mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
73 lines
2.2 KiB
JSON
73 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2015-2908",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "** DISPUTED ** Mobile Devices (aka MDI) C4 OBD-II dongles with firmware 2.x and 3.4.x, as used in Metromile Pulse and other products, do not validate firmware updates, which allows remote attackers to execute arbitrary code by specifying an update server. NOTE: the vendor states \"This was a flaw for the developer/debugging devices, and was fixed in production version about 3 years ago.\""
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://www.usenix.org/conference/woot15/workshop-program/presentation/foster",
|
|
"refsource" : "MISC",
|
|
"url" : "https://www.usenix.org/conference/woot15/workshop-program/presentation/foster"
|
|
},
|
|
{
|
|
"name" : "http://www.kb.cert.org/vuls/id/CKIG-9ZAQGX",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.kb.cert.org/vuls/id/CKIG-9ZAQGX"
|
|
},
|
|
{
|
|
"name" : "VU#209512",
|
|
"refsource" : "CERT-VN",
|
|
"url" : "http://www.kb.cert.org/vuls/id/209512"
|
|
}
|
|
]
|
|
}
|
|
}
|