cvelist/2019/19xxx/CVE-2019-19733.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2019-12-12 00:01:05 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2019-12-30 17:02:42 +00:00
"ID": "CVE-2019-19733",
"STATE": "PUBLIC"
2019-12-12 00:01:05 +00:00
},
2019-12-30 17:02:42 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-12-12 00:01:05 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2019-12-30 17:02:42 +00:00
"value": "_get_all_file_server_paths.ajax.php (aka get_all_file_server_paths.ajax.php) in MFScripts YetiShare 3.5.2 through 4.5.3 does not sanitize or encode the output from the fileIds parameter on the page, which would allow an attacker to input HTML or execute scripts on the site, aka XSS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459",
"url": "https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459"
},
{
"refsource": "MISC",
"name": "https://github.com/jra89/CVE-2019-19733",
"url": "https://github.com/jra89/CVE-2019-19733"
2019-12-12 00:01:05 +00:00
}
]
}
}