From 570e917baee7a04dc525a226b525bc17201d2e7c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 20 Oct 2017 14:02:37 -0400 Subject: [PATCH] - Synchronized data. --- 2010/3xxx/CVE-2010-3659.json | 55 +++++++++++++++++++++++++++-- 2011/1xxx/CVE-2011-1935.json | 64 ++++++++++++++++++++++++++++++++-- 2013/6xxx/CVE-2013-6049.json | 49 ++++++++++++++++++++++++-- 2017/13xxx/CVE-2017-13077.json | 30 ++++++++++++++++ 2017/13xxx/CVE-2017-13078.json | 39 +++++++++++++++++++++ 2017/13xxx/CVE-2017-13079.json | 33 ++++++++++++++++++ 2017/13xxx/CVE-2017-13080.json | 39 +++++++++++++++++++++ 2017/13xxx/CVE-2017-13081.json | 30 ++++++++++++++++ 2017/13xxx/CVE-2017-13082.json | 27 ++++++++++++++ 2017/13xxx/CVE-2017-13084.json | 15 ++++++++ 2017/13xxx/CVE-2017-13086.json | 27 ++++++++++++++ 2017/13xxx/CVE-2017-13087.json | 39 +++++++++++++++++++++ 2017/13xxx/CVE-2017-13088.json | 36 +++++++++++++++++++ 2017/13xxx/CVE-2017-13127.json | 46 ++++++++++++++++++++++-- 2017/15xxx/CVE-2017-15674.json | 18 ++++++++++ 2017/15xxx/CVE-2017-15675.json | 18 ++++++++++ 2017/15xxx/CVE-2017-15676.json | 18 ++++++++++ 2017/15xxx/CVE-2017-15677.json | 18 ++++++++++ 2017/15xxx/CVE-2017-15678.json | 18 ++++++++++ 2017/15xxx/CVE-2017-15679.json | 18 ++++++++++ 20 files changed, 629 insertions(+), 8 deletions(-) create mode 100644 2017/15xxx/CVE-2017-15674.json create mode 100644 2017/15xxx/CVE-2017-15675.json create mode 100644 2017/15xxx/CVE-2017-15676.json create mode 100644 2017/15xxx/CVE-2017-15677.json create mode 100644 2017/15xxx/CVE-2017-15678.json create mode 100644 2017/15xxx/CVE-2017-15679.json diff --git a/2010/3xxx/CVE-2010-3659.json b/2010/3xxx/CVE-2010-3659.json index 5d8423482e4..d4e60560eec 100644 --- a/2010/3xxx/CVE-2010-3659.json +++ b/2010/3xxx/CVE-2010-3659.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2010-3659", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,35 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 CMS 4.1.x before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4, and 4.4.x before 4.4.1 allow remote authenticated backend users to inject arbitrary web script or HTML via unspecified parameters to the extension manager, or unspecified parameters to unknown backend forms." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "http://www.openwall.com/lists/oss-security/2010/09/28/8" + }, + { + "url" : "http://www.openwall.com/lists/oss-security/2014/02/12/8" + }, + { + "url" : "https://security-tracker.debian.org/tracker/CVE-2010-3659/" + }, + { + "url" : "https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-012/" } ] } diff --git a/2011/1xxx/CVE-2011-1935.json b/2011/1xxx/CVE-2011-1935.json index ad114b5dfb1..a716b2acc02 100644 --- a/2011/1xxx/CVE-2011-1935.json +++ b/2011/1xxx/CVE-2011-1935.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2011-1935", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,44 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote attackers to send arbitrary data while avoiding detection via crafted packets." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "http://www.openwall.com/lists/oss-security/2014/02/08/5" + }, + { + "url" : "http://www.openwall.com/lists/oss-security/2011/05/19/11" + }, + { + "url" : "http://article.gmane.org/gmane.network.tcpdump.devel/4968" + }, + { + "url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=623868;filename=0001-Fix-the-calculation-of-the-frame-size-in-memory-mapp.patch;msg=10" + }, + { + "url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=623868" + }, + { + "url" : "https://security-tracker.debian.org/tracker/CVE-2011-1935/" + }, + { + "url" : "http://thread.gmane.org/gmane.network.tcpdump.devel/5018" } ] } diff --git a/2013/6xxx/CVE-2013-6049.json b/2013/6xxx/CVE-2013-6049.json index e0658d467a6..e962b6700ca 100644 --- a/2013/6xxx/CVE-2013-6049.json +++ b/2013/6xxx/CVE-2013-6049.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2013-6049", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,29 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "apt-listbugs before 0.1.10 creates temporary files insecurely, which allows attackers to have unspecified impact via unknown vectors." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "http://www.openwall.com/lists/oss-security/2014/02/08/5" + }, + { + "url" : "https://security-tracker.debian.org/tracker/CVE-2013-6049/" } ] } diff --git a/2017/13xxx/CVE-2017-13077.json b/2017/13xxx/CVE-2017-13077.json index cb1496921b4..b17e90b058d 100644 --- a/2017/13xxx/CVE-2017-13077.json +++ b/2017/13xxx/CVE-2017-13077.json @@ -58,6 +58,36 @@ { "url" : "https://www.krackattacks.com/" }, + { + "url" : "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt" + }, + { + "url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" + }, + { + "url" : "https://access.redhat.com/security/vulnerabilities/kracks" + }, + { + "url" : "https://support.lenovo.com/us/en/product_security/LEN-17420" + }, + { + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa" + }, + { + "url" : "http://www.debian.org/security/2017/dsa-3999" + }, + { + "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2907" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2911" + }, + { + "url" : "http://www.ubuntu.com/usn/USN-3455-1" + }, { "url" : "http://www.kb.cert.org/vuls/id/228519" }, diff --git a/2017/13xxx/CVE-2017-13078.json b/2017/13xxx/CVE-2017-13078.json index 73ef584ac4a..6e3e46a0cd1 100644 --- a/2017/13xxx/CVE-2017-13078.json +++ b/2017/13xxx/CVE-2017-13078.json @@ -58,6 +58,45 @@ { "url" : "https://www.krackattacks.com/" }, + { + "url" : "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt" + }, + { + "url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" + }, + { + "url" : "https://access.redhat.com/security/vulnerabilities/kracks" + }, + { + "url" : "https://support.lenovo.com/us/en/product_security/LEN-17420" + }, + { + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa" + }, + { + "url" : "http://www.debian.org/security/2017/dsa-3999" + }, + { + "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2907" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2911" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" + }, + { + "url" : "http://www.ubuntu.com/usn/USN-3455-1" + }, { "url" : "http://www.kb.cert.org/vuls/id/228519" }, diff --git a/2017/13xxx/CVE-2017-13079.json b/2017/13xxx/CVE-2017-13079.json index fd352fb22d6..ef46fd0b212 100644 --- a/2017/13xxx/CVE-2017-13079.json +++ b/2017/13xxx/CVE-2017-13079.json @@ -58,6 +58,39 @@ { "url" : "https://www.krackattacks.com/" }, + { + "url" : "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt" + }, + { + "url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" + }, + { + "url" : "https://access.redhat.com/security/vulnerabilities/kracks" + }, + { + "url" : "https://support.lenovo.com/us/en/product_security/LEN-17420" + }, + { + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa" + }, + { + "url" : "http://www.debian.org/security/2017/dsa-3999" + }, + { + "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" + }, + { + "url" : "http://www.ubuntu.com/usn/USN-3455-1" + }, { "url" : "http://www.kb.cert.org/vuls/id/228519" }, diff --git a/2017/13xxx/CVE-2017-13080.json b/2017/13xxx/CVE-2017-13080.json index 729313fbf3a..5fd605818dd 100644 --- a/2017/13xxx/CVE-2017-13080.json +++ b/2017/13xxx/CVE-2017-13080.json @@ -58,9 +58,48 @@ { "url" : "https://www.krackattacks.com/" }, + { + "url" : "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt" + }, { "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080" }, + { + "url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" + }, + { + "url" : "https://access.redhat.com/security/vulnerabilities/kracks" + }, + { + "url" : "https://support.lenovo.com/us/en/product_security/LEN-17420" + }, + { + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa" + }, + { + "url" : "http://www.debian.org/security/2017/dsa-3999" + }, + { + "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2907" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2911" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" + }, + { + "url" : "http://www.ubuntu.com/usn/USN-3455-1" + }, { "url" : "http://www.kb.cert.org/vuls/id/228519" }, diff --git a/2017/13xxx/CVE-2017-13081.json b/2017/13xxx/CVE-2017-13081.json index 8a113e9250d..618b41c0cdb 100644 --- a/2017/13xxx/CVE-2017-13081.json +++ b/2017/13xxx/CVE-2017-13081.json @@ -58,6 +58,36 @@ { "url" : "https://www.krackattacks.com/" }, + { + "url" : "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt" + }, + { + "url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" + }, + { + "url" : "https://access.redhat.com/security/vulnerabilities/kracks" + }, + { + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa" + }, + { + "url" : "http://www.debian.org/security/2017/dsa-3999" + }, + { + "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" + }, + { + "url" : "http://www.ubuntu.com/usn/USN-3455-1" + }, { "url" : "http://www.kb.cert.org/vuls/id/228519" }, diff --git a/2017/13xxx/CVE-2017-13082.json b/2017/13xxx/CVE-2017-13082.json index 67f1165519d..c093c9a0a6b 100644 --- a/2017/13xxx/CVE-2017-13082.json +++ b/2017/13xxx/CVE-2017-13082.json @@ -58,6 +58,33 @@ { "url" : "https://www.krackattacks.com/" }, + { + "url" : "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt" + }, + { + "url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" + }, + { + "url" : "https://access.redhat.com/security/vulnerabilities/kracks" + }, + { + "url" : "https://support.lenovo.com/us/en/product_security/LEN-17420" + }, + { + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa" + }, + { + "url" : "http://www.debian.org/security/2017/dsa-3999" + }, + { + "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2907" + }, + { + "url" : "http://www.ubuntu.com/usn/USN-3455-1" + }, { "url" : "http://www.kb.cert.org/vuls/id/228519" }, diff --git a/2017/13xxx/CVE-2017-13084.json b/2017/13xxx/CVE-2017-13084.json index 957cae1852a..400230befc7 100644 --- a/2017/13xxx/CVE-2017-13084.json +++ b/2017/13xxx/CVE-2017-13084.json @@ -58,6 +58,21 @@ { "url" : "https://www.krackattacks.com/" }, + { + "url" : "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt" + }, + { + "url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" + }, + { + "url" : "https://access.redhat.com/security/vulnerabilities/kracks" + }, + { + "url" : "https://support.lenovo.com/us/en/product_security/LEN-17420" + }, + { + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa" + }, { "url" : "http://www.kb.cert.org/vuls/id/228519" }, diff --git a/2017/13xxx/CVE-2017-13086.json b/2017/13xxx/CVE-2017-13086.json index ff9bcbcab88..439248bc791 100644 --- a/2017/13xxx/CVE-2017-13086.json +++ b/2017/13xxx/CVE-2017-13086.json @@ -58,6 +58,33 @@ { "url" : "https://www.krackattacks.com/" }, + { + "url" : "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt" + }, + { + "url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" + }, + { + "url" : "https://access.redhat.com/security/vulnerabilities/kracks" + }, + { + "url" : "https://support.lenovo.com/us/en/product_security/LEN-17420" + }, + { + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa" + }, + { + "url" : "http://www.debian.org/security/2017/dsa-3999" + }, + { + "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2907" + }, + { + "url" : "http://www.ubuntu.com/usn/USN-3455-1" + }, { "url" : "http://www.kb.cert.org/vuls/id/228519" }, diff --git a/2017/13xxx/CVE-2017-13087.json b/2017/13xxx/CVE-2017-13087.json index 4aa05b79b83..2fb845d963a 100644 --- a/2017/13xxx/CVE-2017-13087.json +++ b/2017/13xxx/CVE-2017-13087.json @@ -58,6 +58,45 @@ { "url" : "https://www.krackattacks.com/" }, + { + "url" : "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt" + }, + { + "url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" + }, + { + "url" : "https://access.redhat.com/security/vulnerabilities/kracks" + }, + { + "url" : "https://support.lenovo.com/us/en/product_security/LEN-17420" + }, + { + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa" + }, + { + "url" : "http://www.debian.org/security/2017/dsa-3999" + }, + { + "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2907" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2911" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" + }, + { + "url" : "http://www.ubuntu.com/usn/USN-3455-1" + }, { "url" : "http://www.kb.cert.org/vuls/id/228519" }, diff --git a/2017/13xxx/CVE-2017-13088.json b/2017/13xxx/CVE-2017-13088.json index 4485777ae08..f0eaf05725b 100644 --- a/2017/13xxx/CVE-2017-13088.json +++ b/2017/13xxx/CVE-2017-13088.json @@ -58,6 +58,42 @@ { "url" : "https://www.krackattacks.com/" }, + { + "url" : "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt" + }, + { + "url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt" + }, + { + "url" : "https://access.redhat.com/security/vulnerabilities/kracks" + }, + { + "url" : "https://support.lenovo.com/us/en/product_security/LEN-17420" + }, + { + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa" + }, + { + "url" : "http://www.debian.org/security/2017/dsa-3999" + }, + { + "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc" + }, + { + "url" : "https://access.redhat.com/errata/RHSA-2017:2907" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" + }, + { + "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" + }, + { + "url" : "http://www.ubuntu.com/usn/USN-3455-1" + }, { "url" : "http://www.kb.cert.org/vuls/id/228519" }, diff --git a/2017/13xxx/CVE-2017-13127.json b/2017/13xxx/CVE-2017-13127.json index 0d0c7c607a9..2a591574f2a 100644 --- a/2017/13xxx/CVE-2017-13127.json +++ b/2017/13xxx/CVE-2017-13127.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2017-13127", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "The VIP.com application for IOS and Android allows remote attackers to obtain sensitive information and hijack the authentication of users via a rogue access point and a man-in-the-middle attack." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ibreakthings.com/2017/10/13/cve-2017-13127-security-teams-care/" } ] } diff --git a/2017/15xxx/CVE-2017-15674.json b/2017/15xxx/CVE-2017-15674.json new file mode 100644 index 00000000000..977dd1778d5 --- /dev/null +++ b/2017/15xxx/CVE-2017-15674.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2017-15674", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2017/15xxx/CVE-2017-15675.json b/2017/15xxx/CVE-2017-15675.json new file mode 100644 index 00000000000..4929fb3b5e0 --- /dev/null +++ b/2017/15xxx/CVE-2017-15675.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2017-15675", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2017/15xxx/CVE-2017-15676.json b/2017/15xxx/CVE-2017-15676.json new file mode 100644 index 00000000000..dcb5d6b7a36 --- /dev/null +++ b/2017/15xxx/CVE-2017-15676.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2017-15676", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2017/15xxx/CVE-2017-15677.json b/2017/15xxx/CVE-2017-15677.json new file mode 100644 index 00000000000..e2b307f1503 --- /dev/null +++ b/2017/15xxx/CVE-2017-15677.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2017-15677", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2017/15xxx/CVE-2017-15678.json b/2017/15xxx/CVE-2017-15678.json new file mode 100644 index 00000000000..954c17aa14f --- /dev/null +++ b/2017/15xxx/CVE-2017-15678.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2017-15678", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2017/15xxx/CVE-2017-15679.json b/2017/15xxx/CVE-2017-15679.json new file mode 100644 index 00000000000..1384c14f436 --- /dev/null +++ b/2017/15xxx/CVE-2017-15679.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2017-15679", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}