{"containers":{"cna":{"affected":[{"product":"Explorer 710","vendor":"Cobham plc","versions":[{"status":"affected","version":"1.07"}]}],"credits":[{"lang":"en","value":"This issue was found by Kyle O'Meara and David Belasco."}],"datePublic":"2019-10-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"The web application portal of the Cobham EXPLORER 710, firmware version 1.07, sends the login password in cleartext. This could allow an unauthenticated, local attacker to intercept the password and gain access to the portal."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-319","description":"CWE-319: Cleartext Transmission of Sensitive Information","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2019-10-10T20:09:47.000Z","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"references":[{"name":"VU#719689","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"https://kb.cert.org/vuls/id/719689/"}],"source":{"discovery":"UNKNOWN"},"title":"The web application portal of the Cobham EXPLORER 710, firmware version 1.07, sends the login password in cleartext","x_generator":{"engine":"Vulnogram 0.0.8"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cert@cert.org","DATE_PUBLIC":"2019-10-09T04:00:00.000Z","ID":"CVE-2019-9532","STATE":"PUBLIC","TITLE":"The web application portal of the Cobham EXPLORER 710, firmware version 1.07, sends the login password in cleartext"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Explorer 710","version":{"version_data":[{"version_affected":"=","version_name":"1.07","version_value":"1.07"}]}}]},"vendor_name":"Cobham plc"}]}},"credit":[{"lang":"eng","value":"This issue was found by Kyle O'Meara and David Belasco."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The web application portal of the Cobham EXPLORER 710, firmware version 1.07, sends the login password in cleartext. This could allow an unauthenticated, local attacker to intercept the password and gain access to the portal."}]},"generator":{"engine":"Vulnogram 0.0.8"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-319: Cleartext Transmission of Sensitive Information"}]}]},"references":{"reference_data":[{"name":"VU#719689","refsource":"CERT-VN","url":"https://kb.cert.org/vuls/id/719689/"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T21:54:44.525Z"},"title":"CVE Program Container","references":[{"name":"VU#719689","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"https://kb.cert.org/vuls/id/719689/"}]}]},"cveMetadata":{"assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","assignerShortName":"certcc","cveId":"CVE-2019-9532","datePublished":"2019-10-10T20:09:47.739Z","dateReserved":"2019-03-01T00:00:00.000Z","dateUpdated":"2024-09-16T19:30:16.862Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}