cvelist/2006/2xxx/CVE-2006-2711.json

87 lines
2.7 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 23:26:25 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-2711",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 23:26:25 +00:00
"lang": "eng",
"value": "Secure Elements Class 5 AVR (aka C5 EVM) 2.8.1 and earlier, and possibly later 2.8.x releases, uses the same initialization vector and key for each message session, which allows remote attackers to obtain potentially sensitive information about messages."
2017-10-16 12:31:07 -04:00
}
2019-03-17 23:26:25 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "c5evm-key-weak-encryption(26740)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26740"
},
{
"name": "20377",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20377"
},
{
"name": "http://www.kb.cert.org/vuls/id/WDON-6QAQN6",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/WDON-6QAQN6"
},
{
"name": "1016184",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016184"
},
{
"name": "VU#346377",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/346377"
},
{
"name": "ADV-2006-2068",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2068"
}
]
}
}