"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-12-01 18:02:21 +00:00
parent 10b7887038
commit cf9bbbdd9a
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
2 changed files with 122 additions and 6 deletions

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16958",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site Scripting (XSS) vulnerability in SolarWinds Web Help Desk 12.7.0 allows attacker to inject arbitrary web script or HTML via Location Name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.solarwinds.com/free-tools/free-help-desk-software",
"refsource": "MISC",
"name": "https://www.solarwinds.com/free-tools/free-help-desk-software"
},
{
"refsource": "MISC",
"name": "https://www.esecforte.com/cross-site-scripting-vulnerability-with-solarwinds-web-help-desk/",
"url": "https://www.esecforte.com/cross-site-scripting-vulnerability-with-solarwinds-web-help-desk/"
}
]
}
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-8539",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-8539",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Kia Motors Head Unit with Software version: SOP.003.30.18.0703, SOP.005.7.181019, and SOP.007.1.191209 may allow an attacker to inject unauthorized commands, by executing the micomd executable deamon, to trigger unintended functionalities. In addition, this executable may be used by an attacker to inject commands to generate CAN frames that are sent into the M-CAN bus (Multimedia CAN bus) of the vehicle."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf",
"url": "https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf"
},
{
"refsource": "MISC",
"name": "https://gist.github.com/gianpyc/4dc8b0d0c29774a10a97785711e325c3",
"url": "https://gist.github.com/gianpyc/4dc8b0d0c29774a10a97785711e325c3"
}
]
}