- Synchronized data.

This commit is contained in:
CVE Team 2018-03-26 12:06:34 -04:00
parent 60cf7de283
commit bdde60df5b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
3 changed files with 4 additions and 4 deletions

View File

@ -35,7 +35,7 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "The Norton App Lock can be susceptible to an authentication bypass exploit. In this type of circumstance, the exploit can allow the user to kill the app to prevent it from locking the device, thereby allowing the individual to gain device access." "value" : "The Norton App Lock prior to version 1.3.0.13 can be susceptible to an authentication bypass exploit. In this type of circumstance, the exploit can allow the user to kill the app to prevent it from locking the device, thereby allowing the individual to gain device access."
} }
] ]
}, },

View File

@ -36,7 +36,7 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "FreePlane version 1.5.9 and earlier contains a XML External Entity (XXE) vulnerability in XML Parser in mindmap loader that can result in stealing data from victim's machine. This attack appears to require the vicim to open a specially crafted mind map file. This vulnerability appears to have been fixed in 1.6+." "value" : "FreePlane version 1.5.9 and earlier contains a XML External Entity (XXE) vulnerability in XML Parser in mindmap loader that can result in stealing data from victim's machine. This attack appears to require the victim to open a specially crafted mind map file. This vulnerability appears to have been fixed in 1.6+."
} }
] ]
}, },

View File

@ -35,7 +35,7 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "Kernal drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges." "value" : "Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges."
} }
] ]
}, },
@ -57,7 +57,7 @@
"url" : "https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2018-001.pdf" "url" : "https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2018-001.pdf"
}, },
{ {
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-081-02," "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-081-02"
}, },
{ {
"url" : "http://www.securityfocus.com/bid/103487" "url" : "http://www.securityfocus.com/bid/103487"