cvelist/2017/15xxx/CVE-2017-15582.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2017-10-18 02:05:35 -04:00
{
2019-03-17 23:37:02 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-15582",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-27 16:04:33 -04:00
{
2019-03-17 23:37:02 +00:00
"lang": "eng",
"value": "In net.MCrypt in the \"Diary with lock\" (aka WriteDiary) application 4.72 for Android, hardcoded SecretKey and iv variables are used for the AES parameters, which makes it easier for attackers to obtain the cleartext of stored diary entries."
2017-10-27 16:04:33 -04:00
}
2019-03-17 23:37:02 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://1337sec.blogspot.de/2017/10/auditing-writediarycom-cve-2017-15581.html",
"refsource": "MISC",
"url": "https://1337sec.blogspot.de/2017/10/auditing-writediarycom-cve-2017-15581.html"
},
{
"name": "https://gist.github.com/anonymous/603b89f864a71426042b167cab557efa",
"refsource": "MISC",
"url": "https://gist.github.com/anonymous/603b89f864a71426042b167cab557efa"
}
]
}
}