The TSUTAYA application 5.3 and earlier for Android allows remote attackers to execute arbitrary Java methods via a crafted HTML document.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN97384696/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000124 | Vendor Advisory |
https://play.google.com/store/apps/details?id=jp.co.tsutaya.android.ranking | |
http://jvn.jp/en/jp/JVN97384696/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000124 | Vendor Advisory |
https://play.google.com/store/apps/details?id=jp.co.tsutaya.android.ranking |
Configurations
History
21 Nov 2024, 02:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN97384696/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2014-000124 - Vendor Advisory | |
References | () https://play.google.com/store/apps/details?id=jp.co.tsutaya.android.ranking - |
Information
Published : 2014-12-19 11:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-7241
Mitre link : CVE-2014-7241
CVE.ORG link : CVE-2014-7241
JSON object : View
Products Affected
tsutaya
- tsutaya
CWE
CWE-20
Improper Input Validation