mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-12-30 05:58:39 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
36cc8347d3
commit
554b1d7b1c
@ -50,6 +50,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "BID",
|
||||
"name": "109175",
|
||||
"url": "http://www.securityfocus.com/bid/109175"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=388567#p1566329",
|
||||
"refsource": "MISC",
|
||||
|
||||
@ -50,6 +50,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "BID",
|
||||
"name": "109174",
|
||||
"url": "http://www.securityfocus.com/bid/109174"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=388568#p1566330",
|
||||
"refsource": "MISC",
|
||||
|
||||
@ -50,6 +50,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "BID",
|
||||
"name": "109178",
|
||||
"url": "http://www.securityfocus.com/bid/109178"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10188",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10188",
|
||||
|
||||
@ -50,6 +50,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "BID",
|
||||
"name": "109271",
|
||||
"url": "http://www.securityfocus.com/bid/109271"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10189",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10189",
|
||||
|
||||
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An issue was discovered in Zoho ManageEngine OpManager through 12.4x. One can bypass the user password requirement and execute commands on the server. The \"username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm."
|
||||
"value": "An issue was discovered in Zoho ManageEngine OpManager in builds before 14310. One can bypass the user password requirement and execute commands on the server. The \"username+'@opm' string is used for the password. For example, if the username is admin, the password is admin@opm."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,6 +61,16 @@
|
||||
"url": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://pentest.com.tr/exploits/DEFCON-ManageEngine-OpManager-v12-4-Unauthenticated-Remote-Command-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html",
|
||||
"url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2019-15106.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html",
|
||||
"url": "https://www.manageengine.com/network-monitoring/security-updates/cve-2019-15106.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user