"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-04-01 20:00:43 +00:00
parent d412702eac
commit b5b431a2b1
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 111 additions and 12 deletions

View File

@ -126,6 +126,11 @@
"name": "USN-3871-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3871-3/"
},
{
"refsource": "BID",
"name": "104907",
"url": "http://www.securityfocus.com/bid/104907"
}
]
}

View File

@ -1,17 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-3489",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-3489",
"ASSIGNER": "security@suse.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Micro Focus",
"product": {
"product_data": [
{
"product_name": "Micro Focus Content Manager",
"version": {
"version_data": [
{
"version_value": "9.1"
},
{
"version_value": "9.2"
},
{
"version_value": "9.3"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote upload content to arbitrary locations"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://softwaresupport.softwaregrp.com/doc/KM03359911",
"url": "https://softwaresupport.softwaregrp.com/doc/KM03359911"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An unauthenticated file upload vulnerability has been identified in the Web Client component of Micro Focus Content Manager 9.1, 9.2, and 9.3 when configured to use the ADFS authentication method. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to arbitrary locations on the Content Manager server."
}
]
}

View File

@ -15,11 +15,11 @@
"product": {
"product_data": [
{
"product_name": "VMware vCloud Director for Service Providers",
"product_name": "VMware vCloud Director for Service Providers (vCD)",
"version": {
"version_data": [
{
"version_value": "9.5.x prior to 9.5.0.3"
"version_value": "9.5.x before 9.5.0.3"
}
]
}
@ -36,7 +36,7 @@
"description": [
{
"lang": "eng",
"value": "Other"
"value": "Remote Session Hijack vulnerability"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-6715",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "pub/sns.php in the W3 Total Cache plugin before 0.9.4 for WordPress allows remote attackers to read arbitrary files via the SubscribeURL field in SubscriptionConfirmation JSON data."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://vinhjaxt.github.io/2019/03/cve-2019-6715",
"refsource": "MISC",
"name": "https://vinhjaxt.github.io/2019/03/cve-2019-6715"
}
]
}