"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-11-14 22:01:40 +00:00
parent 153fbd8ca4
commit 5b5f895fef
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18980",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On Signify Philips Taolight Smart Wi-Fi Wiz Connected LED Bulb 9290022656 devices, an unprotected API lets remote users control the bulb's operation. Anyone can turn the bulb on or off, or change its color or brightness remotely. There is no authentication or encryption to use the control API. The only requirement is that the attacker have network access to the bulb."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://blog.dammitly.net/2019/10/cheap-hackable-wifi-light-bulbs-or-iot.html",
"refsource": "MISC",
"name": "https://blog.dammitly.net/2019/10/cheap-hackable-wifi-light-bulbs-or-iot.html"
}
]
}
}