From 7a99c2db48cb047d786bd9af44db6f9e5157a84d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 19 Jul 2021 19:47:31 +0700 Subject: [PATCH 1/2] Rename to CVE-2018-16283 --- .../2018/CVE-2018-16283.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename vulnerabilities/wordpress/wp-wechat-broadcast-lfi.yaml => cves/2018/CVE-2018-16283.yaml (83%) diff --git a/vulnerabilities/wordpress/wp-wechat-broadcast-lfi.yaml b/cves/2018/CVE-2018-16283.yaml similarity index 83% rename from vulnerabilities/wordpress/wp-wechat-broadcast-lfi.yaml rename to cves/2018/CVE-2018-16283.yaml index c4f8d1e2f5..3a4f4be80f 100644 --- a/vulnerabilities/wordpress/wp-wechat-broadcast-lfi.yaml +++ b/cves/2018/CVE-2018-16283.yaml @@ -1,11 +1,11 @@ -id: wp-wechat-broadcast-lfi +id: CVE-2018-16283 info: name: WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion author: 0x240x23elu severity: high reference: https://www.exploit-db.com/exploits/45438 - tags: wordpress,wp-plugin,lfi + tags: cve,cve2018,wordpress,wp-plugin,lfi requests: - method: GET @@ -16,4 +16,4 @@ requests: - type: regex regex: - "root:[x*]:0:0:" - part: body \ No newline at end of file + part: body From ffce401c2328429a0d9f22cb7274ef0f17101ae3 Mon Sep 17 00:00:00 2001 From: Sandeep Singh Date: Mon, 19 Jul 2021 18:22:19 +0530 Subject: [PATCH 2/2] Update CVE-2018-16283.yaml --- cves/2018/CVE-2018-16283.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2018/CVE-2018-16283.yaml b/cves/2018/CVE-2018-16283.yaml index 3a4f4be80f..72d62b3cdf 100644 --- a/cves/2018/CVE-2018-16283.yaml +++ b/cves/2018/CVE-2018-16283.yaml @@ -3,8 +3,10 @@ id: CVE-2018-16283 info: name: WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion author: 0x240x23elu - severity: high - reference: https://www.exploit-db.com/exploits/45438 + severity: critical + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2018-16283 + - https://www.exploit-db.com/exploits/45438 tags: cve,cve2018,wordpress,wp-plugin,lfi requests: