"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-12-21 21:01:47 +00:00
parent a93530f522
commit 9db8d13bc6
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 202 additions and 19 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-7580",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Philips Hue is vulnerable to a Denial of Service attack. Sending a SYN flood on port tcp/80 will freeze Philips Hue's hub and it will stop responding. The \"hub\" will stop operating and be frozen until the flood stops. During the flood, the user won't be able to turn on/off the lights, and all of the hub's functionality will be unresponsive. The cloud service also won't work with the hub."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.iliashn.com/CVE-2018-7580/",
"url": "https://www.iliashn.com/CVE-2018-7580/"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-11717",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-11717",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Programi 014 31.01.2020. It has multiple SQL injection vulnerabilities."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bilanc.com/en/",
"refsource": "MISC",
"name": "https://bilanc.com/en/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/160628/Programi-Bilanc-Build-007-Release-014-31.01.2020-SQL-Injection.html",
"url": "http://packetstormsecurity.com/files/160628/Programi-Bilanc-Build-007-Release-014-31.01.2020-SQL-Injection.html"
},
{
"refsource": "FULLDISC",
"name": "FULLDISC: 20201218 Programi Bilanc - Build 007 Release 014 31.01.2020 - Multiple SQL Injections [CVE-2020-11717]",
"url": "https://seclists.org/fulldisclosure/2020/Dec/36"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"url": "https://www.hivemq.com/downloads/download-hivemq",
"refsource": "MISC",
"name": "https://www.hivemq.com/downloads/download-hivemq"
},
{
"refsource": "MISC",
"name": "https://payatu.com/advisory/hivemq-mqtt-broker---xss-over-mqtt",
"url": "https://payatu.com/advisory/hivemq-mqtt-broker---xss-over-mqtt"
},
{
"refsource": "CONFIRM",
"name": "https://www.hivemq.com/blog/hivemq-4-3-3-released/",
"url": "https://www.hivemq.com/blog/hivemq-4-3-3-released/"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-35151",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-35151",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The Online Marriage Registration System 1.0 post parameter \"searchdata\" in the user/search.php request is vulnerable to Time Based Sql Injection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/",
"url": "https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/"
},
{
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/49307",
"url": "https://www.exploit-db.com/exploits/49307"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-35608",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-35609",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}