mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
- Synchronized data.
This commit is contained in:
parent
f07673c803
commit
8d43ddb6e5
@ -54,6 +54,8 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20190304-0002/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20190304-0002/"
|
||||
}
|
||||
]
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "zb_system/function/lib/upload.php in Z-BlogPHP through 1.5.1 allows remote attackers to execute arbitrary PHP code by using the image/jpeg content type in an upload to the zb_system/admin/index.php?act=UploadMng URI."
|
||||
"value" : "** DISPUTED ** zb_system/function/lib/upload.php in Z-BlogPHP through 1.5.1 allows remote attackers to execute arbitrary PHP code by using the image/jpeg content type in an upload to the zb_system/admin/index.php?act=UploadMng URI. NOTE: The vendor's position is \"We have no dynamic including. No one can run PHP by uploading an image in current version.\" It also requires authentication."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +56,11 @@
|
||||
"name" : "https://github.com/novysodope/Z-BlogPHP1.5Zero/blob/master/Getshell",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/novysodope/Z-BlogPHP1.5Zero/blob/master/Getshell"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/zblogcn/zblogphp/issues/205",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/zblogcn/zblogphp/issues/205"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user