mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
137 lines
4.7 KiB
JSON
137 lines
4.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@mozilla.org",
|
|
"ID": "CVE-2014-1544",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
|
|
},
|
|
{
|
|
"name": "59719",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/59719"
|
|
},
|
|
{
|
|
"name": "60083",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/60083"
|
|
},
|
|
{
|
|
"name": "68816",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/68816"
|
|
},
|
|
{
|
|
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-63.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-63.html"
|
|
},
|
|
{
|
|
"name": "60621",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/60621"
|
|
},
|
|
{
|
|
"name": "GLSA-201504-01",
|
|
"refsource": "GENTOO",
|
|
"url": "https://security.gentoo.org/glsa/201504-01"
|
|
},
|
|
{
|
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
|
},
|
|
{
|
|
"name": "1030617",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1030617"
|
|
},
|
|
{
|
|
"name": "DSA-2996",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2014/dsa-2996"
|
|
},
|
|
{
|
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=963150",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=963150"
|
|
},
|
|
{
|
|
"name": "60486",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/60486"
|
|
},
|
|
{
|
|
"name": "60628",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/60628"
|
|
},
|
|
{
|
|
"name": "DSA-2986",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2014/dsa-2986"
|
|
},
|
|
{
|
|
"name": "59760",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/59760"
|
|
},
|
|
{
|
|
"name": "59591",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/59591"
|
|
}
|
|
]
|
|
}
|
|
} |