Vulnerabilites related to softbank - wisprclient
CVE-2013-2310 (GCVE-0-2013-2310)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://jvn.jp/en/jp/JVN85371480/397327/index.html | x_refsource_CONFIRM | |
http://jvn.jp/en/jp/JVN85371480/index.html | third-party-advisory, x_refsource_JVN | |
http://jvn.jp/en/jp/JVN85371480/995417/index.html | x_refsource_CONFIRM | |
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000039 | third-party-advisory, x_refsource_JVNDB | |
http://jvn.jp/en/jp/JVN85371480/995319/index.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:36:45.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN85371480/397327/index.html" }, { "name": "JVN#85371480", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN85371480/index.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN85371480/995417/index.html" }, { "name": "JVNDB-2013-000039", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000039" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN85371480/995319/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-06-17T01:00:00Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jvn.jp/en/jp/JVN85371480/397327/index.html" }, { "name": "JVN#85371480", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN85371480/index.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jvn.jp/en/jp/JVN85371480/995417/index.html" }, { "name": "JVNDB-2013-000039", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000039" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jvn.jp/en/jp/JVN85371480/995319/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2013-2310", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://jvn.jp/en/jp/JVN85371480/397327/index.html", "refsource": "CONFIRM", "url": "http://jvn.jp/en/jp/JVN85371480/397327/index.html" }, { "name": "JVN#85371480", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN85371480/index.html" }, { "name": "http://jvn.jp/en/jp/JVN85371480/995417/index.html", "refsource": "CONFIRM", "url": "http://jvn.jp/en/jp/JVN85371480/995417/index.html" }, { "name": "JVNDB-2013-000039", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000039" }, { "name": "http://jvn.jp/en/jp/JVN85371480/995319/index.html", "refsource": "CONFIRM", "url": "http://jvn.jp/en/jp/JVN85371480/995319/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2013-2310", "datePublished": "2013-06-17T01:00:00Z", "dateReserved": "2013-03-04T00:00:00Z", "dateUpdated": "2024-09-16T17:32:46.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:softbank:wi-fi_spot_configuration_software:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8424BE0-F1F7-4336-BC1E-058055E9CC0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:softbank:mobile_wi-fi_router:101sb:*:*:*:*:*:*:*", "matchCriteriaId": "9153F3B7-38DC-47E3-87B7-8C35F546EDC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:mobile_wi-fi_router:102hw:*:*:*:*:*:*:*", "matchCriteriaId": "0CD3301E-D5E9-430B-9602-05427B7FF730", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:mobile_wi-fi_router:102z:*:*:*:*:*:*:*", "matchCriteriaId": "CD37D025-D5E9-4440-9CAC-434E4FEC463D", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:nec_3g_handset:001n:*:*:*:*:*:*:*", "matchCriteriaId": "DF09BC52-4D7E-4C64-BABB-87E61AB75D42", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:nec_3g_handset:931n:*:*:*:*:*:*:*", "matchCriteriaId": "11170487-BE0C-44F4-8E3B-F35188E3A297", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:nec_3g_handset:940n:*:*:*:*:*:*:*", "matchCriteriaId": "4265CA6E-01A3-49EA-B87C-AA509AABA46A", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:panasonic_3g_handset:001p:*:*:*:*:*:*:*", "matchCriteriaId": "39F73551-9FD8-4536-930E-98F817C13AE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:panasonic_3g_handset:941p:*:*:*:*:*:*:*", "matchCriteriaId": "0D25FD7D-DE60-4E52-A011-FADAA966C7D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:panasonic_3g_handset:942p:*:*:*:*:*:*:*", "matchCriteriaId": "F0E31794-8041-4654-8BB5-1EA324AA2C6E", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:samsung_3g_handset:941sc:*:*:*:*:*:*:*", "matchCriteriaId": "8736D68E-631A-4FBF-B24E-294D3DD9171F", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:001n:*:*:*:*:*:*:*", "matchCriteriaId": "D743D290-74D6-47C5-B768-F69C1DF73290", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:001p:*:*:*:*:*:*:*", "matchCriteriaId": "270E6CF6-D931-4B64-9ADA-BF63458B38AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:002sh:*:*:*:*:*:*:*", "matchCriteriaId": "B14F72B4-0E55-46F9-8D51-95F0625700EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:004sh:*:*:*:*:*:*:*", "matchCriteriaId": "52D5C4BC-4B54-4EB6-BD5C-E135D9B23981", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:004shp3:*:*:*:*:*:*:*", "matchCriteriaId": "CC644ACE-434E-4911-8FEC-54D1A3EF5162", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:931n:*:*:*:*:*:*:*", "matchCriteriaId": "9561E43E-D7EF-43F6-95E3-AEDDEBF9F1B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:940n:*:*:*:*:*:*:*", "matchCriteriaId": "E9EF4D8D-E3FD-44FB-98B7-3203BA4184E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:940sh:*:*:*:*:*:*:*", "matchCriteriaId": "CEA85E94-A808-4014-A52D-9569F7382074", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:941p:*:*:*:*:*:*:*", "matchCriteriaId": "7EFC72E0-E0C0-485D-94B0-0156DB617756", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:941sc:*:*:*:*:*:*:*", "matchCriteriaId": "1B7DA3CC-E95F-45B7-A6B4-D615FD5A5724", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:941sh:*:*:*:*:*:*:*", "matchCriteriaId": "A4A91327-41D7-4E42-AAB8-407C1BAB5BFB", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:942p:*:*:*:*:*:*:*", "matchCriteriaId": "39031BDF-0B11-4BBA-A650-B7EBC2B210AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:943sh:*:*:*:*:*:*:*", "matchCriteriaId": "A116933E-B64E-411F-A15E-E0F712A0C274", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:944sh:*:*:*:*:*:*:*", "matchCriteriaId": "4488FC16-124F-422C-B93C-35E04D1CCC14", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:945sh:*:*:*:*:*:*:*", "matchCriteriaId": "1EA687EA-7FA6-4DA2-890B-81FECF1668B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:sharp_3g_handset:945shg:*:*:*:*:*:*:*", "matchCriteriaId": "4049FD7E-3472-49D6-ADB3-00DDB6B8A46D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:softbank:wi-fi_application:*:*:*:*:*:*:*:*", "matchCriteriaId": "728BE73D-A7B7-454C-9A2B-D4E47871CF3C", "versionEndIncluding": "1.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:softbank:android_smartphone:001dl:*:*:*:*:*:*:*", "matchCriteriaId": "860CAE12-12A4-4D70-9613-3F9E1C397CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:001ht:*:*:*:*:*:*:*", "matchCriteriaId": "E585AA33-6BD4-4148-ACC3-AC6C0D0BEDA4", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:003p:*:*:*:*:*:*:*", "matchCriteriaId": "7A3440B3-C997-468A-97D4-48C4CFE15B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:003sh:*:*:*:*:*:*:*", "matchCriteriaId": "7CFC956B-3B5F-4FD2-B374-A2E528EC5DB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:003z:*:*:*:*:*:*:*", "matchCriteriaId": "858F4F6B-9F7D-4469-87BB-F79768060A83", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:005sh:*:*:*:*:*:*:*", "matchCriteriaId": "3C138AE9-1781-4EBC-9704-BE127B41E912", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:006sh:*:*:*:*:*:*:*", "matchCriteriaId": "ACA0678D-DB8D-4A0E-B83F-93B5153F6779", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:007hw:*:*:*:*:*:*:*", "matchCriteriaId": "FF3C3B94-130F-40B5-AD8A-12FA8FBD1C65", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:007sh:*:*:*:*:*:*:*", "matchCriteriaId": "A944DB22-DAA7-4C6C-A8CE-3C07C681B819", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:007sh:j:*:*:*:*:*:*", "matchCriteriaId": "D6CBD600-3DB7-4817-BD80-15BA91DDC32E", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:007sh:kt:*:*:*:*:*:*", "matchCriteriaId": "17410E04-45AF-4CF3-8BA3-D1B06276BF5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:008z:*:*:*:*:*:*:*", "matchCriteriaId": "45346D13-FB49-4335-B3A4-6344BF0A2100", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:009sh:*:*:*:*:*:*:*", "matchCriteriaId": "B0A4BE02-7F8A-4D9B-8AD6-6100DD3EBA04", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:009sh:y:*:*:*:*:*:*", "matchCriteriaId": "09D75B0F-C249-4E6B-9BB2-33C5AC27E9C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:009z:*:*:*:*:*:*:*", "matchCriteriaId": "E796C0BE-68BE-4527-918C-0E566F48A654", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:101dl:*:*:*:*:*:*:*", "matchCriteriaId": "D5581ABB-788E-4535-909B-3E2CB0BDD56E", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:101f:*:*:*:*:*:*:*", "matchCriteriaId": "A22707E7-A667-4998-BC88-D31F817EDCB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:101k:*:*:*:*:*:*:*", "matchCriteriaId": "C5A27BFB-3E8C-4355-AD40-B0B77ED0D205", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:101n:*:*:*:*:*:*:*", "matchCriteriaId": "B9BA10CB-0287-4DAF-8BE5-C1122228E295", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:101p:*:*:*:*:*:*:*", "matchCriteriaId": "72EBB6D5-A9A6-4680-8207-290C0B077FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:101sh:*:*:*:*:*:*:*", "matchCriteriaId": "1122DD83-4AAD-46A3-9CA6-502CE1D5DA36", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:102p:*:*:*:*:*:*:*", "matchCriteriaId": "F561E55A-9D2A-4015-9480-14B9C06000E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:102sh:*:*:*:*:*:*:*", "matchCriteriaId": "A30E1217-413E-46F1-8BC1-71A572E95D6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:102sh:ii:*:*:*:*:*:*", "matchCriteriaId": "6AF47817-2CF5-4818-A692-AD674E719FB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:103sh:*:*:*:*:*:*:*", "matchCriteriaId": "9786BCDA-478A-4481-84E4-F702E9CD3F40", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:104sh:*:*:*:*:*:*:*", "matchCriteriaId": "212598FF-B9CD-4DD1-8BAD-4069F1222F38", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:106sh:*:*:*:*:*:*:*", "matchCriteriaId": "C18F1D45-E478-489F-BEA9-8E5895900004", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:107sh:*:*:*:*:*:*:*", "matchCriteriaId": "C4FECAAD-4F1D-4D3E-A54B-FA86FFAA9F08", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:200sh:*:*:*:*:*:*:*", "matchCriteriaId": "FEC2FAFC-ABB6-4BCF-9ECA-BAF6FD616D01", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:201hw:*:*:*:*:*:*:*", "matchCriteriaId": "16E1DA60-36C4-40C2-B2FA-E686BE0EFC85", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:201k:*:*:*:*:*:*:*", "matchCriteriaId": "98977425-4075-4EED-8532-8AACEF38D913", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:201m:*:*:*:*:*:*:*", "matchCriteriaId": "9CBEC7C8-66AC-48E5-B12A-AC1E59F1F10C", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:x06ht:*:*:*:*:*:*:*", "matchCriteriaId": "F3D69C5D-C585-40F6-A48D-ABA60FC54772", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:android_smartphone:x06ht:ii:*:*:*:*:*:*", "matchCriteriaId": "CD5E6A6D-692C-4E16-8F79-34998365D9DC", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:softbank:wisprclient:*:*:*:*:*:*:*:*", "matchCriteriaId": "B858D183-AC0D-4CC8-9F00-A73C5E3393C8", "versionEndIncluding": "1.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:softbank:windows_mobile_smartphone:x01sc:*:*:*:*:*:*:*", "matchCriteriaId": "00808F4B-F195-4EA3-8CCC-A15C0B463A78", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:windows_mobile_smartphone:x02t:*:*:*:*:*:*:*", "matchCriteriaId": "D4D76533-11B7-4635-91B0-0147B02195DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:windows_mobile_smartphone:x04ht:*:*:*:*:*:*:*", "matchCriteriaId": "4D218D52-D34D-4836-B553-347FC1BC1863", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:windows_mobile_smartphone:x05ht:*:*:*:*:*:*:*", "matchCriteriaId": "E3FF21BD-89A7-409F-873F-62FCDA956F92", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:softbank:wi-fi_application:*:*:*:*:*:*:*:*", "matchCriteriaId": "728BE73D-A7B7-454C-9A2B-D4E47871CF3C", "versionEndIncluding": "1.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:softbank:disney_mobile_android_smartphone:dm009sh:*:*:*:*:*:*:*", "matchCriteriaId": "8C205636-3731-4393-8BBB-CD77B3381898", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:disney_mobile_android_smartphone:dm010sh:*:*:*:*:*:*:*", "matchCriteriaId": "9B6EFE0B-7942-4F81-A10B-EA3AE841AF68", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:disney_mobile_android_smartphone:dm011sh:*:*:*:*:*:*:*", "matchCriteriaId": "E174AF85-578F-48FD-B211-36A7CE68E1FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:disney_mobile_android_smartphone:dm012sh:*:*:*:*:*:*:*", "matchCriteriaId": "6D9EA535-89EC-449A-AC80-89A0C3831677", "vulnerable": true }, { "criteria": "cpe:2.3:h:softbank:disney_mobile_android_smartphone:dm013sh:*:*:*:*:*:*:*", "matchCriteriaId": "3E2D8F65-FFA3-4EF5-A2B1-B46371015320", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:willcom-inc:wi-fi_application:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCEA9809-AC80-4213-AA36-4040DD9DA2BB", "versionEndIncluding": "1.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:willcom-inc:android_smartphone:wx04k:*:*:*:*:*:*:*", "matchCriteriaId": "DCCA03A2-B3FA-4EB0-B459-484022A6F0CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:willcom-inc:android_smartphone:wx06k:*:*:*:*:*:*:*", "matchCriteriaId": "F24C6476-61FE-4A02-8783-C23273D237DE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network." }, { "lang": "es", "value": "SoftBank Wi-Fi Spot Configuration Software, usado en tel\u00e9fonos SoftBank SHARP 3G, tel\u00e9fonos SoftBank Panasonic 3G , tel\u00e9fonos SoftBank NEC 3G, tel\u00e9fonos SoftBank Samsung 3G, routers SoftBank mobile Wi-Fi , SoftBank Android smartphones con la aplicaci\u00f3n Wi-Fi anterior a 1.7.1, SoftBank Windows Mobile smartphones con la aplicaci\u00f3n WISPrClient anterior a 1.3.1, SoftBank Disney Mobile Android smartphones con la aplicaci\u00f3n Wi-Fi anteiror a 1.7.1, y WILLCOM Android smartphones con la aplicaci\u00f3n Wi-Fi anterior a 1.7.1, no se conectan adecuadamente a los puntos de acceso, lo que permite a atacantes remotos obtener informaci\u00f3n sensible aprovechando el acceso a las redes 802.11." } ], "id": "CVE-2013-2310", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-06-17T03:29:45.050", "references": [ { "source": "vultures@jpcert.or.jp", "url": "http://jvn.jp/en/jp/JVN85371480/397327/index.html" }, { "source": "vultures@jpcert.or.jp", "url": "http://jvn.jp/en/jp/JVN85371480/995319/index.html" }, { "source": "vultures@jpcert.or.jp", "url": "http://jvn.jp/en/jp/JVN85371480/995417/index.html" }, { "source": "vultures@jpcert.or.jp", "url": "http://jvn.jp/en/jp/JVN85371480/index.html" }, { "source": "vultures@jpcert.or.jp", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN85371480/397327/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN85371480/995319/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN85371480/995417/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN85371480/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000039" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201306-0111
Vulnerability from variot
SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network. Wi-Fi Spot Configuration Software provided by SoftBank contains a vulnerability within the process of connecting to Wi-Fi access points, which may lead to user information being sent unintentionally. Masashi Sakai reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.When connecting to a Wi-Fi access point, an attacker may obtain user information. Successful exploits will allow attackers to obtain sensitive information by performing man-in-the-middle attacks. This may aid in further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201306-0111", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wi-fi application", "scope": "lte", "trust": 1.0, "vendor": "softbank", "version": "1.7.0" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "103sh" }, { "model": "mobile wi-fi router", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "102z" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "001dl" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "201k" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "944sh" }, { "model": "disney mobile android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "dm009sh" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "008z" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "941p" }, { "model": "disney mobile android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "dm012sh" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "001n" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "003p" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "007hw" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "009sh" }, { "model": "wisprclient", "scope": "lte", "trust": 1.0, "vendor": "softbank", "version": "1.3.0" }, { "model": "panasonic 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "941p" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "004shp3" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "006sh" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "945sh" }, { "model": "disney mobile android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "dm013sh" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "009z" }, { "model": "disney mobile android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "dm011sh" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "201m" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "003sh" }, { "model": "wi-fi application", "scope": "lte", "trust": 1.0, "vendor": "willcom", "version": "1.7.0" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "106sh" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "945shg" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "102p" }, { "model": "windows mobile smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "x05ht" }, { "model": "windows mobile smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "x04ht" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "940n" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "943sh" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "101f" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "101p" }, { "model": "windows mobile smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "x02t" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "931n" }, { "model": "nec 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "001n" }, { "model": "wi-fi spot configuration software", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": null }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "003z" }, { "model": "windows mobile smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "x01sc" }, { "model": "disney mobile android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "dm010sh" }, { "model": "mobile wi-fi router", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "101sb" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "001ht" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "104sh" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "willcom", "version": "wx06k" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "201hw" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "005sh" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "001p" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "101sh" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "004sh" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "willcom", "version": "wx04k" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "x06ht" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "101n" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "107sh" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "002sh" }, { "model": "panasonic 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "001p" }, { "model": "samsung 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "941sc" }, { "model": "nec 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "940n" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "940sh" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "942p" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "101k" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "941sc" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "007sh" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "101dl" }, { "model": "mobile wi-fi router", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "102hw" }, { "model": "nec 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "931n" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "102sh" }, { "model": "sharp 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "941sh" }, { "model": "panasonic 3g handset", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "942p" }, { "model": "android smartphone", "scope": "eq", "trust": 1.0, "vendor": "softbank", "version": "200sh" }, { "model": "", "scope": null, "trust": 0.8, "vendor": "multiple venders", "version": null }, { "model": "wi-fi application", "scope": "eq", "trust": 0.6, "vendor": "softbank", "version": "1.7.0" }, { "model": "wisprclient", "scope": "eq", "trust": 0.6, "vendor": "softbank", "version": "1.3.0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-000039" }, { "db": "CNNVD", "id": "CNNVD-201305-413" }, { "db": "NVD", "id": "CVE-2013-2310" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:misc:multiple_vendors", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-000039" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Masashi Sakai", "sources": [ { "db": "BID", "id": "60009" }, { "db": "CNNVD", "id": "CNNVD-201305-413" } ], "trust": 0.9 }, "cve": "CVE-2013-2310", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2013-2310", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2013-000039", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-62312", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-2310", "trust": 1.0, "value": "LOW" }, { "author": "IPA", "id": "JVNDB-2013-000039", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-201305-413", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-62312", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-62312" }, { "db": "JVNDB", "id": "JVNDB-2013-000039" }, { "db": "CNNVD", "id": "CNNVD-201305-413" }, { "db": "NVD", "id": "CVE-2013-2310" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network. Wi-Fi Spot Configuration Software provided by SoftBank contains a vulnerability within the process of connecting to Wi-Fi access points, which may lead to user information being sent unintentionally. Masashi Sakai reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.When connecting to a Wi-Fi access point, an attacker may obtain user information. \nSuccessful exploits will allow attackers to obtain sensitive information by performing man-in-the-middle attacks. This may aid in further attacks", "sources": [ { "db": "NVD", "id": "CVE-2013-2310" }, { "db": "JVNDB", "id": "JVNDB-2013-000039" }, { "db": "BID", "id": "60009" }, { "db": "VULHUB", "id": "VHN-62312" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVN", "id": "JVN85371480", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2013-2310", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2013-000039", "trust": 2.5 }, { "db": "BID", "id": "60009", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201305-413", "trust": 0.7 }, { "db": "JVN", "id": "JVN#85371480", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-62312", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-62312" }, { "db": "BID", "id": "60009" }, { "db": "JVNDB", "id": "JVNDB-2013-000039" }, { "db": "CNNVD", "id": "CNNVD-201305-413" }, { "db": "NVD", "id": "CVE-2013-2310" } ] }, "id": "VAR-201306-0111", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-62312" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:21:21.395000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Information from SoftBank", "trust": 0.8, "url": "https://jvn.jp/en/jp/JVN85371480/397327/index.html" }, { "title": "Information from WILLCOM", "trust": 0.8, "url": "https://jvn.jp/en/jp/JVN85371480/995319/index.html" }, { "title": "Information from Disney Mobile on SoftBank", "trust": 0.8, "url": "https://jvn.jp/en/jp/JVN85371480/995417/index.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-000039" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-62312" }, { "db": "JVNDB", "id": "JVNDB-2013-000039" }, { "db": "NVD", "id": "CVE-2013-2310" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://jvn.jp/en/jp/jvn85371480/index.html" }, { "trust": 1.7, "url": "http://jvn.jp/en/jp/jvn85371480/397327/index.html" }, { "trust": 1.7, "url": "http://jvn.jp/en/jp/jvn85371480/995319/index.html" }, { "trust": 1.7, "url": "http://jvn.jp/en/jp/jvn85371480/995417/index.html" }, { "trust": 1.7, "url": "http://jvndb.jvn.jp/jvndb/jvndb-2013-000039" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2310" }, { "trust": 0.8, "url": "https://jvn.jp/en/jp/jvn85371480/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2310" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/60009" }, { "trust": 0.3, "url": "http://mb.softbank.jp/en/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-62312" }, { "db": "BID", "id": "60009" }, { "db": "JVNDB", "id": "JVNDB-2013-000039" }, { "db": "CNNVD", "id": "CNNVD-201305-413" }, { "db": "NVD", "id": "CVE-2013-2310" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-62312" }, { "db": "BID", "id": "60009" }, { "db": "JVNDB", "id": "JVNDB-2013-000039" }, { "db": "CNNVD", "id": "CNNVD-201305-413" }, { "db": "NVD", "id": "CVE-2013-2310" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-17T00:00:00", "db": "VULHUB", "id": "VHN-62312" }, { "date": "2013-05-20T00:00:00", "db": "BID", "id": "60009" }, { "date": "2013-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-000039" }, { "date": "2013-05-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-413" }, { "date": "2013-06-17T03:29:45.050000", "db": "NVD", "id": "CVE-2013-2310" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-06-17T00:00:00", "db": "VULHUB", "id": "VHN-62312" }, { "date": "2013-05-20T00:00:00", "db": "BID", "id": "60009" }, { "date": "2013-06-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-000039" }, { "date": "2013-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201305-413" }, { "date": "2013-06-17T04:00:00", "db": "NVD", "id": "CVE-2013-2310" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201305-413" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wi-Fi Spot Configuration Software vulnerability in the connection process", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-000039" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201305-413" } ], "trust": 0.6 } }