parent
06f3b54cc5
commit
1b19e0eabd
|
@ -1,12 +1,14 @@
|
|||
id: CVE-2013-3526
|
||||
|
||||
info:
|
||||
name: WordPress Plugin Traffic Analyzer - 'aoid' Reflected Cross-Site Scripting (XSS)
|
||||
name: WordPress Plugin Traffic Analyzer - 'aoid' Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
reference: https://nvd.nist.gov/vuln/detail/CVE-2013-3526
|
||||
tags: cve,cve2013,wordpress,xss,wp-plugin
|
||||
description: "Cross-site scripting (XSS) vulnerability in js/ta_loaded.js.php in the Traffic Analyzer plugin, possibly 3.3.2 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the aoid parameter."
|
||||
description: A cross-site scripting vulnerability in js/ta_loaded.js.php in the Traffic Analyzer plugin, possibly 3.3.2 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the aoid parameter."
|
||||
classification:
|
||||
cve-id: CVE-2013-3526
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -28,3 +30,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/23
|
||||
|
|
|
@ -4,11 +4,14 @@ info:
|
|||
name: Javafaces LFI
|
||||
author: Random-Robbie
|
||||
severity: medium
|
||||
description: Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container.
|
||||
description: An Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 2.1.1, 3.0.1, and 3.1.2; the Oracle JDeveloper component in Oracle Fusion Middleware 11.1.2.3.0, 11.1.2.4.0, and 12.1.2.0.0; and the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.1 allows remote attackers to affect confidentiality via unknown vectors related to Java Server Faces or Web Container.
|
||||
tags: cve,cve2013,lfi,javafaces,oracle
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2013-3827
|
||||
- https://www.exploit-db.com/exploits/38802
|
||||
- https://www.oracle.com/security-alerts/cpuoct2013.html
|
||||
classification:
|
||||
cve-id: CVE-2013-3827
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -36,4 +39,6 @@ requests:
|
|||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/23
|
||||
|
|
|
@ -1,12 +1,14 @@
|
|||
id: CVE-2013-4117
|
||||
|
||||
info:
|
||||
name: WordPress Plugin Category Grid View Gallery 2.3.1 - Reflected Cross-Site Scripting (XSS)
|
||||
name: WordPress Plugin Category Grid View Gallery 2.3.1 - Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
description: Cross-site scripting (XSS) vulnerability in includes/CatGridPost.php in the Category Grid View Gallery plugin 2.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ID parameter.
|
||||
description: A cross-site scripting vulnerability in includes/CatGridPost.php in the Category Grid View Gallery plugin 2.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ID parameter.
|
||||
reference: https://nvd.nist.gov/vuln/detail/CVE-2013-4117
|
||||
tags: cve,cve2013,wordpress,xss,wp-plugin
|
||||
classification:
|
||||
cve-id: CVE-2013-4117
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -28,3 +30,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/23
|
||||
|
|
|
@ -1,12 +1,17 @@
|
|||
id: CVE-2013-4625
|
||||
|
||||
info:
|
||||
name: WordPress Plugin Duplicator < 0.4.5 - Reflected Cross-Site Scripting (XSS)
|
||||
name: WordPress Plugin Duplicator < 0.4.5 - Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
description: Cross-site scripting (XSS) vulnerability in files/installer.cleanup.php in the Duplicator plugin before 0.4.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the package parameter.
|
||||
reference: https://nvd.nist.gov/vuln/detail/CVE-2013-4625
|
||||
description: A cross-site scripting vulnerability in files/installer.cleanup.php in the Duplicator plugin before 0.4.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the package parameter.
|
||||
remediation: Upgrade to Duplicator 0.4.5 or later.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2013-4625
|
||||
- https://packetstormsecurity.com/files/122535/WordPress-Duplicator-0.4.4-Cross-Site-Scripting.html
|
||||
tags: cve,cve2013,wordpress,xss,wp-plugin
|
||||
classification:
|
||||
cve-id: CVE-2013-4625
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -28,3 +33,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -4,9 +4,13 @@ info:
|
|||
name: Cisco Unified Communications Manager 7/8/9 - Directory Traversal
|
||||
author: daffainfo
|
||||
severity: high
|
||||
description: Directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815
|
||||
reference: https://www.exploit-db.com/exploits/40887
|
||||
description: A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/40887
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-3120
|
||||
tags: cve,cve2013,lfi,cisco
|
||||
classification:
|
||||
cve-id: CVE-2013-5528
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -23,3 +27,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -4,12 +4,15 @@ info:
|
|||
name: Xibo 1.2.2/1.4.1 - Directory Traversal
|
||||
author: daffainfo
|
||||
severity: high
|
||||
description: Directory traversal vulnerability in Spring Signage Xibo 1.2.x before 1.2.3 and 1.4.x before 1.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the p parameter to index.php.
|
||||
description: A directory traversal vulnerability in Spring Signage Xibo 1.2.x before 1.2.3 and 1.4.x before 1.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the p parameter to index.php.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/26955
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2013-5979
|
||||
- https://www.cvedetails.com/cve/CVE-2013-5979
|
||||
- https://bugs.launchpad.net/xibo/+bug/1093967
|
||||
tags: cve,cve2013,lfi
|
||||
classification:
|
||||
cve-id: CVE-2013-5979
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -26,3 +29,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,15 +1,17 @@
|
|||
id: CVE-2013-7091
|
||||
|
||||
info:
|
||||
name: Zimbra Collaboration Server 7.2.2/8.0.2 LFI
|
||||
name: Zimbra Collaboration Server 7.2.2/8.0.2 Local File Inclusion
|
||||
author: rubina119
|
||||
severity: critical
|
||||
description: Directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz in Zimbra 7.2.2 and 8.0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the skin parameter. This can be leveraged to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.
|
||||
description: A directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz in Zimbra 7.2.2 and 8.0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the skin parameter. This can be leveraged to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2013-7091
|
||||
- https://www.exploit-db.com/exploits/30085
|
||||
- https://www.exploit-db.com/exploits/30472
|
||||
tags: cve,cve2013,zimbra,lfi
|
||||
classification:
|
||||
cve-id: CVE-2013-7091
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -33,4 +35,6 @@ requests:
|
|||
|
||||
- type: regex
|
||||
regex:
|
||||
- "root=.*:0:0"
|
||||
- "root=.*:0:0"
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -4,10 +4,11 @@ info:
|
|||
name: WordPress Plugin Advanced Dewplayer 1.2 - Directory Traversal
|
||||
author: daffainfo
|
||||
severity: high
|
||||
description: Directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter.
|
||||
description: A directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/38936
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2013-7240
|
||||
- https://wordpress.org/support/topic/security-vulnerability-cve-2013-7240-directory-traversal/
|
||||
tags: cve,cve2013,wordpress,wp-plugin,lfi
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
|
@ -34,3 +35,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -4,11 +4,14 @@ info:
|
|||
name: DomPHP 0.83 - Directory Traversal
|
||||
author: daffainfo
|
||||
severity: high
|
||||
description: Directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impact via a .. (dot dot) in the url parameter to photoalbum/index.php.
|
||||
description: A directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impacts via a .. (dot dot) in the url parameter to photoalbum/index.php.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/30865
|
||||
- https://www.cvedetails.com/cve/CVE-2014-10037
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-10037
|
||||
tags: cve,cve2014,lfi
|
||||
classification:
|
||||
cve-id: CVE-2014-10037
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -24,4 +27,6 @@ requests:
|
|||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -9,6 +9,8 @@ info:
|
|||
- https://jalalsela.com/zxhn-h108n-router-web-shell-secrets/
|
||||
severity: high
|
||||
tags: iot,cve,cve2014,zte
|
||||
classification:
|
||||
cve-id: CVE-2014-2321
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -27,3 +29,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/23
|
||||
|
|
|
@ -1,9 +1,12 @@
|
|||
id: CVE-2014-2323
|
||||
|
||||
info:
|
||||
name: Lighttpd 1.4.34 SQL injection and path traversal
|
||||
description: SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.
|
||||
reference: https://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
|
||||
name: Lighttpd 1.4.34 SQL Injection and Path Traversal
|
||||
description: A SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name (related to request_check_hostname).
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-2323
|
||||
- https://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
|
||||
- http://www.lighttpd.net/2014/3/12/1.4.35/
|
||||
author: geeknik
|
||||
severity: critical
|
||||
tags: cve,cve2014,sqli,lighttpd,injection
|
||||
|
@ -24,3 +27,5 @@ requests:
|
|||
- type: regex
|
||||
regex:
|
||||
- "root:[x*]:0:0:"
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -4,12 +4,16 @@ info:
|
|||
name: Arbitrary file read in dompdf < v0.6.0
|
||||
author: 0x_Akoko
|
||||
severity: high
|
||||
reference: https://www.exploit-db.com/exploits/33004
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-2383
|
||||
- https://www.exploit-db.com/exploits/33004
|
||||
classification:
|
||||
cve-id: CVE-2014-2383
|
||||
tags: cve,cve2014,dompdf,lfi
|
||||
metadata:
|
||||
win-payload: "/dompdf.php?input_file=C:/windows/win.ini"
|
||||
unix-payload: "/dompdf.php?input_file=/etc/passwd"
|
||||
description: "dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter."
|
||||
description: "A vulnerability in dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter."
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -32,3 +36,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -4,11 +4,15 @@ info:
|
|||
name: Siemens SIMATIC S7-1200 CPU - Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
description: Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
||||
description: A cross-site scripting vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
||||
remediation: Upgrade to v4.0 or later.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/44687
|
||||
- https://cert-portal.siemens.com/productcert/pdf/ssa-892012.pdf
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-2908
|
||||
tags: cve,cve2014,xss,siemens
|
||||
classification:
|
||||
cve-id: CVE-2014-2908
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -30,3 +34,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/23
|
||||
|
|
|
@ -1,12 +1,17 @@
|
|||
id: CVE-2014-2962
|
||||
|
||||
info:
|
||||
name: Belkin N150 Router 1.00.08/1.00.09 - Directory Traversal
|
||||
name: Belkin N150 Router 1.00.08/1.00.09 - Path Traversal
|
||||
author: daffainfo
|
||||
severity: high
|
||||
description: Path traversal vulnerability in the webproc cgi module on the Belkin N150 F9K1009 v1 router with firmware before 1.00.08 allows remote attackers to read arbitrary files via a full pathname in the getpage parameter.
|
||||
reference: https://www.exploit-db.com/exploits/38488
|
||||
description: A path traversal vulnerability in the webproc cgi module on the Belkin N150 F9K1009 v1 router with firmware before 1.00.08 allows remote attackers to read arbitrary files via a full pathname in the getpage parameter.
|
||||
remediation: Ensure that appropriate firewall rules are in place to restrict access to port 80/tcp from external untrusted sources.
|
||||
reference:
|
||||
- https://www.kb.cert.org/vuls/id/774788
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-2962l
|
||||
tags: cve,cve2014,lfi,router,firmware,traversal
|
||||
classification:
|
||||
cve-id: CVE-2014-2962
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -23,3 +28,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/23
|
||||
|
|
|
@ -5,11 +5,14 @@ info:
|
|||
author: pikpikcu
|
||||
severity: critical
|
||||
description: |
|
||||
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
|
||||
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. Be aware this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
|
||||
reference:
|
||||
- https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2014-3120
|
||||
- https://www.elastic.co/blog/logstash-1-4-3-released
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-3120
|
||||
tags: cve,cve2014,elastic,rce,elasticsearch
|
||||
classification:
|
||||
cve-id: CVE-2014-3120
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -52,3 +55,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -33,3 +33,5 @@ requests:
|
|||
part: interactsh_protocol
|
||||
words:
|
||||
- "http"
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,16 +1,21 @@
|
|||
id: CVE-2014-3704
|
||||
info:
|
||||
name: Drupal Sql Injetion
|
||||
name: Drupal SQL Injection
|
||||
author: princechaddha
|
||||
severity: high
|
||||
description: The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing crafted keys.
|
||||
description: The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing specially crafted keys.
|
||||
remediation: Upgrade to Drupal core 7.32 or later.
|
||||
reference:
|
||||
- https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2014-10-15/sa-core-2014-005-drupal-core-sql
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-3704
|
||||
- https://www.drupal.org/SA-CORE-2014-005
|
||||
- http://www.exploit-db.com/exploits/34984
|
||||
- http://www.exploit-db.com/exploits/34992
|
||||
- http://www.exploit-db.com/exploits/34993
|
||||
- http://www.exploit-db.com/exploits/35150
|
||||
tags: cve,cve2014,drupal,sqli
|
||||
classification:
|
||||
cve-id: CVE-2014-3704
|
||||
|
||||
requests:
|
||||
- method: POST
|
||||
|
@ -30,3 +35,5 @@ requests:
|
|||
- "e807f1fcf82d132f9bb018ca6738a19f"
|
||||
condition: and
|
||||
part: body
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -3,8 +3,9 @@ id: CVE-2014-3744
|
|||
info:
|
||||
name: Node.js st module Directory Traversal
|
||||
author: geeknik
|
||||
description: Directory traversal vulnerability in the st module before 0.2.5 for Node.js allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in an unspecified path.
|
||||
description: A directory traversal vulnerability in the st module before 0.2.5 for Node.js allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in an unspecified path.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-3744
|
||||
- https://github.com/advisories/GHSA-69rr-wvh9-6c4q
|
||||
- https://snyk.io/vuln/npm:st:20140206
|
||||
severity: high
|
||||
|
@ -28,3 +29,5 @@ requests:
|
|||
- type: regex
|
||||
regex:
|
||||
- "root:.*:0:0:"
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -6,9 +6,12 @@ info:
|
|||
severity: medium
|
||||
tags: cve,cve2014,weblogic,oracle,ssrf,oast
|
||||
reference:
|
||||
- https://www.oracle.com/security-alerts/cpujul2014.html
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-4210
|
||||
- https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html
|
||||
description: "Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services."
|
||||
description: An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.
|
||||
classification:
|
||||
cve-id: CVE-2014-4210
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -25,3 +28,5 @@ requests:
|
|||
part: interactsh_protocol # Confirms the HTTP Interaction
|
||||
words:
|
||||
- "http"
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,12 +1,14 @@
|
|||
id: CVE-2014-4513
|
||||
|
||||
info:
|
||||
name: ActiveHelper LiveHelp Server 3.1.0 - Reflected Cross-Site Scripting (XSS)
|
||||
name: ActiveHelper LiveHelp Server 3.1.0 - Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
description: Multiple cross-site scripting (XSS) vulnerabilities in server/offline.php in the ActiveHelper LiveHelp Live Chat plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) MESSAGE, (2) EMAIL, or (3) NAME parameter.
|
||||
description: Multiple cross-site scripting vulnerabilities in server/offline.php in the ActiveHelper LiveHelp Live Chat plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) MESSAGE, (2) EMAIL, or (3) NAME parameter.
|
||||
reference: https://nvd.nist.gov/vuln/detail/CVE-2014-4513
|
||||
tags: cve,cve2014,wordpress,xss,wp-plugin
|
||||
classification:
|
||||
cve-id: CVE-2014-4513
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -28,3 +30,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2014-4535
|
||||
|
||||
info:
|
||||
name: Import Legacy Media <= 0.1 - Unauthenticated Reflected Cross-Site Scripting (XSS)
|
||||
name: Import Legacy Media <= 0.1 - Unauthenticated Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
reference:
|
||||
|
@ -13,7 +13,7 @@ info:
|
|||
cvss-score: 6.10
|
||||
cve-id: CVE-2014-4535
|
||||
cwe-id: CWE-79
|
||||
description: "Cross-site scripting (XSS) vulnerability in the Import Legacy Media plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php."
|
||||
description: "A cross-site scripting vulnerability in the Import Legacy Media plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php."
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -35,3 +35,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2014-4536
|
||||
|
||||
info:
|
||||
name: Infusionsoft Gravity Forms Add-on < 1.5.7 - Unauthenticated Reflected XSS
|
||||
name: Infusionsoft Gravity Forms Add-on < 1.5.7 - Unauthenticated Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
reference:
|
||||
|
@ -13,7 +13,7 @@ info:
|
|||
cvss-score: 6.10
|
||||
cve-id: CVE-2014-4536
|
||||
cwe-id: CWE-79
|
||||
description: "Multiple cross-site scripting (XSS) vulnerabilities in tests/notAuto_test_ContactService_pauseCampaign.php in the Infusionsoft Gravity Forms plugin before 1.5.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) go, (2) contactId, or (3) campaignId parameter."
|
||||
description: "Multiple cross-site scripting vulnerabilities in tests/notAuto_test_ContactService_pauseCampaign.php in the Infusionsoft Gravity Forms plugin before 1.5.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) go, (2) contactId, or (3) campaignId parameter."
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -35,3 +35,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2014-4539
|
||||
|
||||
info:
|
||||
name: Movies <= 0.6 - Unauthenticated Reflected Cross-Site Scripting (XSS)
|
||||
name: Movies <= 0.6 - Unauthenticated Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
reference: |
|
||||
|
@ -13,7 +13,7 @@ info:
|
|||
cvss-score: 6.10
|
||||
cve-id: CVE-2014-4539
|
||||
cwe-id: CWE-79
|
||||
description: "Cross-site scripting (XSS) vulnerability in the Movies plugin 0.6 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php."
|
||||
description: "A cross-site scripting vulnerability in the Movies plugin 0.6 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php."
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -34,4 +34,6 @@ requests:
|
|||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
id: CVE-2014-4544
|
||||
|
||||
info:
|
||||
name: Podcast Channels < 0.28 - Unauthenticated Reflected XSS
|
||||
name: Podcast Channels < 0.28 - Unauthenticated Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
description: The Podcast Channels WordPress plugin was affected by an Unauthenticated Reflected XSS security vulnerability.
|
||||
description: The Podcast Channels WordPress plugin was affected by an unauthenticated reflected cross-site scripting security vulnerability.
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/72a5a0e1-e720-45a9-b9d4-ee3144939abb
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-4544
|
||||
|
@ -35,3 +35,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2014-4550
|
||||
|
||||
info:
|
||||
name: Shortcode Ninja <= 1.4 - Unauthenticated Reflected XSS
|
||||
name: Shortcode Ninja <= 1.4 - Unauthenticated Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
reference: |
|
||||
|
@ -13,7 +13,7 @@ info:
|
|||
cvss-score: 6.10
|
||||
cve-id: CVE-2014-4550
|
||||
cwe-id: CWE-79
|
||||
description: "Cross-site scripting (XSS) vulnerability in preview-shortcode-external.php in the Shortcode Ninja plugin 1.4 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the shortcode parameter."
|
||||
description: "A cross-site scripting vulnerability in preview-shortcode-external.php in the Shortcode Ninja plugin 1.4 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the shortcode parameter."
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -35,3 +35,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2014-4558
|
||||
|
||||
info:
|
||||
name: WooCommerce Swipe <= 2.7.1 - Unauthenticated Reflected XSS
|
||||
name: WooCommerce Swipe <= 2.7.1 - Unauthenticated Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
reference: |
|
||||
|
@ -13,7 +13,7 @@ info:
|
|||
cvss-score: 6.10
|
||||
cve-id: CVE-2014-4558
|
||||
cwe-id: CWE-79
|
||||
description: "Cross-site scripting (XSS) vulnerability in test-plugin.php in the Swipe Checkout for WooCommerce plugin 2.7.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter."
|
||||
description: "A cross-site scripting vulnerability in test-plugin.php in the Swipe Checkout for WooCommerce plugin 2.7.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter."
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -35,3 +35,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2014-4561
|
||||
|
||||
info:
|
||||
name: Ultimate Weather Plugin <= 1.0 - Unauthenticated Reflected XSS
|
||||
name: Ultimate Weather Plugin <= 1.0 - Unauthenticated Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
reference: |
|
||||
|
@ -13,7 +13,7 @@ info:
|
|||
cvss-score: 6.10
|
||||
cve-id: CVE-2014-4561
|
||||
cwe-id: CWE-79
|
||||
description: "The ultimate-weather plugin 1.0 for WordPress has XSS"
|
||||
description: The ultimate-weather plugin 1.0 for WordPress contains a cross-site scripting vulnerability.
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -35,3 +35,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2014-4592
|
||||
|
||||
info:
|
||||
name: WP Planet <= 0.1 - Unauthenticated Reflected XSS
|
||||
name: WP Planet <= 0.1 - Unauthenticated Reflected Cross-Site Scripting
|
||||
author: daffainfo
|
||||
severity: medium
|
||||
reference: |
|
||||
|
@ -13,7 +13,7 @@ info:
|
|||
cvss-score: 6.10
|
||||
cve-id: CVE-2014-4592
|
||||
cwe-id: CWE-79
|
||||
description: "Cross-site scripting (XSS) vulnerability in rss.class/scripts/magpie_debug.php in the WP-Planet plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the url parameter."
|
||||
description: "A cross-site scripting vulnerability in rss.class/scripts/magpie_debug.php in the WP-Planet plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the url parameter."
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -35,3 +35,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -5,8 +5,10 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: Multiple directory traversal vulnerabilities in Tera Charts (tera-charts) plugin 0.1 for WordPress allow remote attackers to read arbitrary files via a .. (dot dot) in the fn parameter to (1) charts/treemap.php or (2) charts/zoomabletreemap.php.
|
||||
reference: https://www.cvedetails.com/cve/CVE-2014-4940
|
||||
reference: https://nvd.nist.gov/vuln/detail/CVE-2014-4940
|
||||
tags: cve,cve2014,wordpress,wp-plugin,lfi
|
||||
classification:
|
||||
cve-id: CVE-2014-4940
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -23,3 +25,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
|
@ -7,8 +7,10 @@ info:
|
|||
description: Multiple directory traversal vulnerabilities in Fonality trixbox allow remote attackers to read arbitrary files via a .. (dot dot) in the lang parameter to (1) home/index.php, (2) asterisk_info/asterisk_info.php, (3) repo/repo.php, or (4) endpointcfg/endpointcfg.php in maint/modules/.
|
||||
reference: |
|
||||
- https://www.exploit-db.com/exploits/39351
|
||||
- https://www.cvedetails.com/cve/CVE-2014-5111
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-5111
|
||||
tags: cve,cve2014,lfi,trixbox
|
||||
classification:
|
||||
cve-id: CVE-2014-5111
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -25,3 +27,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/02/24
|
||||
|
|
Loading…
Reference in New Issue