mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
107 lines
3.8 KiB
JSON
107 lines
3.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@google.com",
|
|
"ID": "CVE-2015-1296",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The UnescapeURLWithAdjustmentsImpl implementation in net/base/escape.cc in Google Chrome before 45.0.2454.85 does not prevent display of Unicode LOCK characters in the omnibox, which makes it easier for remote attackers to spoof the SSL lock icon by placing one of these characters at the end of a URL, as demonstrated by the omnibox in localizations for right-to-left languages."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "openSUSE-SU-2015:1873",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html"
|
|
},
|
|
{
|
|
"name": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
|
|
},
|
|
{
|
|
"name": "https://code.google.com/p/chromium/issues/detail?id=421332",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://code.google.com/p/chromium/issues/detail?id=421332"
|
|
},
|
|
{
|
|
"name": "RHSA-2015:1712",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1712.html"
|
|
},
|
|
{
|
|
"name": "1033472",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1033472"
|
|
},
|
|
{
|
|
"name": "openSUSE-SU-2015:1586",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00029.html"
|
|
},
|
|
{
|
|
"name": "https://codereview.chromium.org/1189553002/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://codereview.chromium.org/1189553002/"
|
|
},
|
|
{
|
|
"name": "https://codereview.chromium.org/1180393003/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://codereview.chromium.org/1180393003/"
|
|
},
|
|
{
|
|
"name": "DSA-3351",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2015/dsa-3351"
|
|
},
|
|
{
|
|
"name": "GLSA-201603-09",
|
|
"refsource": "GENTOO",
|
|
"url": "https://security.gentoo.org/glsa/201603-09"
|
|
}
|
|
]
|
|
}
|
|
} |