- Synchronized data.

This commit is contained in:
CVE Team 2019-03-04 17:07:35 -05:00
parent f07673c803
commit 8d43ddb6e5
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
2 changed files with 8 additions and 1 deletions

View File

@ -54,6 +54,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://security.netapp.com/advisory/ntap-20190304-0002/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20190304-0002/"
}
]

View File

@ -34,7 +34,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "zb_system/function/lib/upload.php in Z-BlogPHP through 1.5.1 allows remote attackers to execute arbitrary PHP code by using the image/jpeg content type in an upload to the zb_system/admin/index.php?act=UploadMng URI."
"value" : "** DISPUTED ** zb_system/function/lib/upload.php in Z-BlogPHP through 1.5.1 allows remote attackers to execute arbitrary PHP code by using the image/jpeg content type in an upload to the zb_system/admin/index.php?act=UploadMng URI. NOTE: The vendor's position is \"We have no dynamic including. No one can run PHP by uploading an image in current version.\" It also requires authentication."
}
]
},
@ -56,6 +56,11 @@
"name" : "https://github.com/novysodope/Z-BlogPHP1.5Zero/blob/master/Getshell",
"refsource" : "MISC",
"url" : "https://github.com/novysodope/Z-BlogPHP1.5Zero/blob/master/Getshell"
},
{
"name" : "https://github.com/zblogcn/zblogphp/issues/205",
"refsource" : "CONFIRM",
"url" : "https://github.com/zblogcn/zblogphp/issues/205"
}
]
}