From 91efe3801ebd2031dea8512dbb2ef51cf8a595af Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 19 Jan 2018 18:03:22 -0500 Subject: [PATCH] - Synchronized data. --- 2017/14xxx/CVE-2017-14460.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2017/14xxx/CVE-2017-14460.json b/2017/14xxx/CVE-2017-14460.json index 0c27a95d887..9517110ac02 100644 --- a/2017/14xxx/CVE-2017-14460.json +++ b/2017/14xxx/CVE-2017-14460.json @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "An exploitable overly permissive cross-domain (CORS) whitelist vulnerability exists in JSON-RPC of Parity Ethereum client version 1.7.8. An automatically sent JSON object to JSON-RPC endpoint can trigger this vulnerability. A victim needs to visit malicious website to trigger this vulnerability." + "value" : "An exploitable overly permissive cross-domain (CORS) whitelist vulnerability exists in JSON-RPC of Parity Ethereum client version 1.7.8. An automatically sent JSON object to JSON-RPC endpoint can trigger this vulnerability. A victim needs to visit a malicious website to trigger this vulnerability." } ] },