diff --git a/2019/16xxx/CVE-2019-16958.json b/2019/16xxx/CVE-2019-16958.json new file mode 100644 index 00000000000..86d41d3965a --- /dev/null +++ b/2019/16xxx/CVE-2019-16958.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16958", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Cross-site Scripting (XSS) vulnerability in SolarWinds Web Help Desk 12.7.0 allows attacker to inject arbitrary web script or HTML via Location Name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.solarwinds.com/free-tools/free-help-desk-software", + "refsource": "MISC", + "name": "https://www.solarwinds.com/free-tools/free-help-desk-software" + }, + { + "refsource": "MISC", + "name": "https://www.esecforte.com/cross-site-scripting-vulnerability-with-solarwinds-web-help-desk/", + "url": "https://www.esecforte.com/cross-site-scripting-vulnerability-with-solarwinds-web-help-desk/" + } + ] + } +} \ No newline at end of file diff --git a/2020/8xxx/CVE-2020-8539.json b/2020/8xxx/CVE-2020-8539.json index d0609620c88..87a8d0c58c1 100644 --- a/2020/8xxx/CVE-2020-8539.json +++ b/2020/8xxx/CVE-2020-8539.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-8539", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-8539", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Kia Motors Head Unit with Software version: SOP.003.30.18.0703, SOP.005.7.181019, and SOP.007.1.191209 may allow an attacker to inject unauthorized commands, by executing the micomd executable deamon, to trigger unintended functionalities. In addition, this executable may be used by an attacker to inject commands to generate CAN frames that are sent into the M-CAN bus (Multimedia CAN bus) of the vehicle." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf", + "url": "https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/gianpyc/4dc8b0d0c29774a10a97785711e325c3", + "url": "https://gist.github.com/gianpyc/4dc8b0d0c29774a10a97785711e325c3" } ] }