From bdde60df5bc6f1196794fdc85f04c1257a6b9409 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 26 Mar 2018 12:06:34 -0400 Subject: [PATCH] - Synchronized data. --- 2017/15xxx/CVE-2017-15534.json | 2 +- 2018/1000xxx/CVE-2018-1000069.json | 2 +- 2018/7xxx/CVE-2018-7502.json | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/2017/15xxx/CVE-2017-15534.json b/2017/15xxx/CVE-2017-15534.json index cdf7fc5e074..8c3d573ea6a 100644 --- a/2017/15xxx/CVE-2017-15534.json +++ b/2017/15xxx/CVE-2017-15534.json @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "The Norton App Lock can be susceptible to an authentication bypass exploit. In this type of circumstance, the exploit can allow the user to kill the app to prevent it from locking the device, thereby allowing the individual to gain device access." + "value" : "The Norton App Lock prior to version 1.3.0.13 can be susceptible to an authentication bypass exploit. In this type of circumstance, the exploit can allow the user to kill the app to prevent it from locking the device, thereby allowing the individual to gain device access." } ] }, diff --git a/2018/1000xxx/CVE-2018-1000069.json b/2018/1000xxx/CVE-2018-1000069.json index d408f8d9bf2..9ff005e5569 100644 --- a/2018/1000xxx/CVE-2018-1000069.json +++ b/2018/1000xxx/CVE-2018-1000069.json @@ -36,7 +36,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "FreePlane version 1.5.9 and earlier contains a XML External Entity (XXE) vulnerability in XML Parser in mindmap loader that can result in stealing data from victim's machine. This attack appears to require the vicim to open a specially crafted mind map file. This vulnerability appears to have been fixed in 1.6+." + "value" : "FreePlane version 1.5.9 and earlier contains a XML External Entity (XXE) vulnerability in XML Parser in mindmap loader that can result in stealing data from victim's machine. This attack appears to require the victim to open a specially crafted mind map file. This vulnerability appears to have been fixed in 1.6+." } ] }, diff --git a/2018/7xxx/CVE-2018-7502.json b/2018/7xxx/CVE-2018-7502.json index 1460a72bfb6..61dc835c0c1 100644 --- a/2018/7xxx/CVE-2018-7502.json +++ b/2018/7xxx/CVE-2018-7502.json @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Kernal drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges." + "value" : "Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges." } ] }, @@ -57,7 +57,7 @@ "url" : "https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2018-001.pdf" }, { - "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-081-02," + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-081-02" }, { "url" : "http://www.securityfocus.com/bid/103487"