diff --git a/2012/6xxx/CVE-2012-6666.json b/2012/6xxx/CVE-2012-6666.json index 6ba4fb94e23..939bfa692ef 100644 --- a/2012/6xxx/CVE-2012-6666.json +++ b/2012/6xxx/CVE-2012-6666.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6666", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "vBSeo before 3.6.0PL2 allows XSS via the member.php u parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/37944", + "url": "https://www.exploit-db.com/exploits/37944" + }, + { + "refsource": "MISC", + "name": "https://www.securityfocus.com/bid/55908", + "url": "https://www.securityfocus.com/bid/55908" } ] } diff --git a/2013/1xxx/CVE-2013-1353.json b/2013/1xxx/CVE-2013-1353.json index 41c0bb1a3cb..ed10d3e123c 100644 --- a/2013/1xxx/CVE-2013-1353.json +++ b/2013/1xxx/CVE-2013-1353.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-1353", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Orange HRM 2.7.1 allows XSS via the vacancy name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/119461/OrangeHRM-2.7.1-Cross-Site-Scripting.html", + "url": "https://packetstormsecurity.com/files/119461/OrangeHRM-2.7.1-Cross-Site-Scripting.html" } ] } diff --git a/2015/0xxx/CVE-2015-0235.json b/2015/0xxx/CVE-2015-0235.json index 42d9e649eb2..9c5bb1e4e15 100644 --- a/2015/0xxx/CVE-2015-0235.json +++ b/2015/0xxx/CVE-2015-0235.json @@ -476,6 +476,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf" } ] } diff --git a/2015/1xxx/CVE-2015-1049.json b/2015/1xxx/CVE-2015-1049.json index db8033b0eb2..ad7660d0b06 100644 --- a/2015/1xxx/CVE-2015-1049.json +++ b/2015/1xxx/CVE-2015-1049.json @@ -56,6 +56,11 @@ "name": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-954136.pdf", "refsource": "CONFIRM", "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-954136.pdf" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-954136.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-954136.pdf" } ] } diff --git a/2015/2xxx/CVE-2015-2177.json b/2015/2xxx/CVE-2015-2177.json index 8d727b99016..29d8967581b 100644 --- a/2015/2xxx/CVE-2015-2177.json +++ b/2015/2xxx/CVE-2015-2177.json @@ -76,6 +76,11 @@ "name": "72973", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72973" + }, + { + "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-987029.pdf", + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-987029.pdf" } ] } diff --git a/2020/8xxx/CVE-2020-8831.json b/2020/8xxx/CVE-2020-8831.json new file mode 100644 index 00000000000..d3aefd13a18 --- /dev/null +++ b/2020/8xxx/CVE-2020-8831.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8831", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8832.json b/2020/8xxx/CVE-2020-8832.json new file mode 100644 index 00000000000..be134800ce6 --- /dev/null +++ b/2020/8xxx/CVE-2020-8832.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8832", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8833.json b/2020/8xxx/CVE-2020-8833.json new file mode 100644 index 00000000000..f9640e67c1c --- /dev/null +++ b/2020/8xxx/CVE-2020-8833.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8833", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8834.json b/2020/8xxx/CVE-2020-8834.json new file mode 100644 index 00000000000..0459ad11d15 --- /dev/null +++ b/2020/8xxx/CVE-2020-8834.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8834", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8835.json b/2020/8xxx/CVE-2020-8835.json new file mode 100644 index 00000000000..81f197e51a6 --- /dev/null +++ b/2020/8xxx/CVE-2020-8835.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-8835", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file