diff options
author | security tracker role <sectracker@soriano.debian.org> | 2021-01-01 08:10:18 +0000 |
---|---|---|
committer | security tracker role <sectracker@soriano.debian.org> | 2021-01-01 08:10:18 +0000 |
commit | 5e3e0551fa465e2fdae260e6d912f653472a183c (patch) | |
tree | 067c359f2014c19904dac787a0ee568fe30990f7 /data/CVE/2016.list | |
parent | c78720d09d6d43a4301a89ff5e6e15705a964b42 (diff) |
automatic update
Diffstat (limited to 'data/CVE/2016.list')
-rw-r--r-- | data/CVE/2016.list | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/data/CVE/2016.list b/data/CVE/2016.list index 454b6a59a8..1ca0db0a9f 100644 --- a/data/CVE/2016.list +++ b/data/CVE/2016.list @@ -1,3 +1,19 @@ +CVE-2016-20008 (The REST/JSON project 7.x-1.x for Drupal allows session enumeration, a ...) + TODO: check +CVE-2016-20007 (The REST/JSON project 7.x-1.x for Drupal allows session name guessing, ...) + TODO: check +CVE-2016-20006 (The REST/JSON project 7.x-1.x for Drupal allows blockage of user login ...) + TODO: check +CVE-2016-20005 (The REST/JSON project 7.x-1.x for Drupal allows user registration bypa ...) + TODO: check +CVE-2016-20004 (The REST/JSON project 7.x-1.x for Drupal allows field access bypass, a ...) + TODO: check +CVE-2016-20003 (The REST/JSON project 7.x-1.x for Drupal allows user enumeration, aka ...) + TODO: check +CVE-2016-20002 (The REST/JSON project 7.x-1.x for Drupal allows comment access bypass, ...) + TODO: check +CVE-2016-20001 (The REST/JSON project 7.x-1.x for Drupal allows node access bypass, ak ...) + TODO: check CVE-2016-15001 REJECTED CVE-2016-11086 (lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby doe ...) |