"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-04-19 20:04:18 +00:00
parent 5ba3677116
commit 56f1569eb0
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
7 changed files with 31 additions and 31 deletions

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name": "http://www.talosintelligence.com/reports/2016-TALOS-0200/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/2016-TALOS-0200/"
},
{
"name": "93938",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93938"
},
{
"name": "http://www.talosintelligence.com/reports/2016-TALOS-0200/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/2016-TALOS-0200/"
}
]
},

View File

@ -57,6 +57,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93283"
},
{
"name": "GLSA-201702-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-16"
},
{
"name": "https://github.com/antirez/redis/commit/6d9f8e2462fc2c426d48c941edeb78e5df7d2977",
"refsource": "MISC",
@ -66,11 +71,6 @@
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0206/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0206/"
},
{
"name": "GLSA-201702-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-16"
}
]
},

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0214/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0214/"
},
{
"name": "96469",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96469"
},
{
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0214/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0214/"
}
]
},

View File

@ -57,11 +57,6 @@
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-12"
},
{
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0219/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0219/"
},
{
"name": "DSA-3704",
"refsource": "DEBIAN",
@ -91,6 +86,11 @@
"name": "1037333",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037333"
},
{
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0219/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0219/"
}
]
},

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0220/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0220/"
},
{
"name": "GLSA-201701-12",
"refsource": "GENTOO",
@ -91,6 +86,11 @@
"name": "1037333",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037333"
},
{
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0220/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0220/"
}
]
},

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0216/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0216/"
},
{
"name": "94727",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "DSA-3799",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3799"
},
{
"name": "http://www.talosintelligence.com/reports/TALOS-2016-0216/",
"refsource": "MISC",
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0216/"
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area. This is caused by misconfiguration of 7z.dll and a heap overflow. The command runs in a child process under the 7zFM.exe process,"
"value": "** DISPUTED ** 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area. This is caused by misconfiguration of 7z.dll and a heap overflow. The command runs in a child process under the 7zFM.exe process, NOTE: multiple third parties have reported that no privilege escalation can occur."
}
]
},