Skip to content

Commit ee432b5

Browse files
committed
change
1 parent e346d39 commit ee432b5

File tree

1 file changed

+48
-48
lines changed

1 file changed

+48
-48
lines changed

advisories.xml

+48-48
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,54 @@
66
<language>en</language>
77
<atom:link href="https://ics-cert.us-cert.gov/advisories/advisories.xml" rel="self" type="application/rss+xml" />
88
<item>
9+
<title>LCDS - Leão Consultoria e Desenvolvimento de Sistemas LTDA ME LAquis SCADA</title>
10+
<link>https://ics-cert.us-cert.gov/advisories/ICSA-17-082-01</link>
11+
<description>This advisory contains mitigation details for a path traversal vulnerability in the LCDS - Leão Consultoria e Desenvolvimento de Sistemas LTDA ME LAquis SCADA software.</description>
12+
<pubDate>Thu, 23 Mar 2017 10:05:21 EDT</pubDate>
13+
<dc:creator>Advisory Document</dc:creator>
14+
<guid isPermaLink="false">/node/2297</guid>
15+
</item>
16+
<item>
17+
<title>BD Kiestra PerformA and KLA Journal Service Applications Hard-Coded Passwords Vulnerability</title>
18+
<link>https://ics-cert.us-cert.gov/advisories/ICSMA-17-082-01</link>
19+
<description>This advisory contains mitigation details for a hard-coded password vulnerability in the Becton, Dickinson and Company (BD) Kiestra PerformA and KLA Journal Service applications that access the BD Kiestra Database.</description>
20+
<pubDate>Thu, 23 Mar 2017 10:00:52 EDT</pubDate>
21+
<dc:creator>Advisory Document</dc:creator>
22+
<guid isPermaLink="false">/node/2302</guid>
23+
</item>
24+
<item>
25+
<title>Rockwell Automation Connected Components Workbench</title>
26+
<link>https://ics-cert.us-cert.gov/advisories/ICSA-17-047-01</link>
27+
<description>This advisory was originally posted to the NCCIC Portal on February 16, 2017, and is being released to the ICS-CERT web site. This advisory contains mitigation details for a DLL hijack vulnerability in Rockwell Automation’s Connected Components Workbench.</description>
28+
<pubDate>Tue, 21 Mar 2017 10:10:05 EDT</pubDate>
29+
<dc:creator>Advisory Document</dc:creator>
30+
<guid isPermaLink="false">/node/2285</guid>
31+
</item>
32+
<item>
33+
<title>Rockwell Automation FactoryTalk Activation</title>
34+
<link>https://ics-cert.us-cert.gov/advisories/ICSA-17-047-02</link>
35+
<description>This advisory was originally posted to the NCCIC Portal on February 16, 2017, and is being released to the ICS-CERT web site. This advisory contains mitigation details for an unquoted search path or element vulnerability in Rockwell Automation’s FactoryTalk Activation.</description>
36+
<pubDate>Tue, 21 Mar 2017 10:00:04 EDT</pubDate>
37+
<dc:creator>Advisory Document</dc:creator>
38+
<guid isPermaLink="false">/node/2289</guid>
39+
</item>
40+
<item>
41+
<title>LCDS - Leão Consultoria e Desenvolvimento de Sistemas LTDA ME LAquis SCADA</title>
42+
<link>https://ics-cert.us-cert.gov/advisories/ICSA-17-075-01</link>
43+
<description>This advisory contains mitigation details for an improper access control vulnerability in the LCDS - Leão Consultoria e Desenvolvimento de Sistemas LTDA ME LAquis SCADA software.</description>
44+
<pubDate>Thu, 16 Mar 2017 10:00:53 EDT</pubDate>
45+
<dc:creator>Advisory Document</dc:creator>
46+
<guid isPermaLink="false">/node/2278</guid>
47+
</item>
48+
<item>
49+
<title>Fatek Automation PLC Ethernet Module</title>
50+
<link>https://ics-cert.us-cert.gov/advisories/ICSA-17-073-01</link>
51+
<description>This advisory contains mitigation details for a stack-based buffer overflow vulnerability in Fatek Automation&amp;#039;s PLC Ethernet module.</description>
52+
<pubDate>Tue, 14 Mar 2017 10:00:42 EDT</pubDate>
53+
<dc:creator>Advisory Document</dc:creator>
54+
<guid isPermaLink="false">/node/2271</guid>
55+
</item>
56+
<item>
957
<title>Schneider Electric ClearSCADA</title>
1058
<link>https://ics-cert.us-cert.gov/advisories/ICSA-17-068-01</link>
1159
<description>This advisory contains mitigation details for an input validation vulnerability in Schneider Electric&amp;#039;s ClearSCADA.</description>
@@ -116,54 +164,6 @@
116164
<pubDate>Tue, 07 Feb 2017 10:10:27 EST</pubDate>
117165
<dc:creator>Advisory Document</dc:creator>
118166
<guid isPermaLink="false">/node/2151</guid>
119-
</item>
120-
<item>
121-
<title>BD Alaris 8000 Insufficiently Protected Credentials Vulnerability</title>
122-
<link>https://ics-cert.us-cert.gov/advisories/ICSMA-17-017-01</link>
123-
<description>This advisory was originally posted to the NCCIC Portal on January 17, 2017, and is being released to the NCCIC/ICS-CERT web site. This advisory contains mitigation details for an insufficiently protected credentials vulnerability in BD’s Alaris 8000 Point of Care unit, which provides a common user interface for programming intravenous infusions.</description>
124-
<pubDate>Tue, 07 Feb 2017 10:05:29 EST</pubDate>
125-
<dc:creator>Advisory Document</dc:creator>
126-
<guid isPermaLink="false">/node/2147</guid>
127-
</item>
128-
<item>
129-
<title>BD Alaris 8015 Insufficiently Protected Credentials Vulnerabilities</title>
130-
<link>https://ics-cert.us-cert.gov/advisories/ICSMA-17-017-02</link>
131-
<description>This advisory was originally posted to the NCCIC Portal on January 17, 2017, and is being released to the NCCIC/ICS-CERT web site. This advisory contains mitigation details for protected credentials vulnerabilities in BD’s Alaris 8015 Point of Care unit, which provides a common user interface for programming intravenous infusions.</description>
132-
<pubDate>Tue, 07 Feb 2017 10:00:17 EST</pubDate>
133-
<dc:creator>Advisory Document</dc:creator>
134-
<guid isPermaLink="false">/node/2141</guid>
135-
</item>
136-
<item>
137-
<title>Honeywell XL Web II Controller Vulnerabilities</title>
138-
<link>https://ics-cert.us-cert.gov/advisories/ICSA-17-033-01</link>
139-
<description>This advisory contains mitigation details for vulnerabilities in Honeywell’s XL Web II controller application.</description>
140-
<pubDate>Thu, 02 Feb 2017 10:00:34 EST</pubDate>
141-
<dc:creator>Advisory Document</dc:creator>
142-
<guid isPermaLink="false">/node/2132</guid>
143-
</item>
144-
<item>
145-
<title>BINOM3 Electric Power Quality Meter (Update A)</title>
146-
<link>https://ics-cert.us-cert.gov/advisories/ICSA-17-031-01A</link>
147-
<description>This updated advisory is a follow-up to the original advisory titled ICSA-17-031-01 BINOM3 Electric Power Quality Meter that was published January 31, 2017, on the NCCIC/ICS-CERT web site. This updated advisory contains mitigation details for vulnerabilities in BINOM3&amp;#039;s electric power quality meter.</description>
148-
<pubDate>Tue, 31 Jan 2017 10:10:28 EST</pubDate>
149-
<dc:creator>Advisory Document</dc:creator>
150-
<guid isPermaLink="false">/node/2122</guid>
151-
</item>
152-
<item>
153-
<title>Ecava IntegraXor</title>
154-
<link>https://ics-cert.us-cert.gov/advisories/ICSA-17-031-02</link>
155-
<description>This advisory contains mitigation details for an SQL injection vulnerability in the Ecava IntegraXor web server.</description>
156-
<pubDate>Tue, 31 Jan 2017 10:05:13 EST</pubDate>
157-
<dc:creator>Advisory Document</dc:creator>
158-
<guid isPermaLink="false">/node/2126</guid>
159-
</item>
160-
<item>
161-
<title>Eaton ePDU Path Traversal Vulnerability</title>
162-
<link>https://ics-cert.us-cert.gov/advisories/ICSA-17-026-01</link>
163-
<description>This advisory contains mitigation details for a path traversal vulnerability in certain legacy Eaton ePDUs.</description>
164-
<pubDate>Thu, 26 Jan 2017 10:10:30 EST</pubDate>
165-
<dc:creator>Advisory Document</dc:creator>
166-
<guid isPermaLink="false">/node/2085</guid>
167167
</item>
168168
</channel>
169169
</rss>

0 commit comments

Comments
 (0)