mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
c4f5b18959
commit
c4fbc4fb8a
@ -59,6 +59,11 @@
|
||||
"url": "https://www.cashit.at/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.cashit.at/"
|
||||
},
|
||||
{
|
||||
"url": "https://doi.org/10.35011/ww2q-d522",
|
||||
"refsource": "MISC",
|
||||
"name": "https://doi.org/10.35011/ww2q-d522"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -59,6 +59,11 @@
|
||||
"url": "https://www.cashit.at/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.cashit.at/"
|
||||
},
|
||||
{
|
||||
"url": "https://doi.org/10.35011/ww2q-d522",
|
||||
"refsource": "MISC",
|
||||
"name": "https://doi.org/10.35011/ww2q-d522"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,6 +68,11 @@
|
||||
"url": "https://www.cashit.at/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.cashit.at/"
|
||||
},
|
||||
{
|
||||
"url": "https://doi.org/10.35011/ww2q-d522",
|
||||
"refsource": "MISC",
|
||||
"name": "https://doi.org/10.35011/ww2q-d522"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0\n\nThis issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. v9.0 Mac client release is still pending."
|
||||
"value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0\n\nThis issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. \n\nCustomers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user