diff --git a/2018/7xxx/CVE-2018-7580.json b/2018/7xxx/CVE-2018-7580.json index 7e7fb0074ad..981c7f12856 100644 --- a/2018/7xxx/CVE-2018-7580.json +++ b/2018/7xxx/CVE-2018-7580.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7580", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Philips Hue is vulnerable to a Denial of Service attack. Sending a SYN flood on port tcp/80 will freeze Philips Hue's hub and it will stop responding. The \"hub\" will stop operating and be frozen until the flood stops. During the flood, the user won't be able to turn on/off the lights, and all of the hub's functionality will be unresponsive. The cloud service also won't work with the hub." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.iliashn.com/CVE-2018-7580/", + "url": "https://www.iliashn.com/CVE-2018-7580/" } ] } diff --git a/2020/11xxx/CVE-2020-11717.json b/2020/11xxx/CVE-2020-11717.json index 35d0083483f..7f10822257c 100644 --- a/2020/11xxx/CVE-2020-11717.json +++ b/2020/11xxx/CVE-2020-11717.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-11717", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-11717", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Programi 014 31.01.2020. It has multiple SQL injection vulnerabilities." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bilanc.com/en/", + "refsource": "MISC", + "name": "https://bilanc.com/en/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/160628/Programi-Bilanc-Build-007-Release-014-31.01.2020-SQL-Injection.html", + "url": "http://packetstormsecurity.com/files/160628/Programi-Bilanc-Build-007-Release-014-31.01.2020-SQL-Injection.html" + }, + { + "refsource": "FULLDISC", + "name": "FULLDISC: 20201218 Programi Bilanc - Build 007 Release 014 31.01.2020 - Multiple SQL Injections [CVE-2020-11717]", + "url": "https://seclists.org/fulldisclosure/2020/Dec/36" } ] } diff --git a/2020/13xxx/CVE-2020-13821.json b/2020/13xxx/CVE-2020-13821.json index 6deec688852..1e75a7baac1 100644 --- a/2020/13xxx/CVE-2020-13821.json +++ b/2020/13xxx/CVE-2020-13821.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://www.hivemq.com/downloads/download-hivemq", - "refsource": "MISC", - "name": "https://www.hivemq.com/downloads/download-hivemq" - }, { "refsource": "MISC", "name": "https://payatu.com/advisory/hivemq-mqtt-broker---xss-over-mqtt", "url": "https://payatu.com/advisory/hivemq-mqtt-broker---xss-over-mqtt" + }, + { + "refsource": "CONFIRM", + "name": "https://www.hivemq.com/blog/hivemq-4-3-3-released/", + "url": "https://www.hivemq.com/blog/hivemq-4-3-3-released/" } ] } diff --git a/2020/35xxx/CVE-2020-35151.json b/2020/35xxx/CVE-2020-35151.json index cdb5d79ccf2..a975b01405f 100644 --- a/2020/35xxx/CVE-2020-35151.json +++ b/2020/35xxx/CVE-2020-35151.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-35151", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-35151", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Online Marriage Registration System 1.0 post parameter \"searchdata\" in the user/search.php request is vulnerable to Time Based Sql Injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/", + "url": "https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/49307", + "url": "https://www.exploit-db.com/exploits/49307" } ] } diff --git a/2020/35xxx/CVE-2020-35608.json b/2020/35xxx/CVE-2020-35608.json new file mode 100644 index 00000000000..6ed322ea940 --- /dev/null +++ b/2020/35xxx/CVE-2020-35608.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35608", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/35xxx/CVE-2020-35609.json b/2020/35xxx/CVE-2020-35609.json new file mode 100644 index 00000000000..7e382b14a2f --- /dev/null +++ b/2020/35xxx/CVE-2020-35609.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-35609", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file