"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-03-25 02:01:23 +00:00
parent 3dba33ddec
commit ad214072b6
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
11 changed files with 51 additions and 21 deletions

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) before version 2.5.0 has a faulty implementation of Token Replay Detection.\nToken Replay Detection is an important defence in depth measure for Single Sign On solutions.\n\nThe 2.5.0 version is patched."
"value": "Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) before version 2.5.0 has a faulty implementation of Token Replay Detection. Token Replay Detection is an important defence in depth measure for Single Sign On solutions. The 2.5.0 version is patched."
}
]
},

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN85942151/index.html"
"url": "https://jvn.jp/en/jp/JVN85942151/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN85942151/index.html"
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5552",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN77634892/index.html"
"url": "https://jvn.jp/en/jp/JVN77634892/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN77634892/index.html"
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5553",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN32415420/index.html"
"url": "https://jvn.jp/en/jp/JVN32415420/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN32415420/index.html"
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5554",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN32415420/index.html"
"url": "https://jvn.jp/en/jp/JVN32415420/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN32415420/index.html"
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5555",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN63834780/index.html"
"url": "https://jvn.jp/en/jp/JVN63834780/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN63834780/index.html"
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5556",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN29095127/index.html"
"url": "https://jvn.jp/en/jp/JVN29095127/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN29095127/index.html"
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5557",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN58176087/index.html"
"url": "https://jvn.jp/en/jp/JVN58176087/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN58176087/index.html"
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5558",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN88033799/index.html"
"url": "https://jvn.jp/en/jp/JVN88033799/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN88033799/index.html"
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5559",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN27951364/index.html"
"url": "https://jvn.jp/en/jp/JVN27951364/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN27951364/index.html"
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5560",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "https://jvn.jp/en/jp/JVN88277644/index.html"
"url": "https://jvn.jp/en/jp/JVN88277644/index.html",
"refsource": "MISC",
"name": "https://jvn.jp/en/jp/JVN88277644/index.html"
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5561",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {