diff --git a/2020/7xxx/CVE-2020-7997.json b/2020/7xxx/CVE-2020-7997.json index 95a9e9d698f..a8d5100c485 100644 --- a/2020/7xxx/CVE-2020-7997.json +++ b/2020/7xxx/CVE-2020-7997.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-7997", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-7997", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ASUS WRT-AC66U 3 RT 3.0.0.4.372_67 devices allow XSS via the Client Name field to the Parental Control feature." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gist.github.com/adeshkolte/983bcadd82cc1fd60333098eb646ef68", + "url": "https://gist.github.com/adeshkolte/983bcadd82cc1fd60333098eb646ef68" } ] } diff --git a/2020/7xxx/CVE-2020-7998.json b/2020/7xxx/CVE-2020-7998.json index f4c523b1974..5324afee0cb 100644 --- a/2020/7xxx/CVE-2020-7998.json +++ b/2020/7xxx/CVE-2020-7998.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-7998", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-7998", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An arbitrary file upload vulnerability has been discovered in the Super File Explorer app 1.0.1 for iOS. The vulnerability is located in the developer path that is accessible and hidden next to the root path. By default, there is no password set for the FTP or Web UI service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://apps.apple.com/us/app/super-file-explorer-file-viewer-file-manager/id1101973946", + "refsource": "MISC", + "name": "https://apps.apple.com/us/app/super-file-explorer-file-viewer-file-manager/id1101973946" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/adeshkolte/9e60b2483d2f20d1951beac0fc917c6f", + "url": "https://gist.github.com/adeshkolte/9e60b2483d2f20d1951beac0fc917c6f" } ] }