"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-01-31 15:01:13 +00:00
parent 284f56e84b
commit 9b4cccd01a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 228 additions and 6 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-5113",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,38 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "LastPass prior to 2.5.1 has an insecure PIN implementation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/",
"refsource": "MISC",
"name": "http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/"
},
{
"refsource": "MISC",
"name": "https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/",
"url": "https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/"
},
{
"refsource": "MISC",
"name": "https://www.securityfocus.com/archive/1/529783",
"url": "https://www.securityfocus.com/archive/1/529783"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-5114",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,38 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "LastPass prior to 2.5.1 allows secure wipe bypass."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/",
"refsource": "MISC",
"name": "http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/"
},
{
"refsource": "MISC",
"name": "https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/",
"url": "https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/"
},
{
"refsource": "MISC",
"name": "https://www.securityfocus.com/archive/1/529783",
"url": "https://www.securityfocus.com/archive/1/529783"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-5116",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,38 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Evernote prior to 5.5.1 has insecure password change"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89734",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89734"
},
{
"refsource": "MISC",
"name": "https://packetstormsecurity.com/files/author/8433/",
"url": "https://packetstormsecurity.com/files/author/8433/"
},
{
"refsource": "MISC",
"name": "https://www.securityfocus.com/bid/64320/info",
"url": "https://www.securityfocus.com/bid/64320/info"
}
]
}

View File

@ -66,6 +66,66 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200103-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200103-0004/"
},
{
"refsource": "MISC",
"name": "https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1018-5505",
"url": "https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1018-5505"
},
{
"refsource": "MISC",
"name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58104",
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58104"
},
{
"refsource": "MISC",
"name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58473",
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58473"
},
{
"refsource": "MISC",
"name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58812",
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58812"
},
{
"refsource": "MISC",
"name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58979",
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58979"
},
{
"refsource": "MISC",
"name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58772",
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58772"
},
{
"refsource": "MISC",
"name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs60748",
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs60748"
},
{
"refsource": "MISC",
"name": "https://www.tenable.com/plugins/nessus/132985",
"url": "https://www.tenable.com/plugins/nessus/132985"
},
{
"refsource": "MISC",
"name": "https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1019-3816",
"url": "https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1019-3816"
},
{
"refsource": "CONFIRM",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-19234",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-19234"
},
{
"refsource": "CONFIRM",
"name": "https://www.suse.com/security/cve/CVE-2019-19234/",
"url": "https://www.suse.com/security/cve/CVE-2019-19234/"
},
{
"refsource": "MISC",
"name": "https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/12/warnmeldung_cb-k20-0001.html",
"url": "https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/12/warnmeldung_cb-k20-0001.html"
}
]
}