"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-10-01 23:00:54 +00:00
parent a6ae7ab834
commit 79326074dc
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
14 changed files with 71 additions and 1 deletions

View File

@ -96,6 +96,11 @@
"name": "43970",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43970/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html",
"url": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html"
}
]
}

View File

@ -101,6 +101,11 @@
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html",
"url": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html"
}
]
}

View File

@ -91,6 +91,11 @@
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html",
"url": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html"
}
]
}

View File

@ -96,6 +96,11 @@
"name": "43970",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43970/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html",
"url": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html"
}
]
}

View File

@ -96,6 +96,11 @@
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0147",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0147"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html",
"url": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html"
}
]
}

View File

@ -91,6 +91,11 @@
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html",
"url": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html"
}
]
}

View File

@ -56,6 +56,11 @@
"refsource": "MISC",
"name": "https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/",
"url": "https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "https://www.youtube.com/watch?v=ZqqR89vzZ_I",
"url": "https://www.youtube.com/watch?v=ZqqR89vzZ_I"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154678/GFI-Kerio-Control-9.3.0-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/154678/GFI-Kerio-Control-9.3.0-Cross-Site-Scripting.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection",
"refsource": "MISC",
"name": "https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154652/GoAhead-2.5.0-Host-Header-Injection.html",
"url": "http://packetstormsecurity.com/files/154652/GoAhead-2.5.0-Host-Header-Injection.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://github.com/phpipam/phpipam/issues/2738",
"refsource": "MISC",
"name": "https://github.com/phpipam/phpipam/issues/2738"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154651/phpIPAM-1.4-SQL-Injection.html",
"url": "http://packetstormsecurity.com/files/154651/phpIPAM-1.4-SQL-Injection.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154623/vBulletin-5.x-0-Day-Pre-Auth-Remote-Command-Execution.html",
"url": "http://packetstormsecurity.com/files/154623/vBulletin-5.x-0-Day-Pre-Auth-Remote-Command-Execution.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.html"
}
]
}

View File

@ -72,6 +72,11 @@
"name": "20190806 Cisco Small Business 220 Series Smart Switches Authentication Bypass Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-auth_bypass"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html",
"url": "http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html"
}
]
},
@ -84,4 +89,4 @@
],
"discovery": "INTERNAL"
}
}
}

View File

@ -72,6 +72,11 @@
"name": "20190806 Cisco Small Business 220 Series Smart Switches Remote Code Execution Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html",
"url": "http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html"
}
]
},

View File

@ -72,6 +72,11 @@
"name": "20190806 Cisco Small Business 220 Series Smart Switches Command Injection Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-inject"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html",
"url": "http://packetstormsecurity.com/files/154667/Realtek-Managed-Switch-Controller-RTL83xx-Stack-Overflow.html"
}
]
},