From 16d5e9bcd02c672600db92a51bd1557a49db7edf Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Wed, 18 May 2022 10:19:03 -0400 Subject: [PATCH] Enhancement: cves/2018/CVE-2018-16716.yaml by mp --- cves/2018/CVE-2018-16716.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2018/CVE-2018-16716.yaml b/cves/2018/CVE-2018-16716.yaml index 5a027e89ea..b74af567f1 100644 --- a/cves/2018/CVE-2018-16716.yaml +++ b/cves/2018/CVE-2018-16716.yaml @@ -4,7 +4,7 @@ info: name: NCBI ToolBox - Directory Traversal author: 0x_Akoko severity: critical - description: A path traversal vulnerability exists in viewcgi.c in the 2.0.7 through 2.2.26 legacy versions of the NCBI ToolBox, which may result in reading of arbitrary files (i.e., significant information disclosure) or file deletion via the nph-viewgif.cgi query string. + description: NCBI ToolBox 2.0.7 through 2.2.26 legacy versions contain a path traversal vulnerability via viewcgi.cgi which may result in reading of arbitrary files (i.e., significant information disclosure) or file deletion via the nph-viewgif.cgi query string. reference: - https://github.com/grymer/CVE/blob/master/CVE-2018-16716.md - https://nvd.nist.gov/vuln/detail/CVE-2018-16716 @@ -29,3 +29,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/05/18