"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-09-24 02:01:40 +00:00
parent 1198560faa
commit f886979658
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
3 changed files with 198 additions and 138 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-4719", "ID": "CVE-2015-4719",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "The client API authentication mechanism in Pexip Infinity before 10 allows remote attackers to gain privileges via a crafted request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.pexip.com/admin/security_bulletins.htm",
"refsource": "MISC",
"name": "https://docs.pexip.com/admin/security_bulletins.htm"
} }
] ]
} }

View File

@ -1,69 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "security@trendmicro.com", "ASSIGNER": "security@trendmicro.com",
"ID" : "CVE-2020-15604", "ID": "CVE-2020-15604",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Trend Micro Security (Consumer)", "product_name": "Trend Micro Security (Consumer)",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "2019 (v15)" "version_value": "2019 (v15)"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Trend Micro" "vendor_name": "Trend Micro"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one.\r\n\r\nCWE-494: Update files are not properly verified." "value": "An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-494: Update files are not properly verified."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Update files not properly verified" "value": "Update files not properly verified"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"url" : "https://helpcenter.trendmicro.com/en-us/article/TMKA-09890" "url": "https://helpcenter.trendmicro.com/en-us/article/TMKA-09890",
}, "refsource": "MISC",
{ "name": "https://helpcenter.trendmicro.com/en-us/article/TMKA-09890"
"url" : "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-09673" },
}, {
{ "url": "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-09673",
"url" : "https://jvn.jp/en/jp/JVN60093979/" "refsource": "MISC",
}, "name": "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-09673"
{ },
"url" : "https://jvn.jp/jp/JVN60093979/" {
} "url": "https://jvn.jp/en/jp/JVN60093979/",
] "refsource": "MISC",
} "name": "https://jvn.jp/en/jp/JVN60093979/"
} },
{
"url": "https://jvn.jp/jp/JVN60093979/",
"refsource": "MISC",
"name": "https://jvn.jp/jp/JVN60093979/"
}
]
}
}

View File

@ -1,69 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "security@trendmicro.com", "ASSIGNER": "security@trendmicro.com",
"ID" : "CVE-2020-24560", "ID": "CVE-2020-24560",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Trend Micro Security (Consumer)", "product_name": "Trend Micro Security (Consumer)",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "2019 (v15)" "version_value": "2019 (v15)"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Trend Micro" "vendor_name": "Trend Micro"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one.\r\n\r\nCWE-295: Improper server certificate verification in the communication with the update server." "value": "An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-295: Improper server certificate verification in the communication with the update server."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Improper Certification Validation" "value": "Improper Certification Validation"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"url" : "https://helpcenter.trendmicro.com/en-us/article/TMKA-09890" "url": "https://helpcenter.trendmicro.com/en-us/article/TMKA-09890",
}, "refsource": "MISC",
{ "name": "https://helpcenter.trendmicro.com/en-us/article/TMKA-09890"
"url" : "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-09673" },
}, {
{ "url": "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-09673",
"url" : "https://jvn.jp/en/jp/JVN60093979/" "refsource": "MISC",
}, "name": "https://helpcenter.trendmicro.com/ja-jp/article/TMKA-09673"
{ },
"url" : "https://jvn.jp/jp/JVN60093979/" {
} "url": "https://jvn.jp/en/jp/JVN60093979/",
] "refsource": "MISC",
} "name": "https://jvn.jp/en/jp/JVN60093979/"
} },
{
"url": "https://jvn.jp/jp/JVN60093979/",
"refsource": "MISC",
"name": "https://jvn.jp/jp/JVN60093979/"
}
]
}
}