mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3dba33ddec
commit
ad214072b6
@ -35,7 +35,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) before version 2.5.0 has a faulty implementation of Token Replay Detection.\nToken Replay Detection is an important defence in depth measure for Single Sign On solutions.\n\nThe 2.5.0 version is patched."
|
||||
"value": "Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) before version 2.5.0 has a faulty implementation of Token Replay Detection. Token Replay Detection is an important defence in depth measure for Single Sign On solutions. The 2.5.0 version is patched."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN85942151/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN85942151/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN85942151/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5552",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN77634892/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN77634892/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN77634892/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5553",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN32415420/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN32415420/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN32415420/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5554",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN32415420/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN32415420/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN32415420/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5555",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN63834780/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN63834780/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN63834780/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5556",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN29095127/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN29095127/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN29095127/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5557",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN58176087/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN58176087/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN58176087/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5558",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN88033799/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN88033799/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN88033799/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5559",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN27951364/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN27951364/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN27951364/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5560",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN88277644/index.html"
|
||||
"url": "https://jvn.jp/en/jp/JVN88277644/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://jvn.jp/en/jp/JVN88277644/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5561",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
Loading…
x
Reference in New Issue
Block a user