"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-10-04 22:00:55 +00:00
parent 878682c107
commit 44acaa8845
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 134 additions and 0 deletions

View File

@ -66,6 +66,11 @@
"refsource": "UBUNTU",
"name": "USN-4145-1",
"url": "https://usn.ubuntu.com/4145-1/"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K31332013",
"url": "https://support.f5.com/csp/article/K31332013"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2247",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00008.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-4c69fb4cd7",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFWQBNFTAVHPUYNGYO2TCPF5PCSWC2Z7/"
}
]
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16865",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://pillow.readthedocs.io/en/latest/releasenotes/6.2.0.html",
"refsource": "MISC",
"name": "https://pillow.readthedocs.io/en/latest/releasenotes/6.2.0.html"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-17188",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An unrestricted file upload vulnerability was discovered in catalog/productinfo/imageupload in Fecshop FecMall 2.3.4. An attacker can bypass a front-end restriction and upload PHP code to the webserver, by providing image data and the image/jpeg content type, with a .php extension. This occurs because the code relies on the getimagesize function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/fecshop/yii2_fecshop/issues/77",
"refsource": "MISC",
"name": "https://github.com/fecshop/yii2_fecshop/issues/77"
}
]
}
}