"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-04-18 03:00:34 +00:00
parent df2e49323c
commit a227352813
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
9 changed files with 47 additions and 2 deletions

View File

@ -59,6 +59,11 @@
"url": "https://lists.apache.org/thread/hhp611hltby3whk03vx2mv7cmy3vs0ok",
"refsource": "MISC",
"name": "https://lists.apache.org/thread/hhp611hltby3whk03vx2mv7cmy3vs0ok"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/04/18/6",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/04/18/6"
}
]
},

View File

@ -78,6 +78,11 @@
"url": "https://ofbiz.apache.org/security.html",
"refsource": "MISC",
"name": "https://ofbiz.apache.org/security.html"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/04/18/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/04/18/5"
}
]
},

View File

@ -63,6 +63,11 @@
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/03c037bbd75588beba3ee09f26d17783d21e30bc",
"refsource": "MISC",
"name": "https://github.com/the-tcpdump-group/tcpdump/commit/03c037bbd75588beba3ee09f26d17783d21e30bc"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOA2BJFERAC3VRQIRHJOWN4HZY4ZA7CH/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOA2BJFERAC3VRQIRHJOWN4HZY4ZA7CH/"
}
]
},

View File

@ -116,6 +116,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20230309-0003/",
"url": "https://security.netapp.com/advisory/ntap-20230309-0003/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2023-1176c8b10c",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/"
}
]
}

View File

@ -59,6 +59,11 @@
"url": "https://lists.apache.org/thread/tdnzkocfsqg2sbbornnp9g492fn4zhtx",
"refsource": "MISC",
"name": "https://lists.apache.org/thread/tdnzkocfsqg2sbbornnp9g492fn4zhtx"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/04/18/8",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/04/18/8"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a malicious local user. Administrators are advised to disable JMX, or set up a JMX password. Note that version 3.7.4 onward will set up a JMX password automatically for Guice users."
"value": "Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a \nmalicious local user.\n\nAdministrators are advised to disable JMX, or set up a JMX password.\n\nNote that version 3.7.4 onward will set up a JMX password automatically for Guice users.\n\n\n"
}
]
},
@ -59,6 +59,11 @@
"url": "https://lists.apache.org/thread/2z44rg93pflbjhvbwy3xtz505bx41cbs",
"refsource": "MISC",
"name": "https://lists.apache.org/thread/2z44rg93pflbjhvbwy3xtz505bx41cbs"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/04/18/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/04/18/3"
}
]
},

View File

@ -64,6 +64,11 @@
"url": "http://www.openwall.com/lists/oss-security/2023/04/10/1",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/04/10/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/04/18/4",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/04/18/4"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "Privilege escalation via stored XSS using the file upload service to upload malicious content. The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user."
"value": "Privilege escalation via stored XSS using the file upload service to upload malicious content.\nThe issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.\n\n"
}
]
},
@ -59,6 +59,11 @@
"url": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt",
"refsource": "MISC",
"name": "https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/04/18/2",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/04/18/2"
}
]
},

View File

@ -59,6 +59,11 @@
"url": "https://lists.apache.org/thread/08nc3dr6lshfppx0pzmz5vbggdnzpojb",
"refsource": "MISC",
"name": "https://lists.apache.org/thread/08nc3dr6lshfppx0pzmz5vbggdnzpojb"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/04/18/7",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2023/04/18/7"
}
]
},