diff --git a/2013/5xxx/CVE-2013-5113.json b/2013/5xxx/CVE-2013-5113.json index 3930e8d549c..194cd9711b6 100644 --- a/2013/5xxx/CVE-2013-5113.json +++ b/2013/5xxx/CVE-2013-5113.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5113", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LastPass prior to 2.5.1 has an insecure PIN implementation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/", + "refsource": "MISC", + "name": "http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/" + }, + { + "refsource": "MISC", + "name": "https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/", + "url": "https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/" + }, + { + "refsource": "MISC", + "name": "https://www.securityfocus.com/archive/1/529783", + "url": "https://www.securityfocus.com/archive/1/529783" } ] } diff --git a/2013/5xxx/CVE-2013-5114.json b/2013/5xxx/CVE-2013-5114.json index c054a834b38..b16b69420d6 100644 --- a/2013/5xxx/CVE-2013-5114.json +++ b/2013/5xxx/CVE-2013-5114.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5114", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LastPass prior to 2.5.1 allows secure wipe bypass." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/", + "refsource": "MISC", + "name": "http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/" + }, + { + "refsource": "MISC", + "name": "https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/", + "url": "https://blog.c22.cc/advisories/cve-2013-51135114-lastpass-android-container-pin-and-auto-wipe-security-feature-bypass/" + }, + { + "refsource": "MISC", + "name": "https://www.securityfocus.com/archive/1/529783", + "url": "https://www.securityfocus.com/archive/1/529783" } ] } diff --git a/2013/5xxx/CVE-2013-5116.json b/2013/5xxx/CVE-2013-5116.json index d7665ff1434..af30f73d539 100644 --- a/2013/5xxx/CVE-2013-5116.json +++ b/2013/5xxx/CVE-2013-5116.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5116", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Evernote prior to 5.5.1 has insecure password change" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89734", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89734" + }, + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/author/8433/", + "url": "https://packetstormsecurity.com/files/author/8433/" + }, + { + "refsource": "MISC", + "name": "https://www.securityfocus.com/bid/64320/info", + "url": "https://www.securityfocus.com/bid/64320/info" } ] } diff --git a/2019/19xxx/CVE-2019-19234.json b/2019/19xxx/CVE-2019-19234.json index 0d4697b7a41..936a151ae75 100644 --- a/2019/19xxx/CVE-2019-19234.json +++ b/2019/19xxx/CVE-2019-19234.json @@ -66,6 +66,66 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200103-0004/", "url": "https://security.netapp.com/advisory/ntap-20200103-0004/" + }, + { + "refsource": "MISC", + "name": "https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1018-5505", + "url": "https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1018-5505" + }, + { + "refsource": "MISC", + "name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58104", + "url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58104" + }, + { + "refsource": "MISC", + "name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58473", + "url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58473" + }, + { + "refsource": "MISC", + "name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58812", + "url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58812" + }, + { + "refsource": "MISC", + "name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58979", + "url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58979" + }, + { + "refsource": "MISC", + "name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58772", + "url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58772" + }, + { + "refsource": "MISC", + "name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs60748", + "url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs60748" + }, + { + "refsource": "MISC", + "name": "https://www.tenable.com/plugins/nessus/132985", + "url": "https://www.tenable.com/plugins/nessus/132985" + }, + { + "refsource": "MISC", + "name": "https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1019-3816", + "url": "https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1019-3816" + }, + { + "refsource": "CONFIRM", + "name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-19234", + "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-19234" + }, + { + "refsource": "CONFIRM", + "name": "https://www.suse.com/security/cve/CVE-2019-19234/", + "url": "https://www.suse.com/security/cve/CVE-2019-19234/" + }, + { + "refsource": "MISC", + "name": "https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/12/warnmeldung_cb-k20-0001.html", + "url": "https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/12/warnmeldung_cb-k20-0001.html" } ] }