From 314d16bb3493f143de3569de0514a1e9773c0312 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 7 Jan 2020 17:01:15 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2013/5xxx/CVE-2013-5637.json | 48 ++++++++++++++++++++++++++-- 2013/5xxx/CVE-2013-5638.json | 53 +++++++++++++++++++++++++++++-- 2013/5xxx/CVE-2013-5656.json | 58 ++++++++++++++++++++++++++++++++-- 2013/5xxx/CVE-2013-5657.json | 58 ++++++++++++++++++++++++++++++++-- 2013/5xxx/CVE-2013-5658.json | 58 ++++++++++++++++++++++++++++++++-- 2019/14xxx/CVE-2019-14834.json | 7 ++-- 2019/14xxx/CVE-2019-14837.json | 7 ++-- 2019/14xxx/CVE-2019-14843.json | 5 +-- 2019/14xxx/CVE-2019-14854.json | 5 +-- 2019/14xxx/CVE-2019-14866.json | 12 ++++--- 2019/14xxx/CVE-2019-14879.json | 11 ++++--- 2020/6xxx/CVE-2020-6157.json | 18 +++++++++++ 2020/6xxx/CVE-2020-6158.json | 18 +++++++++++ 2020/6xxx/CVE-2020-6159.json | 18 +++++++++++ 2020/6xxx/CVE-2020-6160.json | 18 +++++++++++ 2020/6xxx/CVE-2020-6161.json | 18 +++++++++++ 16 files changed, 383 insertions(+), 29 deletions(-) create mode 100644 2020/6xxx/CVE-2020-6157.json create mode 100644 2020/6xxx/CVE-2020-6158.json create mode 100644 2020/6xxx/CVE-2020-6159.json create mode 100644 2020/6xxx/CVE-2020-6160.json create mode 100644 2020/6xxx/CVE-2020-6161.json diff --git a/2013/5xxx/CVE-2013-5637.json b/2013/5xxx/CVE-2013-5637.json index f472fff0933..73d4cc62a2a 100644 --- a/2013/5xxx/CVE-2013-5637.json +++ b/2013/5xxx/CVE-2013-5637.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5637", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PQI AirCard has persistent XSS" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://firmware.re/vulns/acsa-2013-007.php", + "url": "http://firmware.re/vulns/acsa-2013-007.php" } ] } diff --git a/2013/5xxx/CVE-2013-5638.json b/2013/5xxx/CVE-2013-5638.json index ca735d93813..0bd840ddeb6 100644 --- a/2013/5xxx/CVE-2013-5638.json +++ b/2013/5xxx/CVE-2013-5638.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5638", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Transcend WiFiSD 1.8 has persistent XSS" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://firmware.re/usenixsec14/", + "refsource": "MISC", + "name": "http://firmware.re/usenixsec14/" + }, + { + "refsource": "MISC", + "name": "http://firmware.re/vulns/acsa-2013-006.php", + "url": "http://firmware.re/vulns/acsa-2013-006.php" } ] } diff --git a/2013/5xxx/CVE-2013-5656.json b/2013/5xxx/CVE-2013-5656.json index fe0c809e084..147e399685f 100644 --- a/2013/5xxx/CVE-2013-5656.json +++ b/2013/5xxx/CVE-2013-5656.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5656", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FuzeZip 1.0.0.131625 has a Local Buffer Overflow vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://realpentesting.blogspot.com.es/p/advisories.html", + "refsource": "MISC", + "name": "http://realpentesting.blogspot.com.es/p/advisories.html" + }, + { + "url": "http://www.exploit-db.com/exploits/25130", + "refsource": "MISC", + "name": "http://www.exploit-db.com/exploits/25130" + }, + { + "url": "http://seclists.org/fulldisclosure/2013/Sep/8", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2013/Sep/8" } ] } diff --git a/2013/5xxx/CVE-2013-5657.json b/2013/5xxx/CVE-2013-5657.json index 908513a675e..f179add53b9 100644 --- a/2013/5xxx/CVE-2013-5657.json +++ b/2013/5xxx/CVE-2013-5657.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5657", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "AultWare pwStore 2010.8.30.0 has DoS via an empty HTTP request" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://realpentesting.blogspot.com.es/p/advisories.html", + "refsource": "MISC", + "name": "http://realpentesting.blogspot.com.es/p/advisories.html" + }, + { + "url": "http://seclists.org/fulldisclosure/2013/Sep/8", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2013/Sep/8" + }, + { + "refsource": "MISC", + "name": "https://www.securityfocus.com/bid/62112", + "url": "https://www.securityfocus.com/bid/62112" } ] } diff --git a/2013/5xxx/CVE-2013-5658.json b/2013/5xxx/CVE-2013-5658.json index f444cb3e5b5..ecc777196df 100644 --- a/2013/5xxx/CVE-2013-5658.json +++ b/2013/5xxx/CVE-2013-5658.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5658", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "AultWare pwStore 2010.8.30.0 has XSS" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://realpentesting.blogspot.com.es/p/advisories.html", + "refsource": "MISC", + "name": "http://realpentesting.blogspot.com.es/p/advisories.html" + }, + { + "url": "http://seclists.org/fulldisclosure/2013/Sep/8", + "refsource": "MISC", + "name": "http://seclists.org/fulldisclosure/2013/Sep/8" + }, + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/123049/PWStore-2010.8.30.0-Cross-Site-Scripting-Denial-Of-Service.html", + "url": "https://packetstormsecurity.com/files/123049/PWStore-2010.8.30.0-Cross-Site-Scripting-Denial-Of-Service.html" } ] } diff --git a/2019/14xxx/CVE-2019-14834.json b/2019/14xxx/CVE-2019-14834.json index ca9b7f9908c..79e0554a6bb 100644 --- a/2019/14xxx/CVE-2019-14834.json +++ b/2019/14xxx/CVE-2019-14834.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14834", - "ASSIGNER": "psampaio@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -18,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "2.81" + "version_value": "before 2.81" } ] } @@ -73,4 +74,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14837.json b/2019/14xxx/CVE-2019-14837.json index ecdaaa33035..3647efd1e90 100644 --- a/2019/14xxx/CVE-2019-14837.json +++ b/2019/14xxx/CVE-2019-14837.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14837", - "ASSIGNER": "psampaio@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -18,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "8.0.0" + "version_value": "before 8.0.0" } ] } @@ -78,4 +79,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14843.json b/2019/14xxx/CVE-2019-14843.json index a9fc4842185..84f822d36cc 100644 --- a/2019/14xxx/CVE-2019-14843.json +++ b/2019/14xxx/CVE-2019-14843.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14843", - "ASSIGNER": "psampaio@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -68,4 +69,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14854.json b/2019/14xxx/CVE-2019-14854.json index db338dbb077..0afc5892577 100644 --- a/2019/14xxx/CVE-2019-14854.json +++ b/2019/14xxx/CVE-2019-14854.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14854", - "ASSIGNER": "psampaio@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -68,4 +69,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14866.json b/2019/14xxx/CVE-2019-14866.json index ed7d53e4644..82eae2f0408 100644 --- a/2019/14xxx/CVE-2019-14866.json +++ b/2019/14xxx/CVE-2019-14866.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14866", - "ASSIGNER": "gsuckevi@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -49,11 +50,14 @@ "refsource": "CONFIRM" }, { - "url": "https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html" - + "url": "https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html" }, { - "url": "https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html" + "url": "https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html" } ] }, diff --git a/2019/14xxx/CVE-2019-14879.json b/2019/14xxx/CVE-2019-14879.json index 4e98177c355..e98e8b71f9c 100644 --- a/2019/14xxx/CVE-2019-14879.json +++ b/2019/14xxx/CVE-2019-14879.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14879", - "ASSIGNER": "darunesh@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -18,13 +19,13 @@ "version": { "version_data": [ { - "version_value": "3.7.3" + "version_value": "before 3.7.3" }, { - "version_value": "3.6.7" + "version_value": "before 3.6.7" }, { - "version_value": "3.5.9" + "version_value": "before 3.5.9" } ] } @@ -60,7 +61,7 @@ "description_data": [ { "lang": "eng", - "value": "moodle before versions 3.7.3, 3.6.7, 3.5.9 is vulnerable to a None" + "value": "moodle before versions 3.7.3, 3.6.7, 3.5.9 is vulnerable to a None." } ] }, diff --git a/2020/6xxx/CVE-2020-6157.json b/2020/6xxx/CVE-2020-6157.json new file mode 100644 index 00000000000..56b7122fe70 --- /dev/null +++ b/2020/6xxx/CVE-2020-6157.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6157", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6158.json b/2020/6xxx/CVE-2020-6158.json new file mode 100644 index 00000000000..651aebdc94b --- /dev/null +++ b/2020/6xxx/CVE-2020-6158.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6158", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6159.json b/2020/6xxx/CVE-2020-6159.json new file mode 100644 index 00000000000..cb7a0029a66 --- /dev/null +++ b/2020/6xxx/CVE-2020-6159.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6159", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6160.json b/2020/6xxx/CVE-2020-6160.json new file mode 100644 index 00000000000..8ed3c941e33 --- /dev/null +++ b/2020/6xxx/CVE-2020-6160.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6160", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6161.json b/2020/6xxx/CVE-2020-6161.json new file mode 100644 index 00000000000..b1da5f29c3a --- /dev/null +++ b/2020/6xxx/CVE-2020-6161.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-6161", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file