mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-12-30 05:58:39 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
f7046005d3
commit
8a40ba2f1f
@ -56,6 +56,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/51678",
|
||||
"url": "https://www.exploit-db.com/exploits/51678"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html",
|
||||
"url": "http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
||||
@ -48,6 +48,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.tenable.com/security/research/tra-2023-11",
|
||||
"url": "https://www.tenable.com/security/research/tra-2023-11"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html",
|
||||
"url": "http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
||||
@ -76,6 +76,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20230505-0009/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0009/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html",
|
||||
"url": "http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
||||
@ -71,6 +71,16 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3",
|
||||
"url": "https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html",
|
||||
"url": "http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
||||
@ -64,6 +64,11 @@
|
||||
"url": "https://lists.apache.org/thread/ozpl0opmob49rkcz8svo8wkxyw1395sf",
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread/ozpl0opmob49rkcz8svo8wkxyw1395sf"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/08/11/1",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.openwall.com/lists/oss-security/2023/08/11/1"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user