"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-04-19 19:03:11 +00:00
parent e344f90598
commit bde5408746
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
7 changed files with 32 additions and 27 deletions

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "97020",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97020"
},
{
"name": "http://www.talosintelligence.com/reports/TALOS-2017-0269/",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "http://www.ni.com/product-documentation/53778/en/",
"refsource": "CONFIRM",
"url": "http://www.ni.com/product-documentation/53778/en/"
},
{
"name": "97020",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97020"
}
]
},

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "An exploitable memory corruption vulnerability exists in the RSRC segment parsing functionality of LabVIEW 2017, LabVIEW 2016, LabVIEW 2015, and LabVIEW 2014. A specially crafted Virtual Instrument (VI) file can cause an attacker controlled looping condition resulting in an arbitrary null write. An attacker controlled VI file can be used to trigger this vulnerability and can potentially result in code execution."
"value": "An exploitable memory corruption vulnerability exists in the RSRC segment parsing functionality of LabVIEW 2017, LabVIEW 2016, LabVIEW 2015, and LabVIEW 2014. A specially crafted Virtual Instrument (VI) file can cause an attacker controlled looping condition resulting in an arbitrary null write. An attacker controlled VI file can be used to trigger this vulnerability and can potentially result in code execution."
}
]
},
@ -53,16 +53,16 @@
},
"references": {
"reference_data": [
{
"name": "https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.html",
"refsource": "MISC",
"url": "https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.html"
},
{
"name": "100519",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100519"
},
{
"name": "https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.html",
"refsource": "MISC",
"url": "https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.html"
},
{
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0273",
"refsource": "MISC",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "GLSA-201706-18",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-18"
},
{
"name": "http://www.talosintelligence.com/reports/TALOS-2017-0274/",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-01",
"refsource": "CONFIRM",
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-01"
},
{
"name": "GLSA-201706-18",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-18"
}
]
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name": "http://www.talosintelligence.com/reports/TALOS-2017-0280/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2017-0280/"
},
{
"name": "96742",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96742"
},
{
"name": "http://www.talosintelligence.com/reports/TALOS-2017-0280/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2017-0280/"
}
]
},

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0593",
"refsource": "MISC",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0593"
},
{
"name": "105162",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105162"
},
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0593",
"refsource": "MISC",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0593"
}
]
},

View File

@ -78,6 +78,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html",
"url": "http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220419-0002/",
"url": "https://security.netapp.com/advisory/ntap-20220419-0002/"
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "** DISPUTED ** 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area. This is caused by misconfiguration of 7z.dll and a heap overflow. The command runs in a child process under the 7zFM.exe process, NOTE: multiple third parties have reported that no privilege escalation can occur."
"value": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area. This is caused by misconfiguration of 7z.dll and a heap overflow. The command runs in a child process under the 7zFM.exe process,"
}
]
},