mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
77 lines
2.6 KiB
JSON
77 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2013-3667",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The software update mechanism as used in Bare Bones Software Yojimbo before 4.0, TextWrangler before 4.5.3, and BBEdit before 10.5.5 does not properly download and verify updates before installation, which allows attackers to perform \"tampering or corruption\" of the updates."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://www.barebones.com/support/yojimbo/arch_yojimbo40.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.barebones.com/support/yojimbo/arch_yojimbo40.html"
|
|
},
|
|
{
|
|
"name": "http://www.barebones.com/support/bbedit/arch_bbedit1055.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.barebones.com/support/bbedit/arch_bbedit1055.html"
|
|
},
|
|
{
|
|
"name": "https://groups.google.com/forum/#!msg/bbedit/BjvyUKCM4Gk/ZT_v03QqPqgJ",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://groups.google.com/forum/#!msg/bbedit/BjvyUKCM4Gk/ZT_v03QqPqgJ"
|
|
},
|
|
{
|
|
"name": "http://www.barebones.com/support/textwrangler/notes_tw453.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.barebones.com/support/textwrangler/notes_tw453.html"
|
|
}
|
|
]
|
|
}
|
|
} |