "", "CVEIDs": "", - "CVSS_AccessComplexity": "", - "CVSS_AccessVector": "", - "CVSS_Authenication": "", - "CVSS_AvailabilityImpact": "", - "CVSS_BaseScore": "", - "CVSS_BaseVector": "", - "CVSS_CollateralDamagePotential": "", - "CVSS_ConfidentialityImpact": "", - "CVSS_EnvironmentalScore": "", - "CVSS_EnvironmentalVector": "", - "CVSS_Exploitability": "", - "CVSS_IntegrityImpact": "", - "CVSS_RemediationLevel": "", - "CVSS_ReportConfidence": "", - "CVSS_SecurityRequirementsAR": "", - "CVSS_SecurityRequirementsCR": "", - "CVSS_SecurityRequirementsIR": "", - "CVSS_TargetDistribution": "", - "CVSS_TemporalScore": "", - "CVSS_TemporalVector": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "Not Defined (ND)", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)", + "CVSS_Exploitability": "Not Defined (ND)", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "Not Defined (ND)", + "CVSS_ReportConfidence": "Not Defined (ND)", + "CVSS_SecurityRequirementsAR": "Not Defined (ND)", + "CVSS_SecurityRequirementsCR": "Not Defined (ND)", + "CVSS_SecurityRequirementsIR": "Not Defined (ND)", + "CVSS_TargetDistribution": "Not Defined (ND)", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:Not Defined (ND)/RL:Not Defined (ND)/RC:Not Defined (ND)", "DateCreated": "2002-12-16T13:03:33-05:00", "DateFirstPublished": "", "DateLastUpdated": "2002-12-16T13:04:00-05:00", diff --git a/data/96/vu_197496/vendor_cheu-b7bkth.json b/data/96/vu_197496/vendor_cheu-b7bkth.json new file mode 100644 index 0000000000..6a0e50465b --- /dev/null +++ b/data/96/vu_197496/vendor_cheu-b7bkth.json @@ -0,0 +1,14 @@ +{ + "Addendum": "", + "DateLastUpdated": "2018-12-10T10:11:09-05:00", + "DateNotified": "2018-12-06T17:12:28-05:00", + "DateResponded": "", + "ID": "VU#197496", + "Revision": 0, + "Status": "Unknown", + "Vendor": "Apple", + "VendorInformation": "", + "VendorRecordID": "CHEU-B7BKTH", + "VendorReferences": "", + "VendorStatement": "" +} \ No newline at end of file diff --git a/data/96/vu_197496/vu_197496.json b/data/96/vu_197496/vu_197496.json new file mode 100644 index 0000000000..f971db535e --- /dev/null +++ b/data/96/vu_197496/vu_197496.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-12-06T17:08:56-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2018-12-07T16:06:00-05:00", + "DatePublic": "", + "Description": "", + "ID": "VU#197496", + "IDNumber": "197496", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "", + "Overview": "", + "References": "https://github.com/LinusHenze/WebKit-RegEx-Exploit", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 1, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "WebKit use-after-free vulnerability in regex javascript", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/97/vu_228297/vendor_wdon-b7msfb.json b/data/97/vu_228297/vendor_wdon-b7msfb.json new file mode 100644 index 0000000000..a5d197b6c0 --- /dev/null +++ b/data/97/vu_228297/vendor_wdon-b7msfb.json @@ -0,0 +1,14 @@ +{ + "Addendum": "There are no additional comments at this time.", + "DateLastUpdated": "2018-12-20T15:50:00-05:00", + "DateNotified": "", + "DateResponded": "", + "ID": "VU#228297", + "Revision": 1, + "Status": "Affected", + "Vendor": "Microsoft", + "VendorInformation": "We are not aware of further vendor information regarding this vulnerability.", + "VendorRecordID": "WDON-B7MSFB", + "VendorReferences": "None", + "VendorStatement": "No statement is currently available from the vendor regarding this vulnerability." +} \ No newline at end of file diff --git a/data/97/vu_228297/vu_228297.json b/data/97/vu_228297/vu_228297.json new file mode 100644 index 0000000000..1f41ed2ae9 --- /dev/null +++ b/data/97/vu_228297/vu_228297.json @@ -0,0 +1,61 @@ +{ + "Author": "This document was written by Will Dormann.", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "L", + "CVSS_AccessVector": "L", + "CVSS_Authenication": "S", + "CVSS_AvailabilityImpact": "N", + "CVSS_BaseScore": 4.6, + "CVSS_BaseVector": "AV:L/AC:L/Au:S/C:C/I:N/A:N", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "C", + "CVSS_EnvironmentalScore": 4.3333685472, + "CVSS_EnvironmentalVector": "CDP:ND/TD:H/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "F", + "CVSS_IntegrityImpact": "N", + "CVSS_RemediationLevel": "U", + "CVSS_ReportConfidence": "C", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "H", + "CVSS_TemporalScore": 4.4, + "CVSS_TemporalVector": "E:F/RL:U/RC:C", + "DateCreated": "2018-12-20T15:30:16-05:00", + "DateFirstPublished": "2018-12-20T15:50:49-05:00", + "DateLastUpdated": "2018-12-20T16:11:00-05:00", + "DatePublic": "2018-12-19T00:00:00", + "Description": "The Microsoft Windows MsiAdvertiseProduct function allows a Windows installer product to generate a script to advertise a product to Windows, which handles shortcut and registry information associated with an installed application. The MsiAdvertiseProduct contains a race condition while performing checks, which can allow an attacker to read an arbitrary file which would otherwise be protected with filesystem ACLs. Exploit code for this vulnerability is publicly available.", + "ID": "VU#228297", + "IDNumber": "228297", + "IPProtocol": "", + "Impact": "By calling the MsiAdvertiseProduct function in a crafted way, an authenticated attacker may be able to read files that would otherwise be restricted through filesystem ACLs.", + "Keywords": "", + "Overview": "The Microsoft Windows MsiAdvertiseProduct function contains a race-condition vulnerability, which can allow an authentication attacker to elevate privileges to read protected files.", + "References": [ + "https://technet.microsoft.com/fr-fr/aa370056(v=vs.71)", + "https://www.bleepingcomputer.com/news/security/windows-zero-day-poc-lets-you-read-any-file-with-system-level-access/" + ], + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 11, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "This vulnerability was publicly disclosed by SandboxEscaper.", + "Title": "Microsoft Windows MsiAdvertiseProduct function vulnerable to privilege escalation via race condition", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "2", + "VRDA_D1_Population": "4", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/97/vu_341597/vu_341597.json b/data/97/vu_341597/vu_341597.json new file mode 100644 index 0000000000..39b43d54aa --- /dev/null +++ b/data/97/vu_341597/vu_341597.json @@ -0,0 +1,63 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2019-01-02T13:16:33-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-01-07T14:50:00-05:00", + "DatePublic": "", + "Description": "Patreon Plugin for WordPress /patreon-authorization/ state Parameter Insecure Deserialization Object Injection Remote Code Execution Patreon Plugin for WordPress contains a flaw in the/patreon-authorization/ script that is triggered as user-supplied input passed via the 'state' parameter is insecurely used in an unserialize call. This may allow a remote \nattacker to inject arbitrary objects and potentially execute arbitrary code.", + "ID": "VU#341597", + "IDNumber": "341597", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": [ + "Patreon Plugin", + "WordPress", + "RCE", + "VU#361155" + ], + "Overview": "Patreon Plugin for WordPress vulnerable to RCE", + "References": "Update Both packages: https://www.patreondevelopers.com/t/errors-again-and-site-down-after-latest-update-1-2-1/1254/4", + "Resolution": "Update both packages: Patreon WordPress 3.0.6 and Patron Pro 1.2.2", + "Revision": 2, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Patreon Plugin for WordPress vulnerable to RCE", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "0", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/97/vu_709897/vu_709897.json b/data/97/vu_709897/vu_709897.json new file mode 100644 index 0000000000..b50fec4c2b --- /dev/null +++ b/data/97/vu_709897/vu_709897.json @@ -0,0 +1,58 @@ +{ + "Author": "This document was written by [Unassigned].", + "CAM_AttackerAccessRequired": "0", + "CAM_EaseOfExploitation": "0", + "CAM_Exploitation": "0", + "CAM_Impact": "0", + "CAM_InternetInfrastructure": "0", + "CAM_Population": "0", + "CAM_ScoreCurrent": 0, + "CAM_ScoreCurrentWidelyKnown": 0, + "CAM_ScoreCurrentWidelyKnownExploited": 0, + "CAM_WidelyKnown": "0", + "CERTAdvisory": "", + "CVEIDs": "", + "CVSS_AccessComplexity": "--", + "CVSS_AccessVector": "--", + "CVSS_Authenication": "--", + "CVSS_AvailabilityImpact": "--", + "CVSS_BaseScore": 0, + "CVSS_BaseVector": "AV:--/AC:--/Au:--/C:--/I:--/A:--", + "CVSS_CollateralDamagePotential": "ND", + "CVSS_ConfidentialityImpact": "--", + "CVSS_EnvironmentalScore": 0, + "CVSS_EnvironmentalVector": "CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND", + "CVSS_Exploitability": "ND", + "CVSS_IntegrityImpact": "--", + "CVSS_RemediationLevel": "ND", + "CVSS_ReportConfidence": "ND", + "CVSS_SecurityRequirementsAR": "ND", + "CVSS_SecurityRequirementsCR": "ND", + "CVSS_SecurityRequirementsIR": "ND", + "CVSS_TargetDistribution": "ND", + "CVSS_TemporalScore": 0, + "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", + "DateCreated": "2018-12-28T13:00:21-05:00", + "DateFirstPublished": "", + "DateLastUpdated": "2019-05-02T19:21:00-04:00", + "DatePublic": "", + "Description": "", + "ID": "VU#709897", + "IDNumber": "709897", + "IPProtocol": "", + "Impact": "The complete impact of this vulnerability is not yet known.", + "Keywords": "VCALL-42502", + "Overview": "", + "References": "https://www.juniper.net/documentation/en_US/release-independent/solutions/information-products/pathway-pages/bgp-rpki-tn.pdf", + "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", + "Revision": 7, + "SystemsAffectedPreamble": "", + "ThanksAndCredit": "", + "Title": "Juniper JunOS RPKI denial of service PR1309944", + "US-CERTTechnicalAlert": "", + "VRDA_D1_DirectReport": "1", + "VRDA_D1_Impact": "", + "VRDA_D1_Population": "", + "VulnerabilityCount": 1, + "Workarounds": "" +} \ No newline at end of file diff --git a/data/97/vu_955397/vu_955397.json b/data/97/vu_955397/vu_955397.json index fc9449b036..a3b2f477f7 100644 --- a/data/97/vu_955397/vu_955397.json +++ b/data/97/vu_955397/vu_955397.json @@ -34,7 +34,7 @@ "CVSS_TemporalVector": "E:ND/RL:ND/RC:ND", "DateCreated": "2018-10-12T13:10:25-04:00", "DateFirstPublished": "", - "DateLastUpdated": "2018-10-12T13:41:00-04:00", + "DateLastUpdated": "2019-01-22T09:57:00-05:00", "DatePublic": "", "Description": "", "ID": "VU#955397", @@ -48,7 +48,7 @@ "Overview": "", "References": "https://www.exploit-db.com/exploits/45542/", "Resolution": "The CERT/CC is currently unaware of a practical solution to this problem.", - "Revision": 4, + "Revision": 5, "SystemsAffectedPreamble": "", "ThanksAndCredit": "", "Title": "Imperva SecureSphere 13 - RCE",