mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-05 18:28:42 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
db41797569
commit
36ca055fc6
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-10686",
|
||||
"ASSIGNER": "msiddiqu@redhat.com"
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -71,4 +72,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-10700",
|
||||
"ASSIGNER": "gsuckevi@redhat.com"
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -55,7 +56,9 @@
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://www.samba.org/samba/security/CVE-2020-10700.html"
|
||||
"url": "https://www.samba.org/samba/security/CVE-2020-10700.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.samba.org/samba/security/CVE-2020-10700.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-10717",
|
||||
"ASSIGNER": "msiddiqu@redhat.com"
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -68,4 +69,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -56,6 +56,11 @@
|
||||
"url": "https://apps.apple.com/us/app/oklok/id1392287771",
|
||||
"refsource": "MISC",
|
||||
"name": "https://apps.apple.com/us/app/oklok/id1392287771"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/fierceoj/ownklok",
|
||||
"url": "https://github.com/fierceoj/ownklok"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"url": "https://github.com/osTicket/osTicket/compare/v1.14.1...v1.14.2",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/osTicket/osTicket/compare/v1.14.1...v1.14.2"
|
||||
},
|
||||
{
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"name": "48413",
|
||||
"url": "https://www.exploit-db.com/exploits/48413"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -25,7 +25,7 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Google LLC"
|
||||
"vendor_name": "Google"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -43,7 +43,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A vulnerability in the windows installer of Google Earth Pro versions prior to 7.3.3 allows an attacker using DLL hijacking to insert malicious local files to execute unauthenticated remote code on the targeted system."
|
||||
"value": "Untrusted Search Path vulnerability in the windows installer of Google Earth Pro versions prior to 7.3.3 allows an attacker to insert malicious local files to execute unauthenticated remote code on the targeted system."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve-coordination@google.com",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2020-8896",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Buffer Overflow in Google Earth Pro"
|
||||
@ -84,5 +84,4 @@
|
||||
"source": {
|
||||
"discovery": "INTERNAL"
|
||||
}
|
||||
}
|
||||
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user