Skip to content

Commit 8e73daa

Browse files
committed
Clean up vuln map a bit
1 parent 0c4a387 commit 8e73daa

File tree

2 files changed

+9
-76
lines changed

2 files changed

+9
-76
lines changed

app/src/main/assets/vuln_map.json

Lines changed: 8 additions & 75 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
"https://github.com/torvalds/linux/commit/a134f083e79fb4c3d0a925691e732c56911b4326"
1616
],
1717
"cvssv2": 4.9,
18-
"cvedate": "2012-04-21"
18+
"cvedate": "08/05/2015"
1919
},
2020
"CVE-2014-4943": {
2121
"cve": "CVE-2014-4943",
@@ -32,7 +32,7 @@
3232
"patch": [
3333
"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf"
3434
],
35-
"cvedate": "2015-08-05"
35+
"cvedate": "07/19/2014"
3636
},
3737
"CVE-2015-1528": {
3838
"cve": "CVE-2015-1528",
@@ -67,7 +67,7 @@
6767
"patch": [
6868
"https://android.googlesource.com/platform/libcore/+/2bc5e811a817a8c667bca4318ae98582b0ee6dc6"
6969
],
70-
"cvedate": ""
70+
"cvedate": "08/01/2014"
7171
},
7272
"CVE-2015-6602": {
7373
"cve": "CVE-2015-6602",
@@ -138,10 +138,11 @@
138138
],
139139
"cvedate": "08/10/2015"
140140
},
141-
"ZipBug 8219321": {
142-
"cve": "ZipBug 8219321",
141+
"CVE-2013-4787": {
142+
"cve": "CVE-2013-4787",
143143
"altnames": [
144-
"Masterkey"
144+
"Masterkey",
145+
"ZipBug 8219321"
145146
],
146147
"description": "Zip bug allows modifying apk files without breaking the signature. Essentially, you can replace existing files in an app. Fixed around Android 4.4",
147148
"impact": "A local attacker can modify a system apk file and gain elevated privilidges. A remote attacker can try to trick the user (or another app) into installing the malicious apk file.",
@@ -256,41 +257,7 @@
256257
"__comment": "calculated using (AV:N/AC:L/AU:N/C:P/I:P/A:C/E:ND/RL:ND/RC:ND/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND). ",
257258
"cvssv2": 9.0,
258259
"patch": [],
259-
"cvedate": ""
260-
},
261-
"StumpRoot": {
262-
"cve": "StumpRoot",
263-
"altnames": [
264-
""
265-
],
266-
"description": "",
267-
"impact": "",
268-
"external_links": [
269-
"",
270-
""
271-
],
272-
"cvssv2": 0,
273-
"patch": [
274-
""
275-
],
276-
"cvedate": ""
277-
},
278-
"WeakSauce": {
279-
"cve": "WeakSauce",
280-
"altnames": [
281-
""
282-
],
283-
"description": "",
284-
"impact": "",
285-
"external_links": [
286-
"",
287-
""
288-
],
289-
"cvssv2": 0,
290-
"patch": [
291-
""
292-
],
293-
"cvedate": ""
260+
"cvedate": "10/27/2015"
294261
},
295262
"CVE-2011-3874": {
296263
"cve": "CVE-2011-3874",
@@ -325,40 +292,6 @@
325292
],
326293
"cvedate": "09/30/2015"
327294
},
328-
"CVE-2015-1538-2": {
329-
"cve": "CVE-2015-1538",
330-
"altnames": [
331-
"Stagefright"
332-
],
333-
"description": "A media processing issue that can be exploited for code execution",
334-
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
335-
"external_links": [
336-
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538",
337-
"https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/",
338-
"https://en.wikipedia.org/wiki/Stagefright_(bug)"
339-
],
340-
"cvssv2": 10,
341-
"patch": [
342-
],
343-
"cvedate": "09/30/2015"
344-
},
345-
"CVE-2015-1538-3": {
346-
"cve": "CVE-2015-1538",
347-
"altnames": [
348-
"Stagefright"
349-
],
350-
"description": "A media processing issue that can be exploited for code execution",
351-
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
352-
"external_links": [
353-
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538",
354-
"https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/",
355-
"https://en.wikipedia.org/wiki/Stagefright_(bug)"
356-
],
357-
"cvssv2": 10,
358-
"patch": [
359-
],
360-
"cvedate": "09/30/2015"
361-
},
362295
"CVE-2015-1538-4": {
363296
"cve": "CVE-2015-1538",
364297
"altnames": [

app/src/main/java/fuzion24/device/vulnerability/vulnerabilities/framework/zip/ZipBug8219321.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ public List<CPUArch> getSupportedArchitectures() {
2626
}
2727

2828
public String getCVEorID(){
29-
return "ZipBug 8219321";
29+
return "CVE-2013-4787";
3030
}
3131

3232
private static void replaceBytes(byte[] original, byte[] replacement, byte[] buffer) throws Exception {

0 commit comments

Comments
 (0)