mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3cd5c39bb3
commit
a30a230683
@ -81,6 +81,11 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20200227 Hostapd fails at seeding PRNGS, leading to insufficient entropy (CVE-2016-10743 and CVE-2019-10064)",
|
||||
"url": "http://seclists.org/fulldisclosure/2020/Feb/26"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html",
|
||||
"url": "http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.openwall.com/lists/oss-security/2020/02/27/1",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2020/02/27/1"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html",
|
||||
"url": "http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -250,6 +250,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-257/",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-257/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156576/Microsoft-Windows-Kernel-Privilege-Escalation.html",
|
||||
"url": "http://packetstormsecurity.com/files/156576/Microsoft-Windows-Kernel-Privilege-Escalation.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20200227 CVE-2020-5497 - MITREid Connect XSS",
|
||||
"url": "http://seclists.org/fulldisclosure/2020/Feb/25"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html",
|
||||
"url": "http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -48,6 +48,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://techdocs.broadcom.com/us/product-content/status/announcement-documents/2019/ca20200205-01-security-notice-for-ca-unified-infrastructure-management.html",
|
||||
"url": "https://techdocs.broadcom.com/us/product-content/status/announcement-documents/2019/ca20200205-01-security-notice-for-ca-unified-infrastructure-management.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156577/Nimsoft-nimcontroller-7.80-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/156577/Nimsoft-nimcontroller-7.80-Remote-Code-Execution.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user