refactor: Description field uniformization

* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
patch-1
forgedhallpass 2022-04-22 13:38:41 +03:00
parent 177c41d56c
commit 209538baa6
2359 changed files with 6157 additions and 4739 deletions

View File

@ -4,7 +4,8 @@ info:
name: Metinfo LFI
author: ritikchaddha
severity: high
reference: https://paper.seebug.org/676/
reference:
- https://paper.seebug.org/676/
tags: metinfo,cnvd,cvnd2018,lfi
requests:

View File

@ -5,13 +5,14 @@ info:
author: princechaddha
severity: high
description: The Xiuno BBS system has a system reinstallation vulnerability. The vulnerability stems from the failure to protect or filter the installation directory after the system is installed. Attackers can directly reinstall the system through the installation page.
remediation: Upgrade to the latest version of Xiuno BBS or switch to a supported product.
reference: https://www.cnvd.org.cn/flaw/show/CNVD-2019-01348
tags: xiuno,cnvd,cnvd2019
reference:
- https://www.cnvd.org.cn/flaw/show/CNVD-2019-01348
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 7.5
cwe-id: CWE-284
remediation: Upgrade to the latest version of Xiuno BBS or switch to a supported product.
tags: xiuno,cnvd,cnvd2019
requests:
- method: GET

View File

@ -5,15 +5,15 @@ info:
author: Lark-Lab
severity: critical
description: CatfishCMS 4.8.54 contains a remote command execution vulnerability in the "method" parameter.
remediation: Upgrade to CatfishCMS version 4.8.54 or later.
reference:
- https://its401.com/article/yun2diao/91344725
- https://github.com/xwlrbh/Catfish/issues/4
tags: rce,cnvd,catfishcms,cnvd2019
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cwe-id: CWE-77
remediation: Upgrade to CatfishCMS version 4.8.54 or later.
tags: rce,cnvd,catfishcms,cnvd2019
requests:
- method: GET

View File

@ -5,7 +5,8 @@ info:
author: daffainfo
severity: critical
description: The attacker can directly execute arbitrary commands on the target server by invoking the unauthorized access problem interface in the BeanShell component. Currently, the security patch for this vulnerability has been released. Please take protective measures as soon as possible for users who use the Fanwei e-cology OA system.
reference: https://blog.actorsfit.com/a?ID=01500-11a2f7e6-54b0-4a40-9a79-5c56dc6ebd51
reference:
- https://blog.actorsfit.com/a?ID=01500-11a2f7e6-54b0-4a40-9a79-5c56dc6ebd51
tags: fanwei,cnvd,cnvd2019,rce
requests:

View File

@ -5,7 +5,8 @@ info:
author: princechaddha
severity: medium
description: Xunyou cms has an arbitrary file reading vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
reference: https://www.cnvd.org.cn/flaw/show/2025171
reference:
- https://www.cnvd.org.cn/flaw/show/2025171
tags: xunchi,lfi,cnvd,cnvd2020
requests:

View File

@ -4,7 +4,8 @@ info:
name: Ruijie Smartweb Default Password
author: pikpikcu
severity: low
reference: https://www.cnvd.org.cn/flaw/show/CNVD-2020-56167
reference:
- https://www.cnvd.org.cn/flaw/show/CNVD-2020-56167
tags: ruijie,default-login,cnvd,cnvd2020
requests:

View File

@ -4,7 +4,8 @@ info:
name: Seeyon readfile(CNVD-2020-62422)
author: pikpikcu
severity: medium
reference: https://blog.csdn.net/m0_46257936/article/details/113150699
reference:
- https://blog.csdn.net/m0_46257936/article/details/113150699
tags: lfi,cnvd,cnvd2020,seeyon
requests:

View File

@ -5,7 +5,8 @@ info:
author: ritikchaddha
severity: high
description: Zero Vision Technology (Shanghai) Co., Ltd. H5S CONSOLE Exists Unauthorized Access Vulnerability
reference: https://vul.wangan.com/a/CNVD-2020-67113
reference:
- https://vul.wangan.com/a/CNVD-2020-67113
metadata:
shodan-query: http.title:"H5S CONSOLE"
tags: h5s,unauth,h5sconsole,cnvd,cnvd2020

View File

@ -4,7 +4,8 @@ info:
name: WeiPHP 5.0 Path Traversal
author: pikpikcu
severity: critical
reference: http://wiki.peiqi.tech/PeiQi_Wiki/CMS%E6%BC%8F%E6%B4%9E/Weiphp/Weiphp5.0%20%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AF%BB%E5%8F%96%20CNVD-2020-68596.html
reference:
- http://wiki.peiqi.tech/PeiQi_Wiki/CMS%E6%BC%8F%E6%B4%9E/Weiphp/Weiphp5.0%20%E5%89%8D%E5%8F%B0%E6%96%87%E4%BB%B6%E4%BB%BB%E6%84%8F%E8%AF%BB%E5%8F%96%20CNVD-2020-68596.html
tags: weiphp,lfi,cnvd,cnvd2020
requests:

View File

@ -4,7 +4,8 @@ info:
name: Ruoyi Management System Arbitrary File Download
author: daffainfo,ritikchaddha
severity: high
reference: https://disk.scan.cm/All_wiki/%E4%BD%A9%E5%A5%87PeiQi-WIKI-POC-2021-7-20%E6%BC%8F%E6%B4%9E%E5%BA%93/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E8%8B%A5%E4%BE%9D%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%8B%A5%E4%BE%9D%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%20CNVD-2021-01931.md?hash=zE0KEPGJ
reference:
- https://disk.scan.cm/All_wiki/%E4%BD%A9%E5%A5%87PeiQi-WIKI-POC-2021-7-20%E6%BC%8F%E6%B4%9E%E5%BA%93/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E8%8B%A5%E4%BE%9D%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/%E8%8B%A5%E4%BE%9D%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20%E5%90%8E%E5%8F%B0%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%20CNVD-2021-01931.md?hash=zE0KEPGJ
tags: ruoyi,lfi,cnvd,cnvd2021
requests:

View File

@ -4,7 +4,8 @@ info:
name: Ruijie EWEB Gateway Platform Command Execution
author: daffainfo
severity: critical
reference: http://j0j0xsec.top/2021/04/22/%E9%94%90%E6%8D%B7EWEB%E7%BD%91%E5%85%B3%E5%B9%B3%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/
reference:
- http://j0j0xsec.top/2021/04/22/%E9%94%90%E6%8D%B7EWEB%E7%BD%91%E5%85%B3%E5%B9%B3%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/
tags: ruijie,cnvd,cnvd2021,rce
requests:

View File

@ -4,7 +4,8 @@ info:
name: EEA Information Disclosure
author: pikpikcu
severity: high
reference: https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543
reference:
- https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543
tags: config,exposure,cnvd,cnvd2021
requests:

View File

@ -5,14 +5,14 @@ info:
author: daffainfo
severity: high
description: Ruijie RG-UAC Unified Internet Behavior Management Audit System is susceptible to information disclosure. Attackers could obtain user accounts and passwords by reviewing the source code of web pages, resulting in the leakage of administrator user authentication information.
reference: https://www.adminxe.com/2163.html
metadata:
fofa-query: 'title="RG-UAC登录页面"'
reference:
- https://www.adminxe.com/2163.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
metadata:
fofa-query: title="RG-UAC登录页面"
tags: ruijie,cnvd,cnvd2021,disclosure
requests:

View File

@ -4,7 +4,8 @@ info:
name: ShopXO Download File Read
author: pikpikcu
severity: high
reference: https://mp.weixin.qq.com/s/69cDWCDoVXRhehqaHPgYog
reference:
- https://mp.weixin.qq.com/s/69cDWCDoVXRhehqaHPgYog
tags: shopxo,lfi,cnvd,cnvd2021
requests:

View File

@ -7,12 +7,11 @@ info:
description: The wireless smartweb management system of Ruijie Networks Co., Ltd. has a logic flaw. An attacker can obtain the administrator account and password from a low-privileged user, thereby escalating the low-level privilege to the administrator's privilege.
reference:
- https://www.cnvd.org.cn/flaw/show/CNVD-2021-17369
tags: ruijie,disclosure,cnvd,cnvd2021
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
tags: ruijie,disclosure,cnvd,cnvd2021
requests:
- method: GET

View File

@ -2,18 +2,18 @@ id: CNVD-2021-49104
info:
name: Pan Micro E-office File Uploads
description: The Pan Wei Micro E-office version running allows arbitrary file uploads from a remote attacker.
remediation: Pan Wei has released an update to resolve this vulnerability.
author: pikpikcu
severity: critical
description: The Pan Wei Micro E-office version running allows arbitrary file uploads from a remote attacker.
reference:
- https://chowdera.com/2021/12/202112200602130067.html
- http://v10.e-office.cn
tags: pan,micro,cnvd,cnvd2021
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
cvss-score: 9.9
cwe-id: CWE-434
remediation: Pan Wei has released an update to resolve this vulnerability.
tags: pan,micro,cnvd,cnvd2021
requests:
- raw:

View File

@ -5,14 +5,12 @@ info:
author: r3naissance
severity: low
description: Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
remediation: Upgrade to the latest version.
classification:
cve-id: CVE-2000-0114
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2000-0114
- https://www.exploit-db.com/exploits/19897
classification:
cve-id: CVE-2000-0114
remediation: Upgrade to the latest version.
tags: cve,cve2000,frontpage,microsoft
requests:

View File

@ -4,17 +4,17 @@ info:
name: Deprecated SSHv1 Protocol Detection
author: iamthefrogy
severity: high
tags: cve,cve2001,network,ssh,openssh
description: SSHv1 is deprecated and has known cryptographic issues.
remediation: Upgrade to SSH 2.4 or later.
reference:
- https://www.kb.cert.org/vuls/id/684820
- https://nvd.nist.gov/vuln/detail/CVE-2001-1473
classification:
cvss-score: 7.4
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 7.4
cve-id: CVE-2001-1473
cwe-id: CWE-310
remediation: Upgrade to SSH 2.4 or later.
tags: cve,cve2001,network,ssh,openssh
network:
- host:

View File

@ -5,7 +5,8 @@ info:
author: dhiyaneshDk
severity: medium
description: The Virtual Keyboard plugin for SquirrelMail is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
reference: https://www.exploit-db.com/exploits/21811
reference:
- https://www.exploit-db.com/exploits/21811
classification:
cve-id: CVE-2002-1131
tags: xss,squirrelmail,cve,cve2002

View File

@ -5,13 +5,13 @@ info:
author: dhiyaneshDk
severity: medium
description: Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
remediation: Upgrade to the latest version.
reference:
- https://www.exploit-db.com/exploits/24068
- ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
tags: xss,squirrelmail,cve2004,cve
classification:
cve-id: CVE-2004-0519
remediation: Upgrade to the latest version.
tags: xss,squirrelmail,cve2004,cve
requests:
- method: GET

View File

@ -1,11 +1,10 @@
id: CVE-2005-2428
info:
name: Lotus Domino R5 and R6 WebMail Default Configuration Information Disclosure
author: CasperGN
severity: medium
tags: cve,cve2005,domino
description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).
remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
reference:
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
- https://www.exploit-db.com/exploits/39495
@ -14,6 +13,8 @@ info:
cvss-score: 5.3
cve-id: CVE-2005-2428
cwe-id: CWE-200
remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
tags: cve,cve2005,domino
requests:
- method: GET

View File

@ -5,13 +5,12 @@ info:
author: pikpikcu
severity: critical
description: Horde Groupware contains an administrative account with a blank password, which allows remote attackers to gain access.
tags: horde,unauth
remediation:
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2005-3344
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3344
classification:
cve-id: CVE-2005-3344
tags: horde,unauth
requests:
- method: GET

View File

@ -2,12 +2,12 @@ id: CVE-2005-4385
info:
name: Cofax <= 2.0RC3 XSS
author: geeknik
severity: medium
description: Cross-site scripting vulnerability in search.htm in Cofax 2.0 RC3 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter.
reference:
- http://pridels0.blogspot.com/2005/12/cofax-xss-vuln.html
- https://nvd.nist.gov/vuln/detail/CVE-2005-4385
author: geeknik
severity: medium
classification:
cve-id: CVE-2005-4385
tags: cofax,xss,cve,cve2005

View File

@ -2,12 +2,12 @@ id: CVE-2006-1681
info:
name: Cherokee HTTPD <=0.5 XSS
author: geeknik
severity: medium
description: Cross-site scripting (XSS) vulnerability in Cherokee HTTPD 0.5 and earlier allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated.
reference:
- https://www.securityfocus.com/bid/17408
- https://nvd.nist.gov/vuln/detail/CVE-2006-1681
author: geeknik
severity: medium
classification:
cve-id: CVE-2006-1681
tags: cherokee,httpd,xss,cve,cve2006

View File

@ -4,8 +4,12 @@ info:
name: Squirrelmail 1.4.x - 'Redirect.php' Local File Inclusion
author: dhiyaneshDk
severity: high
description: "PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable."
reference: https://www.exploit-db.com/exploits/27948
description: 'PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute
arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals
is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there
might be relevant real-world environments under which this vulnerability is applicable.'
reference:
- https://www.exploit-db.com/exploits/27948
classification:
cve-id: CVE-2006-2842
tags: cve2006,lfi,squirrelmail,cve

View File

@ -2,10 +2,11 @@ id: CVE-2007-0885
info:
name: Rainbow.Zen Jira XSS
description: Cross-site scripting (XSS) vulnerability in jira/secure/BrowseProject.jspa in Rainbow with the Zen (Rainbow.Zen) extension allows remote attackers to inject arbitrary web script or HTML via the id parameter.
reference: https://www.securityfocus.com/archive/1/459590/100/0/threaded
author: geeknik
severity: medium
description: Cross-site scripting (XSS) vulnerability in jira/secure/BrowseProject.jspa in Rainbow with the Zen (Rainbow.Zen) extension allows remote attackers to inject arbitrary web script or HTML via the id parameter.
reference:
- https://www.securityfocus.com/archive/1/459590/100/0/threaded
classification:
cve-id: CVE-2007-0885
tags: cve,cve2007,jira,xss

View File

@ -5,7 +5,8 @@ info:
author: pikpikcu
severity: critical
description: Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character.
reference: https://www.guildhab.top/?p=2326
reference:
- https://www.guildhab.top/?p=2326
classification:
cve-id: CVE-2007-4556
tags: cve,cve2007,apache,rce,struts

View File

@ -5,11 +5,12 @@ info:
author: dhiyaneshDK
severity: medium
description: Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865.
reference: https://www.exploit-db.com/exploits/30090
metadata:
shodan-query: 'http.title:"phpPgAdmin"'
reference:
- https://www.exploit-db.com/exploits/30090
classification:
cve-id: CVE-2007-5728
metadata:
shodan-query: http.title:"phpPgAdmin"
tags: cve,cve2007,xss,pgadmin,phppgadmin
requests:

View File

@ -5,7 +5,8 @@ info:
author: unstabl3
severity: medium
description: Cross-site scripting (XSS) vulnerability in index.php in AppServ Open Project 2.5.10 and earlier allows remote attackers to inject arbitrary web script or HTML via the appservlang parameter.
reference: https://exchange.xforce.ibmcloud.com/vulnerabilities/42546
reference:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42546
classification:
cve-id: CVE-2008-2398
tags: cve,cve2008,xss

View File

@ -1,4 +1,5 @@
id: CVE-2008-2650
info:
name: CMSimple 3.1 - Local File Inclusion
author: pussycat0x
@ -9,7 +10,7 @@ info:
classification:
cve-id: CVE-2008-2650
tags: cve,cve2008,lfi
requests:
- raw:
- |

View File

@ -4,7 +4,8 @@ info:
name: Joomla! Component com_extplorer 2.0.0 RC2 - Directory Traversal
author: daffainfo
severity: high
description: Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action.
description: Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in
a show_error action.
reference:
- https://www.exploit-db.com/exploits/5435
- https://www.cvedetails.com/cve/CVE-2008-4764

View File

@ -4,12 +4,13 @@ info:
name: phpPgAdmin 4.2.1 - '_language' Local File Inclusion
author: dhiyaneshDK
severity: medium
description: "Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php."
reference: https://www.exploit-db.com/exploits/7363
description: Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php.
reference:
- https://www.exploit-db.com/exploits/7363
classification:
cve-id: CVE-2008-5587
metadata:
shodan-query: 'http.title:"phpPgAdmin"'
shodan-query: http.title:"phpPgAdmin"
tags: cve2008,lfi,phppgadmin
requests:

View File

@ -4,7 +4,7 @@ info:
name: Joomla! Component RWCards 3.0.11 - Local File Inclusion
author: daffainfo
severity: high
description: "A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter."
description: A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter.
reference:
- https://www.exploit-db.com/exploits/6817
- https://www.cvedetails.com/cve/CVE-2008-6172

View File

@ -2,12 +2,12 @@ id: CVE-2008-6668
info:
name: nweb2fax <= 0.2.7 Directory Traversal
author: geeknik
severity: high
description: Multiple directory traversal vulnerabilities in nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via .. in the id parameter to comm.php and var_filename parameter to viewrq.php.
reference:
- https://www.exploit-db.com/exploits/5856
- https://nvd.nist.gov/vuln/detail/CVE-2008-6668
author: geeknik
severity: high
classification:
cve-id: CVE-2008-6668
tags: nweb2fax,lfi,cve,cve2008,traversal

View File

@ -3,11 +3,11 @@ id: CVE-2009-0545
info:
name: ZeroShell <= 1.0beta11 Remote Code Execution
author: geeknik
description: "ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action."
severity: critical
description: ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action.
reference:
- https://www.exploit-db.com/exploits/8023
- https://nvd.nist.gov/vuln/detail/CVE-2009-0545
severity: critical
classification:
cve-id: CVE-2009-0545
tags: cve,cve2009,zeroshell,kerbynet,rce

View File

@ -5,7 +5,8 @@ info:
author: daffainfo
severity: high
description: Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
reference: https://www.exploit-db.com/exploits/32954
reference:
- https://www.exploit-db.com/exploits/32954
classification:
cve-id: CVE-2009-1558
tags: cve,cve2009,iot,lfi,linksys,camera,cisco,firmware,traversal

View File

@ -2,12 +2,12 @@ id: CVE-2009-4223
info:
name: KR-Web <= 1.1b2 RFI
author: geeknik
severity: high
description: KR is a web content-server based on Apache-PHP-MySql technology which gives to programmers some PHP classes simplifying database content access. Additionally, it gives some admin and user tools to write, hierarchize, and authorize contents.
reference:
- https://sourceforge.net/projects/krw/
- https://www.exploit-db.com/exploits/10216
author: geeknik
severity: high
classification:
cve-id: CVE-2009-4223
tags: cve,cve2009,krweb,rfi

View File

@ -5,7 +5,7 @@ info:
author: daffainfo
severity: high
description: Directory traversal vulnerability in the inertialFATE iF Portfolio Nexus (com_if_nexus) component 1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
reference: |
reference:
- https://www.exploit-db.com/exploits/33440
- https://www.cvedetails.com/cve/CVE-2009-4679
classification:

View File

@ -1,17 +1,20 @@
id: CVE-2009-5020
info:
name: AWStats < 6.95 - Open Redirect
author: pdteam
severity: medium
description: An open redirect vulnerability in awredir.pl in AWStats < 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
reference: https://nvd.nist.gov/vuln/detail/CVE-2009-5020
tags: cve,cve2020,redirect,awstats
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2009-5020
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10
cvss-score: 6.1
cve-id: CVE-2009-5020
cwe-id: CWE-601
remediation: Apply all relevant security patches and product upgrades.
tags: cve,cve2020,redirect,awstats
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2009-5114
info:
name: WebGlimpse 2.18.7 - Directory Traversal
author: daffainfo
severity: high
description: A directory traversal vulnerability in wgarcmin.cgi in WebGlimpse 2.18.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the DOC parameter.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/36994
- https://www.cvedetails.com/cve/CVE-2009-5114
tags: cve,cve2009,lfi
classification:
cve-id: CVE-2009-5114
remediation: Apply all relevant security patches and product upgrades.
tags: cve,cve2009,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-0157
info:
name: Joomla! Component com_biblestudy - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Bible Study (com_biblestudy) component 6.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter in a studieslist action to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/10943
- https://www.cvedetails.com/cve/CVE-2010-0157
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-0157
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -5,12 +5,12 @@ info:
author: pikpikcu
severity: high
description: Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
tags: cve,cve2010,axis,apache,default-login,axis2
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2010-0219
- https://knowledge.broadcom.com/external/article/13994/vulnerability-axis2-default-administrato.html
classification:
cve-id: CVE-2010-0219
tags: cve,cve2010,axis,apache,default-login,axis2
requests:
- raw:

View File

@ -1,19 +1,21 @@
id: CVE-2010-0467
info:
name: Joomla! Component CCNewsLetter - Local File Inclusion
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the ccNewsletter (com_ccnewsletter) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a ccnewsletter action to index.php.
reference: |
reference:
- https://www.exploit-db.com/exploits/11282
- https://www.cvedetails.com/cve/CVE-2010-0467
tags: cve,cve2010,joomla,lfi
remediation: Apply all relevant security patches and upgrades.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
cvss-score: 5.80
cvss-score: 5.8
cve-id: CVE-2010-0467
cwe-id: CWE-22
remediation: Apply all relevant security patches and upgrades.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-0696
info:
name: Joomla! Component Jw_allVideos - Arbitrary File Download
author: daffainfo
severity: high
description: A directory traversal vulnerability in includes/download.php in the JoomlaWorks AllVideos (Jw_allVideos) plugin 3.0 through 3.2 for Joomla! allows remote attackers to read arbitrary files via a ./../.../ (modified dot dot) in the file parameter.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/11447
- https://www.cvedetails.com/cve/CVE-2010-0696
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-0696
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,4 +1,5 @@
id: CVE-2010-0759
info:
name: Joomla! Plugin Core Design Scriptegrator - Local File Inclusion
author: daffainfo
@ -7,10 +8,11 @@ info:
reference:
- https://www.exploit-db.com/exploits/11498
- https://www.cvedetails.com/cve/CVE-2010-0759
tags: cve,cve2010,joomla,lfi,plugin
remediation: Upgrade to a supported version.
classification:
cve-id: CVE-2010-0759
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi,plugin
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-0942
info:
name: Joomla! Component com_jvideodirect - Directory Traversal
author: daffainfo
severity: high
description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11089
- https://www.cvedetails.com/cve/CVE-2010-0942
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-0942
remediation: Apply all relevant security patches and product upgrades.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-0944
info:
name: Joomla! Component com_jcollection - Directory Traversal
author: daffainfo
severity: high
description: A directory traversal vulnerability in the JCollection (com_jcollection) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11088
- https://www.cvedetails.com/cve/CVE-2010-0944
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-0944
remediation: Apply all relevant security patches and product upgrades.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-0972
info:
name: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11738
- https://www.cvedetails.com/cve/CVE-2010-0972
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-0972
remediation: Apply all relevant security patches and product upgrades.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-0982
info:
name: Joomla! Component com_cartweberp - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/10942
- https://www.cvedetails.com/cve/CVE-2010-0982
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-0982
remediation: Apply all relevant security patches and product upgrades.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-0985
info:
name: Joomla! Component com_abbrev - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/10948
- https://www.cvedetails.com/cve/CVE-2010-0985
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-0985
remediation: Apply all relevant security patches and product upgrades.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1056
info:
name: Joomla! Component com_rokdownloads - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11760
- https://www.cvedetails.com/cve/CVE-2010-1056
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1056
remediation: Apply all relevant security patches and product upgrades.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1081
info:
name: Joomla! Component com_communitypolls 1.5.2 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11511
- https://www.cvedetails.com/cve/CVE-2010-1081
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1081
remediation: Apply all relevant security patches and product upgrades.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1217
info:
name: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE -- the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11814
- https://www.cvedetails.com/cve/CVE-2010-1217
tags: cve,cve2010,joomla,lfi,plugin
classification:
cve-id: CVE-2010-1217
remediation: Apply all relevant security patches and product upgrades.
tags: cve,cve2010,joomla,lfi,plugin
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1219
info:
name: Joomla! Component com_janews - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/11757
- https://www.cvedetails.com/cve/CVE-2010-1219
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1219
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1302
info:
name: Joomla! Component DW Graph - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/11978
- https://www.cvedetails.com/cve/CVE-2010-1302
tags: cve,cve2010,joomla,lfi,graph
classification:
cve-id: CVE-2010-1302
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi,graph
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1304
info:
name: Joomla! Component User Status - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in userstatus.php in the User Status (com_userstatus) component 1.21.16 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/11998
- https://www.cvedetails.com/cve/CVE-2010-1304
tags: cve,cve2010,joomla,lfi,status
classification:
cve-id: CVE-2010-1304
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi,status
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1305
info:
name: Joomla! Component JInventory 1.23.02 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12065
- https://www.cvedetails.com/cve/CVE-2010-1305
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1305
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1306
info:
name: Joomla! Component Picasa 2.0 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12058
- https://www.cvedetails.com/cve/CVE-2010-1306
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1306
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1307
info:
name: Joomla! Component Magic Updater - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Magic Updater (com_joomlaupdater) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12070
- https://www.cvedetails.com/cve/CVE-2010-1307
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1307
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1308
info:
name: Joomla! Component SVMap 1.1.1 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the SVMap (com_svmap) component 1.1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12066
- https://www.cvedetails.com/cve/CVE-2010-1308
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1308
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1312
info:
name: Joomla! Component News Portal 1.5.x - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12077
- https://www.cvedetails.com/cve/CVE-2010-1312
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1312
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1313
info:
name: Joomla! Component Saber Cart 1.0.0.12 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12082
- https://www.cvedetails.com/cve/CVE-2010-1313
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1313
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1314
info:
name: Joomla! Component Highslide 1.5 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12086
- https://www.cvedetails.com/cve/CVE-2010-1314
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1314
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1315
info:
name: Joomla! Component webERPcustomer - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/11999
- https://www.cvedetails.com/cve/CVE-2010-1315
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1315
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1340
info:
name: Joomla! Component com_jresearch - 'Controller' Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/33797
- https://www.cvedetails.com/cve/CVE-2010-1340
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1340
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1345
info:
name: Joomla! Component Cookex Agency CKForms - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/15453
- https://www.cvedetails.com/cve/CVE-2010-1345
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1345
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1352
info:
name: Joomla! Component Juke Box 1.7 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12084
- https://www.cvedetails.com/cve/CVE-2010-1352
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1352
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -4,7 +4,7 @@ info:
name: Joomla! Component LoginBox - Local File Inclusion
author: daffainfo
severity: high
description: "A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php."
description: A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
reference:
- https://www.exploit-db.com/exploits/12068
- https://www.cvedetails.com/cve/CVE-2010-1353

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12102
- https://www.cvedetails.com/cve/CVE-2010-1354
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1354
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php.
remediation: Upgrade to a supported version.
reference: |
reference:
- https://www.exploit-db.com/exploits/12232
- https://www.cvedetails.com/cve/CVE-2010-1461
tags: cve,cve2010,joomla,lfi,photo
classification:
cve-id: CVE-2010-1461
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi,photo
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Ternaria Informatica JProject Manager (com_jprojectmanager) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: |
reference:
- https://www.exploit-db.com/exploits/12146
- https://www.cvedetails.com/cve/CVE-2010-1469
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1469
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and have possibly other unspecified impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12166
- https://www.cvedetails.com/cve/CVE-2010-1470
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1470
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12170
- https://www.cvedetails.com/cve/CVE-2010-1471
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1471
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12167
- https://www.cvedetails.com/cve/CVE-2010-1472
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1472
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12171
- https://www.cvedetails.com/cve/CVE-2010-1473
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1473
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Joomla! Component Sweetykeeper 1.5 - Local File Inclusion
author: daffainfo
severity: high
description: "A directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php."
description: A directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
reference:
- https://www.exploit-db.com/exploits/12182
- https://www.cvedetails.com/cve/CVE-2010-1474

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the view parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12150
- https://www.cvedetails.com/cve/CVE-2010-1476
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1476
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: |
reference:
- https://www.exploit-db.com/exploits/12145
- https://www.cvedetails.com/cve/CVE-2010-1478
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1478
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12318
- https://www.cvedetails.com/cve/CVE-2010-1491
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1491
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12113
- https://www.cvedetails.com/cve/CVE-2010-1494
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1494
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12286
- https://www.cvedetails.com/cve/CVE-2010-1495
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1495
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12054
- https://www.cvedetails.com/cve/CVE-2010-1531
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1531
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -1,16 +1,19 @@
id: CVE-2010-1532
info:
name: Joomla! Component PowerMail Pro 1.5.3 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
description: A directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts
via a .. (dot dot) in the controller parameter to index.php.
reference:
- https://www.exploit-db.com/exploits/12118
- https://www.cvedetails.com/cve/CVE-2010-1532
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1532
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1533
info:
name: Joomla! Component TweetLA 1.0.1 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12142
- https://www.cvedetails.com/cve/CVE-2010-1533
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1533
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -1,16 +1,18 @@
id: CVE-2010-1534
info:
name: Joomla! Component Shoutbox Pro - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Shoutbox Pro (com_shoutbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version
reference:
- https://www.exploit-db.com/exploits/12067
- https://www.cvedetails.com/cve/CVE-2010-1534
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1534
remediation: Upgrade to a supported version
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -5,12 +5,12 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter.
reference: |
reference:
- https://www.exploit-db.com/exploits/11625
- https://www.cvedetails.com/cve/CVE-2010-1540
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1540
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Joomla! Component ZiMB Comment 0.8.1 - Local File Inclusion
author: daffainfo
severity: high
description: "A directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php."
description: A directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
reference:
- https://www.exploit-db.com/exploits/12283
- https://www.cvedetails.com/cve/CVE-2010-1602

View File

@ -5,13 +5,13 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the ZiMB Core (aka ZiMBCore or com_zimbcore) component 0.1 in the ZiMB Manager collection for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference:
- https://www.exploit-db.com/exploits/12284
- https://www.cvedetails.com/cve/CVE-2010-1603
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1603
remediation: Upgrade to a supported version.
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/12316
- https://www.cvedetails.com/cve/CVE-2010-1607
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1607
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/12430
- https://www.cvedetails.com/cve/CVE-2010-1653
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1653
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -8,9 +8,9 @@ info:
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1657
- https://www.exploit-db.com/exploits/12428
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1657
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/12427
- https://www.cvedetails.com/cve/CVE-2010-1658
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1658
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/12426
- https://nvd.nist.gov/vuln/detail/CVE-2010-1659
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1659
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -1,4 +1,5 @@
id: CVE-2010-1714
info:
name: Joomla! Component Arcade Games 1.0 - Local File Inclusion
author: daffainfo
@ -7,9 +8,10 @@ info:
reference:
- https://www.exploit-db.com/exploits/12168
- https://www.cvedetails.com/cve/CVE-2010-1714
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1714
tags: cve,cve2010,joomla,lfi
requests:
- method: GET
path:

View File

@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/12174
- https://www.cvedetails.com/cve/CVE-2010-1715
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1715
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/12291
- https://www.cvedetails.com/cve/CVE-2010-1717
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1717
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/12282
- https://www.cvedetails.com/cve/CVE-2010-1718
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1718
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/12233
- https://www.cvedetails.com/cve/CVE-2010-1719
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1719
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/12177
- https://www.cvedetails.com/cve/CVE-2010-1722
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1722
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

View File

@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/12289
- https://www.cvedetails.com/cve/CVE-2010-1723
tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1723
tags: cve,cve2010,joomla,lfi
requests:
- method: GET

Some files were not shown because too many files have changed in this diff Show More