"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-05-04 21:01:24 +00:00
parent db41797569
commit 36ca055fc6
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
7 changed files with 25 additions and 11 deletions

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10686",
"ASSIGNER": "msiddiqu@redhat.com"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -71,4 +72,4 @@
]
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10700",
"ASSIGNER": "gsuckevi@redhat.com"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -55,7 +56,9 @@
"refsource": "CONFIRM"
},
{
"url": "https://www.samba.org/samba/security/CVE-2020-10700.html"
"url": "https://www.samba.org/samba/security/CVE-2020-10700.html",
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2020-10700.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10717",
"ASSIGNER": "msiddiqu@redhat.com"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -68,4 +69,4 @@
]
]
}
}
}

View File

@ -56,6 +56,11 @@
"url": "https://apps.apple.com/us/app/oklok/id1392287771",
"refsource": "MISC",
"name": "https://apps.apple.com/us/app/oklok/id1392287771"
},
{
"refsource": "MISC",
"name": "https://github.com/fierceoj/ownklok",
"url": "https://github.com/fierceoj/ownklok"
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://github.com/osTicket/osTicket/compare/v1.14.1...v1.14.2",
"refsource": "MISC",
"name": "https://github.com/osTicket/osTicket/compare/v1.14.1...v1.14.2"
},
{
"refsource": "EXPLOIT-DB",
"name": "48413",
"url": "https://www.exploit-db.com/exploits/48413"
}
]
}

View File

@ -25,7 +25,7 @@
}
]
},
"vendor_name": "Google LLC"
"vendor_name": "Google"
}
]
}
@ -43,7 +43,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the windows installer of Google Earth Pro versions prior to 7.3.3 allows an attacker using DLL hijacking to insert malicious local files to execute unauthenticated remote code on the targeted system."
"value": "Untrusted Search Path vulnerability in the windows installer of Google Earth Pro versions prior to 7.3.3 allows an attacker to insert malicious local files to execute unauthenticated remote code on the targeted system."
}
]
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve-coordination@google.com",
"ASSIGNER": "security@google.com",
"ID": "CVE-2020-8896",
"STATE": "PUBLIC",
"TITLE": "Buffer Overflow in Google Earth Pro"
@ -84,5 +84,4 @@
"source": {
"discovery": "INTERNAL"
}
}
}