mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.5 KiB
JSON
82 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"ID": "CVE-2014-1360",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Lockdown in Apple iOS before 7.1.2 does not properly verify data from activation servers, which makes it easier for physically proximate attackers to bypass the Activation Lock protection mechanism via unspecified vectors."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://support.apple.com/kb/HT6441",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://support.apple.com/kb/HT6441"
|
|
},
|
|
{
|
|
"name": "68276",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/68276"
|
|
},
|
|
{
|
|
"name": "APPLE-SA-2014-06-30-3",
|
|
"refsource": "APPLE",
|
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
|
|
},
|
|
{
|
|
"name": "APPLE-SA-2014-09-17-1",
|
|
"refsource": "APPLE",
|
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
|
|
},
|
|
{
|
|
"name": "1030500",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1030500"
|
|
}
|
|
]
|
|
}
|
|
} |