diff --git a/2013/3xxx/CVE-2013-3067.json b/2013/3xxx/CVE-2013-3067.json index 34afe9fa071..0f2952e14dd 100644 --- a/2013/3xxx/CVE-2013-3067.json +++ b/2013/3xxx/CVE-2013-3067.json @@ -2,7 +2,7 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3067", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,61 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Linksys WRT310Nv2 2.0.0.1 is vulnerable to XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf", + "url": "http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf" + }, + { + "refsource": "MISC", + "name": "http://securityevaluators.com/knowledge/case_studies/routers/linksys_wrt310v2.php", + "url": "http://securityevaluators.com/knowledge/case_studies/routers/linksys_wrt310v2.php" + }, + { + "refsource": "MISC", + "name": "https://www.ise.io/research/studies-and-papers/linksys_wrt310v2/", + "url": "https://www.ise.io/research/studies-and-papers/linksys_wrt310v2/" } ] } diff --git a/2013/3xxx/CVE-2013-3091.json b/2013/3xxx/CVE-2013-3091.json index 6fe22e1d273..4b037732ed8 100644 --- a/2013/3xxx/CVE-2013-3091.json +++ b/2013/3xxx/CVE-2013-3091.json @@ -2,7 +2,7 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3091", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,61 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Authentication Bypass vulnerability in Belkin N300 (F7D7301v1) router allows remote attackers to bypass authentication using \"Javascript debugging.\"" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf", + "url": "http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf" + }, + { + "refsource": "MISC", + "name": "http://securityevaluators.com/knowledge/case_studies/routers/belkin_n900.php", + "url": "http://securityevaluators.com/knowledge/case_studies/routers/belkin_n900.php" + }, + { + "refsource": "MISC", + "name": "https://www.ise.io/research/studies-and-papers/belkin_n900/", + "url": "https://www.ise.io/research/studies-and-papers/belkin_n900/" } ] } diff --git a/2013/3xxx/CVE-2013-3096.json b/2013/3xxx/CVE-2013-3096.json index ae1516d52be..899fac4717b 100644 --- a/2013/3xxx/CVE-2013-3096.json +++ b/2013/3xxx/CVE-2013-3096.json @@ -2,7 +2,7 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3096", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,61 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR865L v1.03 suffers from an \"Unauthenticated Hardware Linking\" vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf", + "url": "http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf" + }, + { + "refsource": "MISC", + "name": "http://securityevaluators.com/knowledge/case_studies/routers/dlink_dir865l.php", + "url": "http://securityevaluators.com/knowledge/case_studies/routers/dlink_dir865l.php" + }, + { + "refsource": "MISC", + "name": "https://www.ise.io/research/studies-and-papers/dlink_dir865l/", + "url": "https://www.ise.io/research/studies-and-papers/dlink_dir865l/" } ] }