diff --git a/2013/3xxx/CVE-2013-3322.json b/2013/3xxx/CVE-2013-3322.json index 9e1b625b00a..4ad03daa284 100644 --- a/2013/3xxx/CVE-2013-3322.json +++ b/2013/3xxx/CVE-2013-3322.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3322", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NetApp OnCommand System Manager 2.1 and earlier allows remote attackers to inject arbitrary commands in the Halt/Reboot interface." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.securityfocus.com/archive/1/526552", + "url": "https://www.securityfocus.com/archive/1/526552" + }, + { + "refsource": "XF", + "name": "84063", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84063" } ] } diff --git a/2013/5xxx/CVE-2013-5112.json b/2013/5xxx/CVE-2013-5112.json index 1fd5d961551..dc4cfa08637 100644 --- a/2013/5xxx/CVE-2013-5112.json +++ b/2013/5xxx/CVE-2013-5112.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5112", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Evernote before 5.5.1 has insecure PIN storage" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89735", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89735" + }, + { + "refsource": "MISC", + "name": "https://blog.c22.cc/advisories/cve-2013-5112-evernote-android-insecure-storage-of-pin-data-bypass-of-pin-protection/", + "url": "https://blog.c22.cc/advisories/cve-2013-5112-evernote-android-insecure-storage-of-pin-data-bypass-of-pin-protection/" } ] } diff --git a/2017/12xxx/CVE-2017-12629.json b/2017/12xxx/CVE-2017-12629.json index b871f8cf9fd..a7c88e610f2 100644 --- a/2017/12xxx/CVE-2017-12629.json +++ b/2017/12xxx/CVE-2017-12629.json @@ -146,6 +146,11 @@ "name": "https://twitter.com/joshbressers/status/919258716297420802", "refsource": "MISC", "url": "https://twitter.com/joshbressers/status/919258716297420802" + }, + { + "refsource": "UBUNTU", + "name": "USN-4259-1", + "url": "https://usn.ubuntu.com/4259-1/" } ] } diff --git a/2019/14xxx/CVE-2019-14615.json b/2019/14xxx/CVE-2019-14615.json index c00399a2e98..4c3431e8ff0 100644 --- a/2019/14xxx/CVE-2019-14615.json +++ b/2019/14xxx/CVE-2019-14615.json @@ -63,6 +63,16 @@ "refsource": "UBUNTU", "name": "USN-4255-1", "url": "https://usn.ubuntu.com/4255-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4253-2", + "url": "https://usn.ubuntu.com/4253-2/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4254-2", + "url": "https://usn.ubuntu.com/4254-2/" } ] }, diff --git a/2019/15xxx/CVE-2019-15291.json b/2019/15xxx/CVE-2019-15291.json index 7a2810b11d9..68e1c2a228d 100644 --- a/2019/15xxx/CVE-2019-15291.json +++ b/2019/15xxx/CVE-2019-15291.json @@ -101,6 +101,11 @@ "refsource": "UBUNTU", "name": "USN-4254-1", "url": "https://usn.ubuntu.com/4254-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4254-2", + "url": "https://usn.ubuntu.com/4254-2/" } ] } diff --git a/2019/18xxx/CVE-2019-18683.json b/2019/18xxx/CVE-2019-18683.json index 0b614fa7743..3938e728334 100644 --- a/2019/18xxx/CVE-2019-18683.json +++ b/2019/18xxx/CVE-2019-18683.json @@ -91,6 +91,11 @@ "refsource": "UBUNTU", "name": "USN-4254-1", "url": "https://usn.ubuntu.com/4254-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4254-2", + "url": "https://usn.ubuntu.com/4254-2/" } ] } diff --git a/2019/18xxx/CVE-2019-18885.json b/2019/18xxx/CVE-2019-18885.json index 77d8adee407..1006c29001a 100644 --- a/2019/18xxx/CVE-2019-18885.json +++ b/2019/18xxx/CVE-2019-18885.json @@ -76,6 +76,11 @@ "refsource": "UBUNTU", "name": "USN-4254-1", "url": "https://usn.ubuntu.com/4254-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4254-2", + "url": "https://usn.ubuntu.com/4254-2/" } ] } diff --git a/2019/19xxx/CVE-2019-19057.json b/2019/19xxx/CVE-2019-19057.json index 451636a9027..2f2b4544b35 100644 --- a/2019/19xxx/CVE-2019-19057.json +++ b/2019/19xxx/CVE-2019-19057.json @@ -96,6 +96,11 @@ "refsource": "UBUNTU", "name": "USN-4254-1", "url": "https://usn.ubuntu.com/4254-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4254-2", + "url": "https://usn.ubuntu.com/4254-2/" } ] } diff --git a/2019/19xxx/CVE-2019-19062.json b/2019/19xxx/CVE-2019-19062.json index 942e2f2a758..2509329d559 100644 --- a/2019/19xxx/CVE-2019-19062.json +++ b/2019/19xxx/CVE-2019-19062.json @@ -96,6 +96,11 @@ "refsource": "UBUNTU", "name": "USN-4254-1", "url": "https://usn.ubuntu.com/4254-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4254-2", + "url": "https://usn.ubuntu.com/4254-2/" } ] } diff --git a/2019/19xxx/CVE-2019-19063.json b/2019/19xxx/CVE-2019-19063.json index 981ee417cd8..99bc8f5064e 100644 --- a/2019/19xxx/CVE-2019-19063.json +++ b/2019/19xxx/CVE-2019-19063.json @@ -91,6 +91,11 @@ "refsource": "UBUNTU", "name": "USN-4254-1", "url": "https://usn.ubuntu.com/4254-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4254-2", + "url": "https://usn.ubuntu.com/4254-2/" } ] } diff --git a/2019/19xxx/CVE-2019-19227.json b/2019/19xxx/CVE-2019-19227.json index 67d821aaaaf..7e73e85890f 100644 --- a/2019/19xxx/CVE-2019-19227.json +++ b/2019/19xxx/CVE-2019-19227.json @@ -91,6 +91,11 @@ "refsource": "UBUNTU", "name": "USN-4254-1", "url": "https://usn.ubuntu.com/4254-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4254-2", + "url": "https://usn.ubuntu.com/4254-2/" } ] } diff --git a/2019/19xxx/CVE-2019-19332.json b/2019/19xxx/CVE-2019-19332.json index 552f6dcf570..34c0567d9c7 100644 --- a/2019/19xxx/CVE-2019-19332.json +++ b/2019/19xxx/CVE-2019-19332.json @@ -73,6 +73,11 @@ "refsource": "UBUNTU", "name": "USN-4254-1", "url": "https://usn.ubuntu.com/4254-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4254-2", + "url": "https://usn.ubuntu.com/4254-2/" } ] }, diff --git a/2019/19xxx/CVE-2019-19550.json b/2019/19xxx/CVE-2019-19550.json index 85f4f9dd859..dd8fc91ba7b 100644 --- a/2019/19xxx/CVE-2019-19550.json +++ b/2019/19xxx/CVE-2019-19550.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19550", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19550", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Remote Authentication Bypass in Senior Rubiweb 6.2.34.28 and 6.2.34.37 allows admin access to sensitive information of affected users using vulnerable versions. The attacker only needs to provide the correct URL." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/underprotection/CVE-2019-19550/", + "url": "https://github.com/underprotection/CVE-2019-19550/" } ] } diff --git a/2019/19xxx/CVE-2019-19687.json b/2019/19xxx/CVE-2019-19687.json index 13273728cee..fb2cdc56893 100644 --- a/2019/19xxx/CVE-2019-19687.json +++ b/2019/19xxx/CVE-2019-19687.json @@ -86,6 +86,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:4358", "url": "https://access.redhat.com/errata/RHSA-2019:4358" + }, + { + "refsource": "UBUNTU", + "name": "USN-4262-1", + "url": "https://usn.ubuntu.com/4262-1/" } ] } diff --git a/2020/8xxx/CVE-2020-8440.json b/2020/8xxx/CVE-2020-8440.json index e27cf45a35c..411e31b3c17 100644 --- a/2020/8xxx/CVE-2020-8440.json +++ b/2020/8xxx/CVE-2020-8440.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-8440", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-8440", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "controllers/page_apply.php in Simplejobscript.com SJS through 1.66 is prone to unauthenticated Remote Code Execution by uploading a PHP script as a resume." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/niteosoft/simplejobscript/issues/10", + "url": "https://github.com/niteosoft/simplejobscript/issues/10" } ] }