cnvd-2015-07288
Vulnerability from cnvd
Title
Janitza UMG存在多个跨站脚本漏洞
Description
Janitza UMG是德国Janitza公司的使用在能源行业中的在线电能质量监测仪。 Janitza UMG 508, 509, 511, 604, 605,存在多个跨站脚本漏洞。允许远程攻击者通过未指定向量,注入任意web脚本或HTML。
Severity
Patch Name
Janitza UMG存在多个跨站脚本漏洞的补丁
Patch Description
Janitza UMG是德国Janitza公司的使用在能源行业中的在线电能质量监测仪。 Janitza UMG 508, 509, 511, 604, 605,存在多个跨站脚本漏洞。允许远程攻击者通过未指定向量,注入任意web脚本或HTML。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可联系供应商获得补丁信息: http://www.janitza.com

Reference
https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03
Impacted products
Name
['Janitza UMG 508', 'Janitza UMG 509', 'Janitza UMG 511', 'Janitza UMG 604', 'Janitza UMG 605']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "77291"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2015-3970"
    }
  },
  "description": "Janitza UMG\u662f\u5fb7\u56fdJanitza\u516c\u53f8\u7684\u4f7f\u7528\u5728\u80fd\u6e90\u884c\u4e1a\u4e2d\u7684\u5728\u7ebf\u7535\u80fd\u8d28\u91cf\u76d1\u6d4b\u4eea\u3002\r\n\r\nJanitza UMG 508, 509, 511, 604, 605\uff0c\u5b58\u5728\u591a\u4e2a\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u672a\u6307\u5b9a\u5411\u91cf\uff0c\u6ce8\u5165\u4efb\u610fweb\u811a\u672c\u6216HTML\u3002",
  "discovererName": "Mattijs van Ommeren",
  "formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://www.janitza.com",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-07288",
  "openTime": "2015-11-05",
  "patchDescription": "Janitza UMG\u662f\u5fb7\u56fdJanitza\u516c\u53f8\u7684\u4f7f\u7528\u5728\u80fd\u6e90\u884c\u4e1a\u4e2d\u7684\u5728\u7ebf\u7535\u80fd\u8d28\u91cf\u76d1\u6d4b\u4eea\u3002 \r\n\r\nJanitza UMG 508, 509, 511, 604, 605\uff0c\u5b58\u5728\u591a\u4e2a\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7\u672a\u6307\u5b9a\u5411\u91cf\uff0c\u6ce8\u5165\u4efb\u610fweb\u811a\u672c\u6216HTML\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Janitza UMG\u5b58\u5728\u591a\u4e2a\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Janitza UMG 508",
      "Janitza UMG  509",
      "Janitza UMG  511",
      "Janitza UMG  604",
      "Janitza UMG  605"
    ]
  },
  "referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03",
  "serverity": "\u4e2d",
  "submitTime": "2015-10-30",
  "title": "Janitza UMG\u5b58\u5728\u591a\u4e2a\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…