Search criteria
18 vulnerabilities found for sleipnir_mobile by fenrir-inc
FKIE_CVE-2014-0806
Vulnerability from fkie_nvd - Published: 2014-01-22 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Sleipnir Mobile application 2.12.1 and earlier and Sleipnir Mobile Black Edition application 2.12.1 and earlier for Android provide Geolocation API data without verifying user consent, which allows remote attackers to obtain sensitive location information via a web site that makes API calls.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:-:black:*:*:*:*:*",
"matchCriteriaId": "F38B09CE-5B96-4FED-9712-5BCC15BB291D",
"versionEndIncluding": "2.12.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "DA07915B-2FE8-4221-A025-DAC5A75A1DCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:black:*:*:*:*:*",
"matchCriteriaId": "DA5B020D-8DD0-4D36-91E1-839D3224B7FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:*:*:*:*:*:*",
"matchCriteriaId": "F2902659-270F-438F-937D-8CCB59CF6118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:black:*:*:*:*:*",
"matchCriteriaId": "2D3321AE-7572-4CC0-A4BF-B22F3DCA7FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "04620C25-02F3-460A-A1AE-470B3C40013E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:black:*:*:*:*:*",
"matchCriteriaId": "A28BEC46-501E-4D10-827F-F59D40A11CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC33DC4D-5F7B-4941-AAF5-4FA0DD04637E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:-:black:*:*:*:*:*",
"matchCriteriaId": "81943E1A-A543-4BCD-9A93-EF22F38C3776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5FB5C98-CB3D-4307-9B5D-491EFF911645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:-:black:*:*:*:*:*",
"matchCriteriaId": "F6B2C471-87F3-46BB-B68E-E35109948A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "080CBAC1-4D96-43BD-9068-5398FEC3C44A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:-:black:*:*:*:*:*",
"matchCriteriaId": "1D1B9092-6C0D-4C36-BE46-3135926189F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A2CBA2-E4D7-46CE-9617-8C38CDDBC662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:-:black:*:*:*:*:*",
"matchCriteriaId": "576975B3-F9B8-4AD7-A29C-54BDAFAE273E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA4D0B-44C6-45B3-9ED0-A0C308E71EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:-:black:*:*:*:*:*",
"matchCriteriaId": "0E59E3FC-F8A7-4E67-B426-FBA6E59C8C9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8ED8D7-70BF-4889-A416-BF1FBB8E63BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:-:black:*:*:*:*:*",
"matchCriteriaId": "099C6540-9635-4265-8BCB-F645312418FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74B07D69-2DB1-4E44-96F9-246C7B2758E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:-:black:*:*:*:*:*",
"matchCriteriaId": "DBBF59C7-FECE-4DD1-9291-4C13D508DC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8A6B1B-56F7-43B5-9A23-E7A05FFBD1E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:-:black:*:*:*:*:*",
"matchCriteriaId": "7A2A8F75-5819-4936-ABFF-5B39C6341F8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B900B61-CF5F-4CF5-96D4-CE0E06131A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:-:black:*:*:*:*:*",
"matchCriteriaId": "D150DDD4-9372-4AE5-A3D5-6314AD0853FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A183983-B813-48F3-870F-FB46A2A2C040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:-:black:*:*:*:*:*",
"matchCriteriaId": "48BB80C7-2D4C-491F-A3CC-22DA9A9184F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2E802E-2F1C-470E-9D8B-C0E795FBCA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:-:black:*:*:*:*:*",
"matchCriteriaId": "86451F7E-2B6E-4708-AC7C-BE407D3540C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F483B292-70B2-4ACB-A289-E83B903C2DBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:-:black:*:*:*:*:*",
"matchCriteriaId": "A7F39BB9-4140-4FE2-98AA-B341F64083B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "32CB09CB-4EC5-4E50-B09C-8ABD73D39B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:-:black:*:*:*:*:*",
"matchCriteriaId": "4892F4DC-B60F-4C2A-A3FE-6EF298F40F50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "41A6C11D-C1D4-4D8F-B001-E0291A613296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:-:black:*:*:*:*:*",
"matchCriteriaId": "25522D1E-6C83-43A2-8159-536599C96BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A82B5677-139B-40D1-90C3-27F7D67E899C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:-:black:*:*:*:*:*",
"matchCriteriaId": "F2919501-49B6-4A68-806D-2FD1D279BF72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C4FE1731-1C48-49E0-BC73-B62CFD7CD826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.0:-:black:*:*:*:*:*",
"matchCriteriaId": "5EF0C1B9-E941-4810-9DCA-2DA7A7E6A9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "39B18D06-11F4-4ECF-A1B1-2F89027CC5A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.1:-:black:*:*:*:*:*",
"matchCriteriaId": "DC4EC5F9-DCBE-4597-86CE-DF8727F949D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AE06030A-E094-4908-9A6D-7F4AEC5ECEB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.2:-:black:*:*:*:*:*",
"matchCriteriaId": "FF8B2847-0AFA-43A9-8662-6057F70A5FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1D5A3505-E374-43DB-8003-CA61705F42B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.3:-:black:*:*:*:*:*",
"matchCriteriaId": "BC37257E-020A-4437-BF7D-02F4D27987BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1090D09C-EE15-4ED9-8D4E-73BB81B26DFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.3.0:-:black:*:*:*:*:*",
"matchCriteriaId": "17DE0D71-F19A-4534-AB20-0D2B1A7D2F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91C5363D-350C-4AA5-ACB6-A5BC3A9B7DB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.0:-:black:*:*:*:*:*",
"matchCriteriaId": "0DA89724-24A7-4D9B-82F2-F9C13C3905EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "854585B4-D7E9-4E1D-AC9C-FEE3CE83B48D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.1:-:black:*:*:*:*:*",
"matchCriteriaId": "B9E13374-632A-4596-8354-337530B0CD0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "79E2F9A3-EE04-45A6-B0CA-4F83899AB8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.0:-:black:*:*:*:*:*",
"matchCriteriaId": "8348B0F4-64C4-403F-9003-EF8D8E8CA56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F669D9D-7E10-450B-A937-1C5AA692F42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.1:-:black:*:*:*:*:*",
"matchCriteriaId": "35816440-BC7D-4D92-9835-1F3E5E5E3909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "055F04AB-83A1-4503-9648-5D0E5F533F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.6.0:-:black:*:*:*:*:*",
"matchCriteriaId": "998063B5-FEE7-410D-90CC-FC3F9DEB570C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06E3304E-C664-410F-AF02-6E492C9F84C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.7.0:-:black:*:*:*:*:*",
"matchCriteriaId": "5E18848A-B966-4311-B6B0-E15C164A56F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC9BC91-9BC9-4A78-AD8B-9B00EE6A8BCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.8.0:-:black:*:*:*:*:*",
"matchCriteriaId": "7D7AD9C4-7D32-465F-813D-0B9FEF9E0EA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.9.0:-:black:*:*:*:*:*",
"matchCriteriaId": "7F57F5E1-338C-48CC-8A3D-57316060ACA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7B1826-4EA6-4AB5-9A35-F5D6389E3619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.9.1:-:black:*:*:*:*:*",
"matchCriteriaId": "EFEFCBD3-8071-474C-A631-3399B3819338",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.10:-:*:*:*:android:*:*",
"matchCriteriaId": "B0B1F6AA-5535-464D-85DB-38343652DB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.10:-:-:*:black:android:*:*",
"matchCriteriaId": "06341A7E-8B7C-4C1A-88BD-95CC86E4C726",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A029558D-80DD-4075-9D57-9F8524717EA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.10.0:-:black:*:*:*:*:*",
"matchCriteriaId": "3D5A0507-11AE-410A-B8BB-46E98E8E398B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.11:-:*:*:*:*:*:*",
"matchCriteriaId": "8243D241-0917-4A92-A9F6-F34A4D77E3DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.11:-:black:*:*:*:*:*",
"matchCriteriaId": "F7FBC62D-0D29-401D-87C0-2D65B4916B55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.12:-:*:*:*:*:*:*",
"matchCriteriaId": "AAA01407-8E31-4033-96DE-BBC2B9311682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.12:-:black:*:*:*:*:*",
"matchCriteriaId": "5813C4C8-996F-4538-B6AA-5355A81D5BFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.12.1:-:*:*:*:*:*:*",
"matchCriteriaId": "59BF32E5-15F9-4342-A2E9-619D84C420CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.12.1 and earlier and Sleipnir Mobile Black Edition application 2.12.1 and earlier for Android provide Geolocation API data without verifying user consent, which allows remote attackers to obtain sensitive location information via a web site that makes API calls."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n Sleipnir Mobile 2.12.1 y anteriores versiones y Sleipnir Mobile Black Edition 2.12.1 y anteriores para Android proporcionan datos API de geolocalizaci\u00f3n sin verificar el consentimiento del usuario, lo que permite a atacantes remotos obtener informaci\u00f3n de localizaci\u00f3n sensible a trav\u00e9s de un sitio Web que realice llamadas API."
}
],
"id": "CVE-2014-0806",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-01-22T21:55:03.653",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN81637882/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000007"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN81637882/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000007"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-2317
Vulnerability from fkie_nvd - Published: 2013-06-03 23:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Sleipnir Mobile application 2.9.1 and earlier and Sleipnir Mobile Black Edition application 2.9.1 and earlier for Android allow remote attackers to spoof the address bar via vectors involving the opening of a new window.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1E8CA4D-183D-4B80-B4AD-E2E95C8C23F6",
"versionEndIncluding": "2.9.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "DA07915B-2FE8-4221-A025-DAC5A75A1DCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:*:*:*:*:*:*",
"matchCriteriaId": "F2902659-270F-438F-937D-8CCB59CF6118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "04620C25-02F3-460A-A1AE-470B3C40013E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC33DC4D-5F7B-4941-AAF5-4FA0DD04637E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5FB5C98-CB3D-4307-9B5D-491EFF911645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "080CBAC1-4D96-43BD-9068-5398FEC3C44A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A2CBA2-E4D7-46CE-9617-8C38CDDBC662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA4D0B-44C6-45B3-9ED0-A0C308E71EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8ED8D7-70BF-4889-A416-BF1FBB8E63BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74B07D69-2DB1-4E44-96F9-246C7B2758E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8A6B1B-56F7-43B5-9A23-E7A05FFBD1E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B900B61-CF5F-4CF5-96D4-CE0E06131A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A183983-B813-48F3-870F-FB46A2A2C040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2E802E-2F1C-470E-9D8B-C0E795FBCA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F483B292-70B2-4ACB-A289-E83B903C2DBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "32CB09CB-4EC5-4E50-B09C-8ABD73D39B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "41A6C11D-C1D4-4D8F-B001-E0291A613296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A82B5677-139B-40D1-90C3-27F7D67E899C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C4FE1731-1C48-49E0-BC73-B62CFD7CD826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "39B18D06-11F4-4ECF-A1B1-2F89027CC5A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AE06030A-E094-4908-9A6D-7F4AEC5ECEB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1D5A3505-E374-43DB-8003-CA61705F42B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1090D09C-EE15-4ED9-8D4E-73BB81B26DFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91C5363D-350C-4AA5-ACB6-A5BC3A9B7DB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "854585B4-D7E9-4E1D-AC9C-FEE3CE83B48D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "79E2F9A3-EE04-45A6-B0CA-4F83899AB8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F669D9D-7E10-450B-A937-1C5AA692F42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "055F04AB-83A1-4503-9648-5D0E5F533F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06E3304E-C664-410F-AF02-6E492C9F84C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC9BC91-9BC9-4A78-AD8B-9B00EE6A8BCD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:-:black:*:*:*:*:*",
"matchCriteriaId": "40230C86-361F-43A5-8BB1-AE9A0CE17E74",
"versionEndIncluding": "2.9.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:black:*:*:*:*:*",
"matchCriteriaId": "DA5B020D-8DD0-4D36-91E1-839D3224B7FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:black:*:*:*:*:*",
"matchCriteriaId": "2D3321AE-7572-4CC0-A4BF-B22F3DCA7FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:black:*:*:*:*:*",
"matchCriteriaId": "A28BEC46-501E-4D10-827F-F59D40A11CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:-:black:*:*:*:*:*",
"matchCriteriaId": "81943E1A-A543-4BCD-9A93-EF22F38C3776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:-:black:*:*:*:*:*",
"matchCriteriaId": "F6B2C471-87F3-46BB-B68E-E35109948A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:-:black:*:*:*:*:*",
"matchCriteriaId": "1D1B9092-6C0D-4C36-BE46-3135926189F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:-:black:*:*:*:*:*",
"matchCriteriaId": "576975B3-F9B8-4AD7-A29C-54BDAFAE273E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:-:black:*:*:*:*:*",
"matchCriteriaId": "0E59E3FC-F8A7-4E67-B426-FBA6E59C8C9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:-:black:*:*:*:*:*",
"matchCriteriaId": "099C6540-9635-4265-8BCB-F645312418FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:-:black:*:*:*:*:*",
"matchCriteriaId": "DBBF59C7-FECE-4DD1-9291-4C13D508DC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:-:black:*:*:*:*:*",
"matchCriteriaId": "7A2A8F75-5819-4936-ABFF-5B39C6341F8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:-:black:*:*:*:*:*",
"matchCriteriaId": "D150DDD4-9372-4AE5-A3D5-6314AD0853FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:-:black:*:*:*:*:*",
"matchCriteriaId": "48BB80C7-2D4C-491F-A3CC-22DA9A9184F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:-:black:*:*:*:*:*",
"matchCriteriaId": "86451F7E-2B6E-4708-AC7C-BE407D3540C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:-:black:*:*:*:*:*",
"matchCriteriaId": "A7F39BB9-4140-4FE2-98AA-B341F64083B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:-:black:*:*:*:*:*",
"matchCriteriaId": "4892F4DC-B60F-4C2A-A3FE-6EF298F40F50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:-:black:*:*:*:*:*",
"matchCriteriaId": "25522D1E-6C83-43A2-8159-536599C96BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:-:black:*:*:*:*:*",
"matchCriteriaId": "F2919501-49B6-4A68-806D-2FD1D279BF72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.0:-:black:*:*:*:*:*",
"matchCriteriaId": "5EF0C1B9-E941-4810-9DCA-2DA7A7E6A9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.1:-:black:*:*:*:*:*",
"matchCriteriaId": "DC4EC5F9-DCBE-4597-86CE-DF8727F949D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.2:-:black:*:*:*:*:*",
"matchCriteriaId": "FF8B2847-0AFA-43A9-8662-6057F70A5FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.3:-:black:*:*:*:*:*",
"matchCriteriaId": "BC37257E-020A-4437-BF7D-02F4D27987BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.3.0:-:black:*:*:*:*:*",
"matchCriteriaId": "17DE0D71-F19A-4534-AB20-0D2B1A7D2F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.0:-:black:*:*:*:*:*",
"matchCriteriaId": "0DA89724-24A7-4D9B-82F2-F9C13C3905EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.1:-:black:*:*:*:*:*",
"matchCriteriaId": "B9E13374-632A-4596-8354-337530B0CD0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.0:-:black:*:*:*:*:*",
"matchCriteriaId": "8348B0F4-64C4-403F-9003-EF8D8E8CA56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.1:-:black:*:*:*:*:*",
"matchCriteriaId": "35816440-BC7D-4D92-9835-1F3E5E5E3909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.6.0:-:black:*:*:*:*:*",
"matchCriteriaId": "998063B5-FEE7-410D-90CC-FC3F9DEB570C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.7.0:-:black:*:*:*:*:*",
"matchCriteriaId": "5E18848A-B966-4311-B6B0-E15C164A56F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.8.0:-:black:*:*:*:*:*",
"matchCriteriaId": "7D7AD9C4-7D32-465F-813D-0B9FEF9E0EA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.9.0:-:black:*:*:*:*:*",
"matchCriteriaId": "7F57F5E1-338C-48CC-8A3D-57316060ACA9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.9.1 and earlier and Sleipnir Mobile Black Edition application 2.9.1 and earlier for Android allow remote attackers to spoof the address bar via vectors involving the opening of a new window."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n Sleipnir Mobile v2.9.1 y anteriores y Sleipnir Mobile Black Edition v2.9.1 y anteriores para Android permite a atacantes remotos falsificar la barra de direcciones mediante vectores que comprenden abrir una nueva ventana."
}
],
"id": "CVE-2013-2317",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2013-06-03T23:55:00.973",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN22756333/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000046"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN22756333/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000046"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-2304
Vulnerability from fkie_nvd - Published: 2013-04-16 14:04 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Sleipnir Mobile application 2.8.0 and earlier and Sleipnir Mobile Black Edition application 2.8.0 and earlier for Android allow remote attackers to load arbitrary Extension APIs, and trigger downloads or obtain sensitive HTTP response-body information, via a crafted web page.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42BC8D18-300C-46EE-9A95-31A777392897",
"versionEndIncluding": "2.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "DA07915B-2FE8-4221-A025-DAC5A75A1DCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:*:*:*:*:*:*",
"matchCriteriaId": "F2902659-270F-438F-937D-8CCB59CF6118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "04620C25-02F3-460A-A1AE-470B3C40013E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC33DC4D-5F7B-4941-AAF5-4FA0DD04637E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5FB5C98-CB3D-4307-9B5D-491EFF911645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "080CBAC1-4D96-43BD-9068-5398FEC3C44A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A2CBA2-E4D7-46CE-9617-8C38CDDBC662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA4D0B-44C6-45B3-9ED0-A0C308E71EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8ED8D7-70BF-4889-A416-BF1FBB8E63BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74B07D69-2DB1-4E44-96F9-246C7B2758E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8A6B1B-56F7-43B5-9A23-E7A05FFBD1E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B900B61-CF5F-4CF5-96D4-CE0E06131A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A183983-B813-48F3-870F-FB46A2A2C040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2E802E-2F1C-470E-9D8B-C0E795FBCA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F483B292-70B2-4ACB-A289-E83B903C2DBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "32CB09CB-4EC5-4E50-B09C-8ABD73D39B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "41A6C11D-C1D4-4D8F-B001-E0291A613296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A82B5677-139B-40D1-90C3-27F7D67E899C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C4FE1731-1C48-49E0-BC73-B62CFD7CD826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "39B18D06-11F4-4ECF-A1B1-2F89027CC5A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AE06030A-E094-4908-9A6D-7F4AEC5ECEB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1D5A3505-E374-43DB-8003-CA61705F42B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1090D09C-EE15-4ED9-8D4E-73BB81B26DFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91C5363D-350C-4AA5-ACB6-A5BC3A9B7DB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "854585B4-D7E9-4E1D-AC9C-FEE3CE83B48D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "79E2F9A3-EE04-45A6-B0CA-4F83899AB8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F669D9D-7E10-450B-A937-1C5AA692F42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "055F04AB-83A1-4503-9648-5D0E5F533F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06E3304E-C664-410F-AF02-6E492C9F84C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:-:black:*:*:*:*:*",
"matchCriteriaId": "4553A289-E5DD-4FE2-862C-26CD28343AE8",
"versionEndIncluding": "2.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:black:*:*:*:*:*",
"matchCriteriaId": "DA5B020D-8DD0-4D36-91E1-839D3224B7FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:black:*:*:*:*:*",
"matchCriteriaId": "2D3321AE-7572-4CC0-A4BF-B22F3DCA7FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:black:*:*:*:*:*",
"matchCriteriaId": "A28BEC46-501E-4D10-827F-F59D40A11CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:-:black:*:*:*:*:*",
"matchCriteriaId": "81943E1A-A543-4BCD-9A93-EF22F38C3776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:-:black:*:*:*:*:*",
"matchCriteriaId": "F6B2C471-87F3-46BB-B68E-E35109948A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:-:black:*:*:*:*:*",
"matchCriteriaId": "1D1B9092-6C0D-4C36-BE46-3135926189F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:-:black:*:*:*:*:*",
"matchCriteriaId": "576975B3-F9B8-4AD7-A29C-54BDAFAE273E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:-:black:*:*:*:*:*",
"matchCriteriaId": "0E59E3FC-F8A7-4E67-B426-FBA6E59C8C9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:-:black:*:*:*:*:*",
"matchCriteriaId": "099C6540-9635-4265-8BCB-F645312418FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:-:black:*:*:*:*:*",
"matchCriteriaId": "DBBF59C7-FECE-4DD1-9291-4C13D508DC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:-:black:*:*:*:*:*",
"matchCriteriaId": "7A2A8F75-5819-4936-ABFF-5B39C6341F8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:-:black:*:*:*:*:*",
"matchCriteriaId": "D150DDD4-9372-4AE5-A3D5-6314AD0853FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:-:black:*:*:*:*:*",
"matchCriteriaId": "48BB80C7-2D4C-491F-A3CC-22DA9A9184F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:-:black:*:*:*:*:*",
"matchCriteriaId": "86451F7E-2B6E-4708-AC7C-BE407D3540C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:-:black:*:*:*:*:*",
"matchCriteriaId": "A7F39BB9-4140-4FE2-98AA-B341F64083B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:-:black:*:*:*:*:*",
"matchCriteriaId": "4892F4DC-B60F-4C2A-A3FE-6EF298F40F50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:-:black:*:*:*:*:*",
"matchCriteriaId": "25522D1E-6C83-43A2-8159-536599C96BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:-:black:*:*:*:*:*",
"matchCriteriaId": "F2919501-49B6-4A68-806D-2FD1D279BF72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.0:-:black:*:*:*:*:*",
"matchCriteriaId": "5EF0C1B9-E941-4810-9DCA-2DA7A7E6A9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.1:-:black:*:*:*:*:*",
"matchCriteriaId": "DC4EC5F9-DCBE-4597-86CE-DF8727F949D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.2:-:black:*:*:*:*:*",
"matchCriteriaId": "FF8B2847-0AFA-43A9-8662-6057F70A5FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.3:-:black:*:*:*:*:*",
"matchCriteriaId": "BC37257E-020A-4437-BF7D-02F4D27987BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.3.0:-:black:*:*:*:*:*",
"matchCriteriaId": "17DE0D71-F19A-4534-AB20-0D2B1A7D2F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.0:-:black:*:*:*:*:*",
"matchCriteriaId": "0DA89724-24A7-4D9B-82F2-F9C13C3905EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.1:-:black:*:*:*:*:*",
"matchCriteriaId": "B9E13374-632A-4596-8354-337530B0CD0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.0:-:black:*:*:*:*:*",
"matchCriteriaId": "8348B0F4-64C4-403F-9003-EF8D8E8CA56A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.1:-:black:*:*:*:*:*",
"matchCriteriaId": "35816440-BC7D-4D92-9835-1F3E5E5E3909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.6.0:-:black:*:*:*:*:*",
"matchCriteriaId": "998063B5-FEE7-410D-90CC-FC3F9DEB570C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.7.0:-:black:*:*:*:*:*",
"matchCriteriaId": "5E18848A-B966-4311-B6B0-E15C164A56F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.8.0 and earlier and Sleipnir Mobile Black Edition application 2.8.0 and earlier for Android allow remote attackers to load arbitrary Extension APIs, and trigger downloads or obtain sensitive HTTP response-body information, via a crafted web page."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n Sleipnir Mobile v2.8.0 y anteriores y Sleipnir Mobile Black Edition v2.8.0 y versiones anteriores para Android permite a atacantes remotos cargar Extension APIs de forma arbitraria, y generar descargas u obtener informaci\u00f3n sensible mediante informaci\u00f3n de HTTP response-body, mediante una p\u00e1gina especialmente dise\u00f1ada."
}
],
"id": "CVE-2013-2304",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-04-16T14:04:31.273",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN02895867/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000033"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN02895867/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000033"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-4004
Vulnerability from fkie_nvd - Published: 2012-08-08 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allows remote attackers to inject arbitrary web script or HTML via a crafted application that interacts with an unspecified Sleipnir Mobile function.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:-:black:*:*:*:*:*",
"matchCriteriaId": "B88FF6E6-44D9-4EA5-8504-6B316F7A36CC",
"versionEndIncluding": "2.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:black:*:*:*:*:*",
"matchCriteriaId": "DA5B020D-8DD0-4D36-91E1-839D3224B7FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:black:*:*:*:*:*",
"matchCriteriaId": "2D3321AE-7572-4CC0-A4BF-B22F3DCA7FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:black:*:*:*:*:*",
"matchCriteriaId": "A28BEC46-501E-4D10-827F-F59D40A11CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:-:black:*:*:*:*:*",
"matchCriteriaId": "81943E1A-A543-4BCD-9A93-EF22F38C3776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:-:black:*:*:*:*:*",
"matchCriteriaId": "F6B2C471-87F3-46BB-B68E-E35109948A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:-:black:*:*:*:*:*",
"matchCriteriaId": "1D1B9092-6C0D-4C36-BE46-3135926189F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:-:black:*:*:*:*:*",
"matchCriteriaId": "576975B3-F9B8-4AD7-A29C-54BDAFAE273E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:-:black:*:*:*:*:*",
"matchCriteriaId": "0E59E3FC-F8A7-4E67-B426-FBA6E59C8C9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:-:black:*:*:*:*:*",
"matchCriteriaId": "099C6540-9635-4265-8BCB-F645312418FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:-:black:*:*:*:*:*",
"matchCriteriaId": "DBBF59C7-FECE-4DD1-9291-4C13D508DC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:-:black:*:*:*:*:*",
"matchCriteriaId": "7A2A8F75-5819-4936-ABFF-5B39C6341F8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:-:black:*:*:*:*:*",
"matchCriteriaId": "D150DDD4-9372-4AE5-A3D5-6314AD0853FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:-:black:*:*:*:*:*",
"matchCriteriaId": "48BB80C7-2D4C-491F-A3CC-22DA9A9184F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:-:black:*:*:*:*:*",
"matchCriteriaId": "86451F7E-2B6E-4708-AC7C-BE407D3540C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:-:black:*:*:*:*:*",
"matchCriteriaId": "A7F39BB9-4140-4FE2-98AA-B341F64083B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:-:black:*:*:*:*:*",
"matchCriteriaId": "4892F4DC-B60F-4C2A-A3FE-6EF298F40F50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:-:black:*:*:*:*:*",
"matchCriteriaId": "25522D1E-6C83-43A2-8159-536599C96BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:-:black:*:*:*:*:*",
"matchCriteriaId": "F2919501-49B6-4A68-806D-2FD1D279BF72",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDE9C19-2091-4259-AD09-658FDB8FF632",
"versionEndIncluding": "2.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "DA07915B-2FE8-4221-A025-DAC5A75A1DCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:*:*:*:*:*:*",
"matchCriteriaId": "F2902659-270F-438F-937D-8CCB59CF6118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "04620C25-02F3-460A-A1AE-470B3C40013E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC33DC4D-5F7B-4941-AAF5-4FA0DD04637E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5FB5C98-CB3D-4307-9B5D-491EFF911645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "080CBAC1-4D96-43BD-9068-5398FEC3C44A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A2CBA2-E4D7-46CE-9617-8C38CDDBC662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA4D0B-44C6-45B3-9ED0-A0C308E71EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8ED8D7-70BF-4889-A416-BF1FBB8E63BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74B07D69-2DB1-4E44-96F9-246C7B2758E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8A6B1B-56F7-43B5-9A23-E7A05FFBD1E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B900B61-CF5F-4CF5-96D4-CE0E06131A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A183983-B813-48F3-870F-FB46A2A2C040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2E802E-2F1C-470E-9D8B-C0E795FBCA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F483B292-70B2-4ACB-A289-E83B903C2DBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "32CB09CB-4EC5-4E50-B09C-8ABD73D39B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "41A6C11D-C1D4-4D8F-B001-E0291A613296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A82B5677-139B-40D1-90C3-27F7D67E899C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allows remote attackers to inject arbitrary web script or HTML via a crafted application that interacts with an unspecified Sleipnir Mobile function."
},
{
"lang": "es",
"value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS)en la aplicaci\u00f3n de Sleipnir Mobile v2.2.0 y versiones anteriores y aplicaciones de Sleipnir Mobile Black Edition v2.2.0 y versiones anteriores para Android permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de una aplicaci\u00f3n dise\u00f1ada que interact\u00faa con un no especificado Sleipnir Mobile funci\u00f3n."
}
],
"id": "CVE-2012-4004",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-08-08T18:55:01.980",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN39519659/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000076"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN39519659/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-2649
Vulnerability from fkie_nvd - Published: 2012-08-08 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allow remote attackers to execute arbitrary Java methods, and obtain sensitive information or execute arbitrary commands, via a crafted web site.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:-:black:*:*:*:*:*",
"matchCriteriaId": "B88FF6E6-44D9-4EA5-8504-6B316F7A36CC",
"versionEndIncluding": "2.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:black:*:*:*:*:*",
"matchCriteriaId": "DA5B020D-8DD0-4D36-91E1-839D3224B7FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:black:*:*:*:*:*",
"matchCriteriaId": "2D3321AE-7572-4CC0-A4BF-B22F3DCA7FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:black:*:*:*:*:*",
"matchCriteriaId": "A28BEC46-501E-4D10-827F-F59D40A11CB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:-:black:*:*:*:*:*",
"matchCriteriaId": "81943E1A-A543-4BCD-9A93-EF22F38C3776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:-:black:*:*:*:*:*",
"matchCriteriaId": "F6B2C471-87F3-46BB-B68E-E35109948A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:-:black:*:*:*:*:*",
"matchCriteriaId": "1D1B9092-6C0D-4C36-BE46-3135926189F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:-:black:*:*:*:*:*",
"matchCriteriaId": "576975B3-F9B8-4AD7-A29C-54BDAFAE273E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:-:black:*:*:*:*:*",
"matchCriteriaId": "0E59E3FC-F8A7-4E67-B426-FBA6E59C8C9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:-:black:*:*:*:*:*",
"matchCriteriaId": "099C6540-9635-4265-8BCB-F645312418FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:-:black:*:*:*:*:*",
"matchCriteriaId": "DBBF59C7-FECE-4DD1-9291-4C13D508DC17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:-:black:*:*:*:*:*",
"matchCriteriaId": "7A2A8F75-5819-4936-ABFF-5B39C6341F8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:-:black:*:*:*:*:*",
"matchCriteriaId": "D150DDD4-9372-4AE5-A3D5-6314AD0853FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:-:black:*:*:*:*:*",
"matchCriteriaId": "48BB80C7-2D4C-491F-A3CC-22DA9A9184F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:-:black:*:*:*:*:*",
"matchCriteriaId": "86451F7E-2B6E-4708-AC7C-BE407D3540C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:-:black:*:*:*:*:*",
"matchCriteriaId": "A7F39BB9-4140-4FE2-98AA-B341F64083B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:-:black:*:*:*:*:*",
"matchCriteriaId": "4892F4DC-B60F-4C2A-A3FE-6EF298F40F50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:-:black:*:*:*:*:*",
"matchCriteriaId": "25522D1E-6C83-43A2-8159-536599C96BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:-:black:*:*:*:*:*",
"matchCriteriaId": "F2919501-49B6-4A68-806D-2FD1D279BF72",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDE9C19-2091-4259-AD09-658FDB8FF632",
"versionEndIncluding": "2.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "DA07915B-2FE8-4221-A025-DAC5A75A1DCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:*:*:*:*:*:*",
"matchCriteriaId": "F2902659-270F-438F-937D-8CCB59CF6118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "04620C25-02F3-460A-A1AE-470B3C40013E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC33DC4D-5F7B-4941-AAF5-4FA0DD04637E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5FB5C98-CB3D-4307-9B5D-491EFF911645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "080CBAC1-4D96-43BD-9068-5398FEC3C44A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A2CBA2-E4D7-46CE-9617-8C38CDDBC662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA4D0B-44C6-45B3-9ED0-A0C308E71EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8ED8D7-70BF-4889-A416-BF1FBB8E63BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74B07D69-2DB1-4E44-96F9-246C7B2758E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8A6B1B-56F7-43B5-9A23-E7A05FFBD1E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B900B61-CF5F-4CF5-96D4-CE0E06131A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A183983-B813-48F3-870F-FB46A2A2C040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2E802E-2F1C-470E-9D8B-C0E795FBCA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F483B292-70B2-4ACB-A289-E83B903C2DBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "32CB09CB-4EC5-4E50-B09C-8ABD73D39B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "41A6C11D-C1D4-4D8F-B001-E0291A613296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A82B5677-139B-40D1-90C3-27F7D67E899C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allow remote attackers to execute arbitrary Java methods, and obtain sensitive information or execute arbitrary commands, via a crafted web site."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n Sleipnir Mobile v2.2.0 y versiones anteriores y la aplicaci\u00f3n Sleipnir Mobile Negro Edition v2.2.0 y versiones anteriores para Android permite a atacantes remotos ejecutar los m\u00e9todos de Java, y obtener informaci\u00f3n sensible o ejecutar comandos arbitrarios, a trav\u00e9s de un sitio web dise\u00f1ado."
}
],
"id": "CVE-2012-2649",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-08-08T18:55:01.933",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN99730704/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000075"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN99730704/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000075"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-2646
Vulnerability from fkie_nvd - Published: 2012-07-25 10:42 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Sleipnir Mobile application before 2.1.0 and Sleipnir Mobile Black Edition application before 2.1.0 for Android do not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN88643450/index.html | Third Party Advisory, VDB Entry | |
| vultures@jpcert.or.jp | http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071 | Third Party Advisory, VDB Entry | |
| vultures@jpcert.or.jp | https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir | Third Party Advisory | |
| vultures@jpcert.or.jp | https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN88643450/index.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fenrir-inc | sleipnir_mobile | * | |
| fenrir-inc | sleipnir_mobile | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:*:*:*:-:android:*:*",
"matchCriteriaId": "D941663E-BEA7-4EA9-A31F-94D7407647E7",
"versionEndExcluding": "2.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:*:*:*:black:android:*:*",
"matchCriteriaId": "8787FDCE-26B6-4D2B-AA82-EF463CDF66FE",
"versionEndExcluding": "2.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application before 2.1.0 and Sleipnir Mobile Black Edition application before 2.1.0 for Android do not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n Sleipnir Mobile antes de v2.1.0 y Sleipnir Mobile Black Edition antes de v2.1.0 para Android no implementan correctamente la clase WebView, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una aplicaci\u00f3n hecha a mano para tal fin.\r\n"
}
],
"id": "CVE-2012-2646",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-07-25T10:42:35.320",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://jvn.jp/en/jp/JVN88643450/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://jvn.jp/en/jp/JVN88643450/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-0806 (GCVE-0-2014-0806)
Vulnerability from cvelistv5 – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
The Sleipnir Mobile application 2.12.1 and earlier and Sleipnir Mobile Black Edition application 2.12.1 and earlier for Android provide Geolocation API data without verifying user consent, which allows remote attackers to obtain sensitive location information via a web site that makes API calls.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:27:20.175Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#81637882",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN81637882/index.html"
},
{
"name": "JVNDB-2014-000007",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000007"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-01-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.12.1 and earlier and Sleipnir Mobile Black Edition application 2.12.1 and earlier for Android provide Geolocation API data without verifying user consent, which allows remote attackers to obtain sensitive location information via a web site that makes API calls."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-01-22T21:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#81637882",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN81637882/index.html"
},
{
"name": "JVNDB-2014-000007",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000007"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-0806",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Sleipnir Mobile application 2.12.1 and earlier and Sleipnir Mobile Black Edition application 2.12.1 and earlier for Android provide Geolocation API data without verifying user consent, which allows remote attackers to obtain sensitive location information via a web site that makes API calls."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#81637882",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN81637882/index.html"
},
{
"name": "JVNDB-2014-000007",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000007"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-0806",
"datePublished": "2014-01-22T21:00:00",
"dateReserved": "2014-01-06T00:00:00",
"dateUpdated": "2024-08-06T09:27:20.175Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2317 (GCVE-0-2013-2317)
Vulnerability from cvelistv5 – Published: 2013-06-03 23:00 – Updated: 2024-09-17 02:10
VLAI?
Summary
The Sleipnir Mobile application 2.9.1 and earlier and Sleipnir Mobile Black Edition application 2.9.1 and earlier for Android allow remote attackers to spoof the address bar via vectors involving the opening of a new window.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:36:45.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2013-000046",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000046"
},
{
"name": "JVN#22756333",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN22756333/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.9.1 and earlier and Sleipnir Mobile Black Edition application 2.9.1 and earlier for Android allow remote attackers to spoof the address bar via vectors involving the opening of a new window."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-06-03T23:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2013-000046",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000046"
},
{
"name": "JVN#22756333",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN22756333/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-2317",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Sleipnir Mobile application 2.9.1 and earlier and Sleipnir Mobile Black Edition application 2.9.1 and earlier for Android allow remote attackers to spoof the address bar via vectors involving the opening of a new window."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2013-000046",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000046"
},
{
"name": "JVN#22756333",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN22756333/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-2317",
"datePublished": "2013-06-03T23:00:00Z",
"dateReserved": "2013-03-04T00:00:00Z",
"dateUpdated": "2024-09-17T02:10:57.039Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2304 (GCVE-0-2013-2304)
Vulnerability from cvelistv5 – Published: 2013-04-16 10:00 – Updated: 2024-09-16 18:14
VLAI?
Summary
The Sleipnir Mobile application 2.8.0 and earlier and Sleipnir Mobile Black Edition application 2.8.0 and earlier for Android allow remote attackers to load arbitrary Extension APIs, and trigger downloads or obtain sensitive HTTP response-body information, via a crafted web page.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:36:45.769Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2013-000033",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000033"
},
{
"name": "JVN#02895867",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN02895867/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.8.0 and earlier and Sleipnir Mobile Black Edition application 2.8.0 and earlier for Android allow remote attackers to load arbitrary Extension APIs, and trigger downloads or obtain sensitive HTTP response-body information, via a crafted web page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-16T10:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2013-000033",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000033"
},
{
"name": "JVN#02895867",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN02895867/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-2304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Sleipnir Mobile application 2.8.0 and earlier and Sleipnir Mobile Black Edition application 2.8.0 and earlier for Android allow remote attackers to load arbitrary Extension APIs, and trigger downloads or obtain sensitive HTTP response-body information, via a crafted web page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2013-000033",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000033"
},
{
"name": "JVN#02895867",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN02895867/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-2304",
"datePublished": "2013-04-16T10:00:00Z",
"dateReserved": "2013-03-04T00:00:00Z",
"dateUpdated": "2024-09-16T18:14:17.997Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2649 (GCVE-0-2012-2649)
Vulnerability from cvelistv5 – Published: 2012-08-08 18:00 – Updated: 2024-09-16 17:38
VLAI?
Summary
The Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allow remote attackers to execute arbitrary Java methods, and obtain sensitive information or execute arbitrary commands, via a crafted web site.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:42:32.373Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#99730704",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN99730704/index.html"
},
{
"name": "JVNDB-2012-000075",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000075"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allow remote attackers to execute arbitrary Java methods, and obtain sensitive information or execute arbitrary commands, via a crafted web site."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-08T18:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#99730704",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN99730704/index.html"
},
{
"name": "JVNDB-2012-000075",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000075"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-2649",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allow remote attackers to execute arbitrary Java methods, and obtain sensitive information or execute arbitrary commands, via a crafted web site."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#99730704",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN99730704/index.html"
},
{
"name": "JVNDB-2012-000075",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000075"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-2649",
"datePublished": "2012-08-08T18:00:00Z",
"dateReserved": "2012-05-14T00:00:00Z",
"dateUpdated": "2024-09-16T17:38:51.293Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4004 (GCVE-0-2012-4004)
Vulnerability from cvelistv5 – Published: 2012-08-08 18:00 – Updated: 2024-09-16 23:35
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allows remote attackers to inject arbitrary web script or HTML via a crafted application that interacts with an unspecified Sleipnir Mobile function.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:21:04.102Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVNDB-2012-000076",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000076"
},
{
"name": "JVN#39519659",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN39519659/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allows remote attackers to inject arbitrary web script or HTML via a crafted application that interacts with an unspecified Sleipnir Mobile function."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-08T18:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVNDB-2012-000076",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000076"
},
{
"name": "JVN#39519659",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN39519659/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-4004",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allows remote attackers to inject arbitrary web script or HTML via a crafted application that interacts with an unspecified Sleipnir Mobile function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVNDB-2012-000076",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000076"
},
{
"name": "JVN#39519659",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN39519659/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-4004",
"datePublished": "2012-08-08T18:00:00Z",
"dateReserved": "2012-07-12T00:00:00Z",
"dateUpdated": "2024-09-16T23:35:27.594Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2646 (GCVE-0-2012-2646)
Vulnerability from cvelistv5 – Published: 2012-07-25 10:00 – Updated: 2024-09-17 00:15
VLAI?
Summary
The Sleipnir Mobile application before 2.1.0 and Sleipnir Mobile Black Edition application before 2.1.0 for Android do not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:42:30.667Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#88643450",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN88643450/index.html"
},
{
"name": "JVNDB-2012-000071",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application before 2.1.0 and Sleipnir Mobile Black Edition application before 2.1.0 for Android do not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-07-25T10:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#88643450",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN88643450/index.html"
},
{
"name": "JVNDB-2012-000071",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-2646",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Sleipnir Mobile application before 2.1.0 and Sleipnir Mobile Black Edition application before 2.1.0 for Android do not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#88643450",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN88643450/index.html"
},
{
"name": "JVNDB-2012-000071",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-2646",
"datePublished": "2012-07-25T10:00:00Z",
"dateReserved": "2012-05-14T00:00:00Z",
"dateUpdated": "2024-09-17T00:15:58.120Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-0806 (GCVE-0-2014-0806)
Vulnerability from nvd – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
The Sleipnir Mobile application 2.12.1 and earlier and Sleipnir Mobile Black Edition application 2.12.1 and earlier for Android provide Geolocation API data without verifying user consent, which allows remote attackers to obtain sensitive location information via a web site that makes API calls.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:27:20.175Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#81637882",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN81637882/index.html"
},
{
"name": "JVNDB-2014-000007",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000007"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-01-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.12.1 and earlier and Sleipnir Mobile Black Edition application 2.12.1 and earlier for Android provide Geolocation API data without verifying user consent, which allows remote attackers to obtain sensitive location information via a web site that makes API calls."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-01-22T21:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#81637882",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN81637882/index.html"
},
{
"name": "JVNDB-2014-000007",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000007"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-0806",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Sleipnir Mobile application 2.12.1 and earlier and Sleipnir Mobile Black Edition application 2.12.1 and earlier for Android provide Geolocation API data without verifying user consent, which allows remote attackers to obtain sensitive location information via a web site that makes API calls."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#81637882",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN81637882/index.html"
},
{
"name": "JVNDB-2014-000007",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000007"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-0806",
"datePublished": "2014-01-22T21:00:00",
"dateReserved": "2014-01-06T00:00:00",
"dateUpdated": "2024-08-06T09:27:20.175Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2317 (GCVE-0-2013-2317)
Vulnerability from nvd – Published: 2013-06-03 23:00 – Updated: 2024-09-17 02:10
VLAI?
Summary
The Sleipnir Mobile application 2.9.1 and earlier and Sleipnir Mobile Black Edition application 2.9.1 and earlier for Android allow remote attackers to spoof the address bar via vectors involving the opening of a new window.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:36:45.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2013-000046",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000046"
},
{
"name": "JVN#22756333",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN22756333/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.9.1 and earlier and Sleipnir Mobile Black Edition application 2.9.1 and earlier for Android allow remote attackers to spoof the address bar via vectors involving the opening of a new window."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-06-03T23:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2013-000046",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000046"
},
{
"name": "JVN#22756333",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN22756333/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-2317",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Sleipnir Mobile application 2.9.1 and earlier and Sleipnir Mobile Black Edition application 2.9.1 and earlier for Android allow remote attackers to spoof the address bar via vectors involving the opening of a new window."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2013-000046",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000046"
},
{
"name": "JVN#22756333",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN22756333/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-2317",
"datePublished": "2013-06-03T23:00:00Z",
"dateReserved": "2013-03-04T00:00:00Z",
"dateUpdated": "2024-09-17T02:10:57.039Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2304 (GCVE-0-2013-2304)
Vulnerability from nvd – Published: 2013-04-16 10:00 – Updated: 2024-09-16 18:14
VLAI?
Summary
The Sleipnir Mobile application 2.8.0 and earlier and Sleipnir Mobile Black Edition application 2.8.0 and earlier for Android allow remote attackers to load arbitrary Extension APIs, and trigger downloads or obtain sensitive HTTP response-body information, via a crafted web page.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:36:45.769Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2013-000033",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000033"
},
{
"name": "JVN#02895867",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN02895867/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.8.0 and earlier and Sleipnir Mobile Black Edition application 2.8.0 and earlier for Android allow remote attackers to load arbitrary Extension APIs, and trigger downloads or obtain sensitive HTTP response-body information, via a crafted web page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-04-16T10:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2013-000033",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000033"
},
{
"name": "JVN#02895867",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN02895867/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-2304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Sleipnir Mobile application 2.8.0 and earlier and Sleipnir Mobile Black Edition application 2.8.0 and earlier for Android allow remote attackers to load arbitrary Extension APIs, and trigger downloads or obtain sensitive HTTP response-body information, via a crafted web page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2013-000033",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000033"
},
{
"name": "JVN#02895867",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN02895867/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-2304",
"datePublished": "2013-04-16T10:00:00Z",
"dateReserved": "2013-03-04T00:00:00Z",
"dateUpdated": "2024-09-16T18:14:17.997Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2649 (GCVE-0-2012-2649)
Vulnerability from nvd – Published: 2012-08-08 18:00 – Updated: 2024-09-16 17:38
VLAI?
Summary
The Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allow remote attackers to execute arbitrary Java methods, and obtain sensitive information or execute arbitrary commands, via a crafted web site.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:42:32.373Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#99730704",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN99730704/index.html"
},
{
"name": "JVNDB-2012-000075",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000075"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allow remote attackers to execute arbitrary Java methods, and obtain sensitive information or execute arbitrary commands, via a crafted web site."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-08T18:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#99730704",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN99730704/index.html"
},
{
"name": "JVNDB-2012-000075",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000075"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-2649",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allow remote attackers to execute arbitrary Java methods, and obtain sensitive information or execute arbitrary commands, via a crafted web site."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#99730704",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN99730704/index.html"
},
{
"name": "JVNDB-2012-000075",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000075"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-2649",
"datePublished": "2012-08-08T18:00:00Z",
"dateReserved": "2012-05-14T00:00:00Z",
"dateUpdated": "2024-09-16T17:38:51.293Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4004 (GCVE-0-2012-4004)
Vulnerability from nvd – Published: 2012-08-08 18:00 – Updated: 2024-09-16 23:35
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allows remote attackers to inject arbitrary web script or HTML via a crafted application that interacts with an unspecified Sleipnir Mobile function.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:21:04.102Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVNDB-2012-000076",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000076"
},
{
"name": "JVN#39519659",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN39519659/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allows remote attackers to inject arbitrary web script or HTML via a crafted application that interacts with an unspecified Sleipnir Mobile function."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-08T18:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVNDB-2012-000076",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000076"
},
{
"name": "JVN#39519659",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN39519659/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-4004",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the Sleipnir Mobile application 2.2.0 and earlier and Sleipnir Mobile Black Edition application 2.2.0 and earlier for Android allows remote attackers to inject arbitrary web script or HTML via a crafted application that interacts with an unspecified Sleipnir Mobile function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVNDB-2012-000076",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000076"
},
{
"name": "JVN#39519659",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN39519659/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-4004",
"datePublished": "2012-08-08T18:00:00Z",
"dateReserved": "2012-07-12T00:00:00Z",
"dateUpdated": "2024-09-16T23:35:27.594Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-2646 (GCVE-0-2012-2646)
Vulnerability from nvd – Published: 2012-07-25 10:00 – Updated: 2024-09-17 00:15
VLAI?
Summary
The Sleipnir Mobile application before 2.1.0 and Sleipnir Mobile Black Edition application before 2.1.0 for Android do not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:42:30.667Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#88643450",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN88643450/index.html"
},
{
"name": "JVNDB-2012-000071",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Sleipnir Mobile application before 2.1.0 and Sleipnir Mobile Black Edition application before 2.1.0 for Android do not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-07-25T10:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#88643450",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN88643450/index.html"
},
{
"name": "JVNDB-2012-000071",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-2646",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Sleipnir Mobile application before 2.1.0 and Sleipnir Mobile Black Edition application before 2.1.0 for Android do not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black"
},
{
"name": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir",
"refsource": "CONFIRM",
"url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir"
},
{
"name": "JVN#88643450",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN88643450/index.html"
},
{
"name": "JVNDB-2012-000071",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-2646",
"datePublished": "2012-07-25T10:00:00Z",
"dateReserved": "2012-05-14T00:00:00Z",
"dateUpdated": "2024-09-17T00:15:58.120Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}