diff options
author | security tracker role <sectracker@soriano.debian.org> | 2021-01-01 08:10:18 +0000 |
---|---|---|
committer | security tracker role <sectracker@soriano.debian.org> | 2021-01-01 08:10:18 +0000 |
commit | 7c975e3b03993baf65f6f6d60218efd25e5cf865 (patch) | |
tree | 39c5fd01542cb6f946023fcfb7591567f2e517c6 /data/CVE/list.2016 | |
parent | f5f6b21362afd29cf0cf9b77b8130ebd5b1837df (diff) |
automatic update
Diffstat (limited to 'data/CVE/list.2016')
-rw-r--r-- | data/CVE/list.2016 | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/data/CVE/list.2016 b/data/CVE/list.2016 index 454b6a59a8..1ca0db0a9f 100644 --- a/data/CVE/list.2016 +++ b/data/CVE/list.2016 @@ -1,3 +1,19 @@ +CVE-2016-20008 (The REST/JSON project 7.x-1.x for Drupal allows session enumeration, a ...) + TODO: check +CVE-2016-20007 (The REST/JSON project 7.x-1.x for Drupal allows session name guessing, ...) + TODO: check +CVE-2016-20006 (The REST/JSON project 7.x-1.x for Drupal allows blockage of user login ...) + TODO: check +CVE-2016-20005 (The REST/JSON project 7.x-1.x for Drupal allows user registration bypa ...) + TODO: check +CVE-2016-20004 (The REST/JSON project 7.x-1.x for Drupal allows field access bypass, a ...) + TODO: check +CVE-2016-20003 (The REST/JSON project 7.x-1.x for Drupal allows user enumeration, aka ...) + TODO: check +CVE-2016-20002 (The REST/JSON project 7.x-1.x for Drupal allows comment access bypass, ...) + TODO: check +CVE-2016-20001 (The REST/JSON project 7.x-1.x for Drupal allows node access bypass, ak ...) + TODO: check CVE-2016-15001 REJECTED CVE-2016-11086 (lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby doe ...) |