mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
6954c6b813
commit
16ad8f05c6
@ -81,6 +81,11 @@
|
|||||||
"name": "ADV-2007-1815",
|
"name": "ADV-2007-1815",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/1815"
|
"url": "http://www.vupen.com/english/advisories/2007/1815"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/153072/Oracle-Application-Testing-Suite-WebLogic-Server-Administration-Console-War-Deployment.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/153072/Oracle-Application-Testing-Suite-WebLogic-Server-Administration-Console-War-Deployment.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -140,6 +140,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-359/",
|
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-359/",
|
||||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-359/"
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-359/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/153078/Microsoft-Internet-Explorer-Windows-10-1809-17763.316-Memory-Corruption.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/153078/Microsoft-Internet-Explorer-Windows-10-1809-17763.316-Memory-Corruption.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -56,6 +56,11 @@
|
|||||||
"url": "https://github.com/typora/typora-issues/issues/2505",
|
"url": "https://github.com/typora/typora-issues/issues/2505",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://github.com/typora/typora-issues/issues/2505"
|
"name": "https://github.com/typora/typora-issues/issues/2505"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/153082/Typora-0.9.9.24.6-Directory-Traversal.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/153082/Typora-0.9.9.24.6-Directory-Traversal.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -56,6 +56,11 @@
|
|||||||
"url": "https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt",
|
"url": "https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt"
|
"name": "https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/153079/Deltek-Maconomy-2.2.5-Local-File-Inclusion.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/153079/Deltek-Maconomy-2.2.5-Local-File-Inclusion.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -56,6 +56,11 @@
|
|||||||
"url": "https://faudhzanrahman.blogspot.com/2019/05/sql-injection-on-login-form.html",
|
"url": "https://faudhzanrahman.blogspot.com/2019/05/sql-injection-on-login-form.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://faudhzanrahman.blogspot.com/2019/05/sql-injection-on-login-form.html"
|
"name": "https://faudhzanrahman.blogspot.com/2019/05/sql-injection-on-login-form.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/153084/Petraware-pTransformer-ADC-SQL-Injection.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/153084/Petraware-pTransformer-ADC-SQL-Injection.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -72,6 +72,11 @@
|
|||||||
"name": "20190515 Cisco FXOS and NX-OS Software Command Injection Vulnerability (CVE-2019-1795)",
|
"name": "20190515 Cisco FXOS and NX-OS Software Command Injection Vulnerability (CVE-2019-1795)",
|
||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1795"
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1795"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BID",
|
||||||
|
"name": "108479",
|
||||||
|
"url": "http://www.securityfocus.com/bid/108479"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -61,6 +61,11 @@
|
|||||||
"name": "https://github.com/kanboard/kanboard/releases/tag/v1.2.8",
|
"name": "https://github.com/kanboard/kanboard/releases/tag/v1.2.8",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/kanboard/kanboard/releases/tag/v1.2.8"
|
"url": "https://github.com/kanboard/kanboard/releases/tag/v1.2.8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/153093/Kanboard-1.2.7-Cross-Site-Scripting.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user