mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
Update for vendor name
Same as rapid7#33 -- add the vendor name to the title and desc
This commit is contained in:
parent
d3814ce0ea
commit
bacc86d28e
@ -3,7 +3,7 @@
|
|||||||
"ASSIGNER": "cve@rapid7.con",
|
"ASSIGNER": "cve@rapid7.con",
|
||||||
"ID": "CVE-2020-7381",
|
"ID": "CVE-2020-7381",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
"TITLE": "Code Injection in Nexpose Installer"
|
"TITLE": "Code Injection in Rapid7 Nexpose Installer"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
@ -42,7 +42,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "In Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during a Security Console installation and any arbitrary code executable using the same file name."
|
"value": "In Rapid7 Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during a Security Console installation and any arbitrary code executable using the same file name."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
Loading…
x
Reference in New Issue
Block a user