mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
83 lines
2.3 KiB
JSON
83 lines
2.3 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2014-1360",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Lockdown in Apple iOS before 7.1.2 does not properly verify data from activation servers, which makes it easier for physically proximate attackers to bypass the Activation Lock protection mechanism via unspecified vectors."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://support.apple.com/kb/HT6441",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://support.apple.com/kb/HT6441"
|
|
},
|
|
{
|
|
"name" : "APPLE-SA-2014-06-30-3",
|
|
"refsource" : "APPLE",
|
|
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
|
|
},
|
|
{
|
|
"name" : "APPLE-SA-2014-09-17-1",
|
|
"refsource" : "APPLE",
|
|
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
|
|
},
|
|
{
|
|
"name" : "68276",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/68276"
|
|
},
|
|
{
|
|
"name" : "1030500",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id/1030500"
|
|
}
|
|
]
|
|
}
|
|
}
|