|
15 | 15 | "https://github.com/torvalds/linux/commit/a134f083e79fb4c3d0a925691e732c56911b4326"
|
16 | 16 | ],
|
17 | 17 | "cvssv2": 4.9,
|
18 |
| - "cvedate": "2012-04-21" |
| 18 | + "cvedate": "08/05/2015" |
19 | 19 | },
|
20 | 20 | "CVE-2014-4943": {
|
21 | 21 | "cve": "CVE-2014-4943",
|
|
32 | 32 | "patch": [
|
33 | 33 | "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf"
|
34 | 34 | ],
|
35 |
| - "cvedate": "2015-08-05" |
| 35 | + "cvedate": "07/19/2014" |
36 | 36 | },
|
37 | 37 | "CVE-2015-1528": {
|
38 | 38 | "cve": "CVE-2015-1528",
|
|
67 | 67 | "patch": [
|
68 | 68 | "https://android.googlesource.com/platform/libcore/+/2bc5e811a817a8c667bca4318ae98582b0ee6dc6"
|
69 | 69 | ],
|
70 |
| - "cvedate": "" |
| 70 | + "cvedate": "08/01/2014" |
71 | 71 | },
|
72 | 72 | "CVE-2015-6602": {
|
73 | 73 | "cve": "CVE-2015-6602",
|
|
138 | 138 | ],
|
139 | 139 | "cvedate": "08/10/2015"
|
140 | 140 | },
|
141 |
| - "ZipBug 8219321": { |
142 |
| - "cve": "ZipBug 8219321", |
| 141 | + "CVE-2013-4787": { |
| 142 | + "cve": "CVE-2013-4787", |
143 | 143 | "altnames": [
|
144 |
| - "Masterkey" |
| 144 | + "Masterkey", |
| 145 | + "ZipBug 8219321" |
145 | 146 | ],
|
146 | 147 | "description": "Zip bug allows modifying apk files without breaking the signature. Essentially, you can replace existing files in an app. Fixed around Android 4.4",
|
147 | 148 | "impact": "A local attacker can modify a system apk file and gain elevated privilidges. A remote attacker can try to trick the user (or another app) into installing the malicious apk file.",
|
|
256 | 257 | "__comment": "calculated using (AV:N/AC:L/AU:N/C:P/I:P/A:C/E:ND/RL:ND/RC:ND/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND). ",
|
257 | 258 | "cvssv2": 9.0,
|
258 | 259 | "patch": [],
|
259 |
| - "cvedate": "" |
260 |
| - }, |
261 |
| - "StumpRoot": { |
262 |
| - "cve": "StumpRoot", |
263 |
| - "altnames": [ |
264 |
| - "" |
265 |
| - ], |
266 |
| - "description": "", |
267 |
| - "impact": "", |
268 |
| - "external_links": [ |
269 |
| - "", |
270 |
| - "" |
271 |
| - ], |
272 |
| - "cvssv2": 0, |
273 |
| - "patch": [ |
274 |
| - "" |
275 |
| - ], |
276 |
| - "cvedate": "" |
277 |
| - }, |
278 |
| - "WeakSauce": { |
279 |
| - "cve": "WeakSauce", |
280 |
| - "altnames": [ |
281 |
| - "" |
282 |
| - ], |
283 |
| - "description": "", |
284 |
| - "impact": "", |
285 |
| - "external_links": [ |
286 |
| - "", |
287 |
| - "" |
288 |
| - ], |
289 |
| - "cvssv2": 0, |
290 |
| - "patch": [ |
291 |
| - "" |
292 |
| - ], |
293 |
| - "cvedate": "" |
| 260 | + "cvedate": "10/27/2015" |
294 | 261 | },
|
295 | 262 | "CVE-2011-3874": {
|
296 | 263 | "cve": "CVE-2011-3874",
|
|
325 | 292 | ],
|
326 | 293 | "cvedate": "09/30/2015"
|
327 | 294 | },
|
328 |
| - "CVE-2015-1538-2": { |
329 |
| - "cve": "CVE-2015-1538", |
330 |
| - "altnames": [ |
331 |
| - "Stagefright" |
332 |
| - ], |
333 |
| - "description": "A media processing issue that can be exploited for code execution", |
334 |
| - "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
335 |
| - "external_links": [ |
336 |
| - "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538", |
337 |
| - "https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/", |
338 |
| - "https://en.wikipedia.org/wiki/Stagefright_(bug)" |
339 |
| - ], |
340 |
| - "cvssv2": 10, |
341 |
| - "patch": [ |
342 |
| - ], |
343 |
| - "cvedate": "09/30/2015" |
344 |
| - }, |
345 |
| - "CVE-2015-1538-3": { |
346 |
| - "cve": "CVE-2015-1538", |
347 |
| - "altnames": [ |
348 |
| - "Stagefright" |
349 |
| - ], |
350 |
| - "description": "A media processing issue that can be exploited for code execution", |
351 |
| - "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
352 |
| - "external_links": [ |
353 |
| - "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538", |
354 |
| - "https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/", |
355 |
| - "https://en.wikipedia.org/wiki/Stagefright_(bug)" |
356 |
| - ], |
357 |
| - "cvssv2": 10, |
358 |
| - "patch": [ |
359 |
| - ], |
360 |
| - "cvedate": "09/30/2015" |
361 |
| - }, |
362 | 295 | "CVE-2015-1538-4": {
|
363 | 296 | "cve": "CVE-2015-1538",
|
364 | 297 | "altnames": [
|
|
0 commit comments