diff --git a/cnvd/2021/CNVD-2021-10543.yaml b/cnvd/2021/CNVD-2021-10543.yaml
index 2ff27e9afd..0611b057c6 100644
--- a/cnvd/2021/CNVD-2021-10543.yaml
+++ b/cnvd/2021/CNVD-2021-10543.yaml
@@ -4,12 +4,12 @@ info:
name: EEA - Information Disclosure
author: pikpikcu
severity: high
- description: EEA is susceptible to information disclosure.
+ description: EEA is susceptible to information disclosure including the username and password.
reference:
- https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
cwe-id: CWE-200
tags: config,exposure,cnvd,cnvd2021
diff --git a/default-logins/lutron/lutron-default-login.yaml b/default-logins/lutron/lutron-default-login.yaml
index e881d1a524..31d85fb6ed 100644
--- a/default-logins/lutron/lutron-default-login.yaml
+++ b/default-logins/lutron/lutron-default-login.yaml
@@ -1,17 +1,17 @@
id: lutron-default-login
info:
- name: Lutron - Default Login
+ name: Lutron - Default Account
author: geeknik
- severity: high
+ severity: critical
description: Multiple Lutron devices contain a default login vulnerability. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://www.lutron.com
- https://vulners.com/openvas/OPENVAS:1361412562310113206
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
- cvss-score: 5.8
- cwe-id: CWE-522
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cwe-id: CWE-1391
tags: default-login,lutron,iot
requests:
diff --git a/default-logins/ruckus/ruckus-wireless-default-login.yaml b/default-logins/ruckus/ruckus-wireless-default-login.yaml
index 1c0413f3d6..3aafac340c 100644
--- a/default-logins/ruckus/ruckus-wireless-default-login.yaml
+++ b/default-logins/ruckus/ruckus-wireless-default-login.yaml
@@ -8,9 +8,9 @@ info:
reference:
- https://docs.commscope.com/bundle/fastiron-08092-securityguide/page/GUID-32D3BB01-E600-4FBE-B555-7570B5024D34.html
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
- cvss-score: 8.3
- cwe-id: CWE-522
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cwe-id: CWE-1391
metadata:
verified: true
shodan-query: title:"ruckus"
diff --git a/exposed-panels/mybb/mybb-forum-install.yaml b/exposed-panels/mybb/mybb-forum-install.yaml
index 776485cdea..a023de1c6a 100644
--- a/exposed-panels/mybb/mybb-forum-install.yaml
+++ b/exposed-panels/mybb/mybb-forum-install.yaml
@@ -6,8 +6,8 @@ info:
severity: high
description: MyBB installation panel was detected.
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
+ cvss-score: 8.6
cwe-id: CWE-200
metadata:
verified: true
diff --git a/exposed-panels/osticket/osticket-install.yaml b/exposed-panels/osticket/osticket-install.yaml
index 599affb6d8..bef50b8430 100644
--- a/exposed-panels/osticket/osticket-install.yaml
+++ b/exposed-panels/osticket/osticket-install.yaml
@@ -3,12 +3,12 @@ id: osticket-install
info:
name: osTicket Installer Panel - Detect
author: ritikchaddha
- severity: high
+ severity: critical
description: osTicket installer panel was detected.
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
- cwe-id: CWE-200
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
+ cvss-score: 9.4
+ cwe-id: CWE-284
metadata:
verified: true
shodan-query: http.title:"osTicket Installer"
diff --git a/exposed-panels/saltstack-config-panel.yaml b/exposed-panels/saltstack-config-panel.yaml
index 63b8ec6baf..8d050659fe 100644
--- a/exposed-panels/saltstack-config-panel.yaml
+++ b/exposed-panels/saltstack-config-panel.yaml
@@ -1,34 +1,34 @@
-id: saltstack-config-panel
-
-info:
- name: SaltStack Config Panel - Detect
- author: pussycat0x
- severity: info
- description: |
- SaltStack config panel was detected.
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
- cvss-score: 0.0
- cwe-id: CWE-200
- metadata:
- verified: true
- shodan-query: title:"SaltStack Config"
- tags: panel,vmware,login,saltstack
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/login"
-
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - "SaltStack Config"
-
- - type: status
- status:
- - 200
-
-# Enhanced by cs 01/26/2023
+id: saltstack-config-panel
+
+info:
+ name: SaltStack Config Panel - Detect
+ author: pussycat0x
+ severity: info
+ description: |
+ SaltStack config panel was detected.
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
+ cwe-id: CWE-200
+ metadata:
+ verified: true
+ shodan-query: title:"SaltStack Config"
+ tags: panel,vmware,login,saltstack
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/login"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "SaltStack Config"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by cs 01/26/2023
diff --git a/exposed-panels/solr-panel-exposure.yaml b/exposed-panels/solr-panel-exposure.yaml
index 4d324ebebb..1dba8f964c 100644
--- a/exposed-panels/solr-panel-exposure.yaml
+++ b/exposed-panels/solr-panel-exposure.yaml
@@ -6,8 +6,8 @@ info:
severity: info
description: Apache Solr admin panel was detected.
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
- cvss-score: 8.6
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
metadata:
verified: true
diff --git a/exposed-panels/wagtail-cms-detect.yaml b/exposed-panels/wagtail-cms-detect.yaml
index 9826a08d88..e3d90025b7 100644
--- a/exposed-panels/wagtail-cms-detect.yaml
+++ b/exposed-panels/wagtail-cms-detect.yaml
@@ -1,35 +1,35 @@
-id: wagtail-login
-
-info:
- name: Wagtail Login - Detect
- author: kishore-hariram
- severity: info
- description: The Wagtail panel has been detected.
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
- cvss-score: 0.0
- cwe-id: CWE-200
- metadata:
- verified: true
- shodan-query: title:"Wagtail - Sign in"
- tags: panel,wagtail
-
-requests:
- - method: GET
- path:
- - '{{BaseURL}}/login/?next=/'
- - '{{BaseURL}}/admin/login/?next=/admin/'
-
- stop-at-first-match: true
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - 'Wagtail - Sign in'
-
- - type: status
- status:
- - 200
-
-# Enhanced by cs 01/23/2023
+id: wagtail-login
+
+info:
+ name: Wagtail Login - Detect
+ author: kishore-hariram
+ severity: info
+ description: The Wagtail panel has been detected.
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
+ cwe-id: CWE-200
+ metadata:
+ verified: true
+ shodan-query: title:"Wagtail - Sign in"
+ tags: panel,wagtail
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/login/?next=/'
+ - '{{BaseURL}}/admin/login/?next=/admin/'
+
+ stop-at-first-match: true
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - 'Wagtail - Sign in'
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by cs 01/23/2023
diff --git a/exposures/apis/couchbase-buckets-api.yaml b/exposures/apis/couchbase-buckets-api.yaml
index 07efae68fe..621f7ddc44 100644
--- a/exposures/apis/couchbase-buckets-api.yaml
+++ b/exposures/apis/couchbase-buckets-api.yaml
@@ -3,7 +3,7 @@ id: couchbase-buckets-api
info:
name: Couchbase Buckets Unauthenticated REST API - Detect
author: geeknik
- severity: info
+ severity: medium
description: Couchbase Buckets REST API without authentication was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
diff --git a/exposures/configs/django-variables-exposed.yaml b/exposures/configs/django-variables-exposed.yaml
index a9977d64a1..762ac9e457 100644
--- a/exposures/configs/django-variables-exposed.yaml
+++ b/exposures/configs/django-variables-exposed.yaml
@@ -10,9 +10,9 @@ info:
- https://docs.djangoproject.com/en/1.11/topics/logging/#django-security
- https://github.com/projectdiscovery/nuclei-templates/blob/master/file/logs/django-framework-
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
- cwe-id: CWE-200exceptions.yaml
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
+ cwe-id: CWE-200
metadata:
verified: true
tags: exposure,config,django
diff --git a/exposures/configs/gruntfile-exposure.yaml b/exposures/configs/gruntfile-exposure.yaml
index 2590cb51c8..3c1c7385cb 100644
--- a/exposures/configs/gruntfile-exposure.yaml
+++ b/exposures/configs/gruntfile-exposure.yaml
@@ -8,8 +8,8 @@ info:
reference:
- https://gruntjs.com/sample-gruntfile
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
tags: config,exposure
diff --git a/exposures/configs/htpasswd-detection.yaml b/exposures/configs/htpasswd-detection.yaml
index 04ec97f20d..e5d12ff0f9 100644
--- a/exposures/configs/htpasswd-detection.yaml
+++ b/exposures/configs/htpasswd-detection.yaml
@@ -3,12 +3,12 @@ id: htpasswd-detection
info:
name: Apache htpasswd Config - Detect
author: geeknik
- severity: info
+ severity: high
description: Apache htpasswd configuration was detected.
reference: https://httpd.apache.org/docs/current/programs/htpasswd.html
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
cwe-id: CWE-200
tags: config,exposure
diff --git a/exposures/configs/httpd-config.yaml b/exposures/configs/httpd-config.yaml
index 952c595e59..e3302df816 100644
--- a/exposures/configs/httpd-config.yaml
+++ b/exposures/configs/httpd-config.yaml
@@ -7,8 +7,8 @@ info:
description: Apache httpd configuration information was detected.
reference: https://httpd.apache.org/docs/current/configuring.html
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
tags: config,exposure,httpd
diff --git a/exposures/configs/jetbrains-datasources.yaml b/exposures/configs/jetbrains-datasources.yaml
index 4df809a4ca..1c3f634a9d 100644
--- a/exposures/configs/jetbrains-datasources.yaml
+++ b/exposures/configs/jetbrains-datasources.yaml
@@ -7,8 +7,8 @@ info:
description: Jetbrains IDE DataSources configuration information was detected.
reference: https://www.jetbrains.com
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
tags: config,exposure,jetbrains
diff --git a/exposures/configs/keycloak-openid-config.yaml b/exposures/configs/keycloak-openid-config.yaml
index 9ae6814c0b..c75ffc8fcb 100644
--- a/exposures/configs/keycloak-openid-config.yaml
+++ b/exposures/configs/keycloak-openid-config.yaml
@@ -8,8 +8,8 @@ info:
reference:
- https://issues.jboss.org/browse/KEYCLOAK-571
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
tags: keycloak,config
diff --git a/exposures/configs/netbeans-config.yaml b/exposures/configs/netbeans-config.yaml
index f7dc0d70b3..d9cdd2c220 100644
--- a/exposures/configs/netbeans-config.yaml
+++ b/exposures/configs/netbeans-config.yaml
@@ -8,8 +8,8 @@ info:
reference:
- https://netbeans.apache.org/
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
tags: netbeans,config,exposure
diff --git a/exposures/configs/owncloud-config.yaml b/exposures/configs/owncloud-config.yaml
index a6b8fc5498..af86d254e7 100644
--- a/exposures/configs/owncloud-config.yaml
+++ b/exposures/configs/owncloud-config.yaml
@@ -8,8 +8,8 @@ info:
reference:
- https://owncloud.com/
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
tags: config,exposure
diff --git a/exposures/configs/package-json.yaml b/exposures/configs/package-json.yaml
index 353f4e168b..da0a7bd47d 100644
--- a/exposures/configs/package-json.yaml
+++ b/exposures/configs/package-json.yaml
@@ -7,8 +7,8 @@ info:
description: npm configuration information was detected. All npm packages contain a file, usually in the project root, called package.json - this file holds various metadata relevant to the project.
reference: https://www.npmjs.com
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
tags: config,exposure
diff --git a/exposures/configs/phpsec-config.yaml b/exposures/configs/phpsec-config.yaml
index d9c85917bd..83b6d7330c 100644
--- a/exposures/configs/phpsec-config.yaml
+++ b/exposures/configs/phpsec-config.yaml
@@ -7,8 +7,8 @@ info:
description: phpspec configuration information was detected.
reference: https://phpspec.net/en/stable/cookbook/configuration.html
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
metadata:
verified: true
diff --git a/exposures/configs/pipfile-config.yaml b/exposures/configs/pipfile-config.yaml
index edd88b250a..830eabcfef 100644
--- a/exposures/configs/pipfile-config.yaml
+++ b/exposures/configs/pipfile-config.yaml
@@ -7,8 +7,8 @@ info:
description: Pipfile configuration information was detected.
reference: https://pypi.org/project
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
metadata:
verified: true
diff --git a/exposures/configs/rubocop-config.yaml b/exposures/configs/rubocop-config.yaml
index 592a2e6fce..fc756ee6ca 100644
--- a/exposures/configs/rubocop-config.yaml
+++ b/exposures/configs/rubocop-config.yaml
@@ -9,8 +9,8 @@ info:
- https://raw.githubusercontent.com/maurosoria/dirsearch/master/db/dicc.txt
- https://github.com/rubocop/rubocop
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
metadata:
verified: true
diff --git a/iot/lutron-iot-default-login.yaml b/iot/lutron-iot-default-login.yaml
deleted file mode 100644
index 2930155349..0000000000
--- a/iot/lutron-iot-default-login.yaml
+++ /dev/null
@@ -1,39 +0,0 @@
-id: lutron-iot-default-login
-
-info:
- name: Lutron IOT Device Default Login Panel - Detect
- author: geeknik
- severity: high
- description: Lutron IOT Device Default login panel was detected.
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
- cvss-score: 0.0
- cwe-id: CWE-200
- reference:
- - https://www.lutron.com
- tags: iot,default-login,lutron,panel
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/login?login=lutron&password=lutron"
-
- matchers-condition: and
- matchers:
- - type: word
- words:
- - "
LUTRON"
- - ">DeviceIP"
- - ">Get Database Info as XML"
- condition: and
-
- - type: word
- part: header
- words:
- - "text/html"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2023/01/29
diff --git a/miscellaneous/addeventlistener-detect.yaml b/miscellaneous/addeventlistener-detect.yaml
deleted file mode 100644
index 379295999f..0000000000
--- a/miscellaneous/addeventlistener-detect.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: addeventlistener-detect
-
-info:
- name: DOM EventListener - Cross-Site Scripting
- author: yavolo,dwisiswant0
- severity: info
- description: EventListener contains a cross-site scripting vulnerability via the document object model (DOM). An attacker can execute arbitrary script which can then allow theft of cookie-based authentication credentials and launch of other attacks.
- reference:
- - https://portswigger.net/web-security/dom-based/controlling-the-web-message-source
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
- tags: xss,misc
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}"
-
- matchers:
- - type: regex
- part: body
- regex:
- - (([\w\_]+)\.)?add[Ee]vent[Ll]istener\(["']?[\w\_]+["']? # Test cases: https://www.regextester.com/?fam=121118
-
-# Enhanced by md on 2022/09/19
diff --git a/misconfiguration/command-api-explorer.yaml b/misconfiguration/command-api-explorer.yaml
index e05ac147d5..128e0a0df3 100644
--- a/misconfiguration/command-api-explorer.yaml
+++ b/misconfiguration/command-api-explorer.yaml
@@ -3,7 +3,7 @@ id: command-api-explorer
info:
name: Command API Explorer Panel - Detect
author: DhiyaneshDK
- severity: low
+ severity: info
description: Command API Explorer panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
diff --git a/misconfiguration/dgraph-dashboard-exposure.yaml b/misconfiguration/dgraph-dashboard-exposure.yaml
index 0e5f5b4761..8a03a540fb 100644
--- a/misconfiguration/dgraph-dashboard-exposure.yaml
+++ b/misconfiguration/dgraph-dashboard-exposure.yaml
@@ -3,7 +3,7 @@ id: dgraph-dashboard-exposure
info:
name: Dgraph Ratel Dashboard Exposure Panel - Detect
author: dhiyaneshDk
- severity: low
+ severity: info
description: Dgraph Ratel Dashboard Exposure panel was detected.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
diff --git a/misconfiguration/office365-open-redirect.yaml b/misconfiguration/office365-open-redirect.yaml
index aab0e5467e..0c4385535e 100644
--- a/misconfiguration/office365-open-redirect.yaml
+++ b/misconfiguration/office365-open-redirect.yaml
@@ -3,9 +3,9 @@ id: office365-open-redirect
info:
name: Office365 Autodiscover - Open Redirect
author: dhiyaneshDk
- severity: low
+ severity: medium
description: Office365 Autodiscover contains an open redirect vulnerability. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
- remediation: See https://learn.microsoft.com/en-us/outlook/troubleshoot/connectivity/how-to-suppress-autodiscover-redirect-warning for a workaround.
+ remediation: See the workaround detailed in the Medium post in the references.
reference:
- https://medium.com/@heinjame/office365-open-redirect-from-autodiscover-64284d26c168
classification:
diff --git a/misconfiguration/pghero-dashboard-exposure.yaml b/misconfiguration/pghero-dashboard-exposure.yaml
index 601b4dc326..9b329c53df 100644
--- a/misconfiguration/pghero-dashboard-exposure.yaml
+++ b/misconfiguration/pghero-dashboard-exposure.yaml
@@ -3,11 +3,11 @@ id: pghero-dashboard-exposure
info:
name: PgHero Dashboard Exposure Panel - Detect
author: DhiyaneshDk
- severity: low
+ severity: medium
description: PgHero Dashboard Exposure panel was detected.
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
- cvss-score: 0.0
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ cvss-score: 5.3
cwe-id: CWE-200
reference:
- https://github.com/ankane/pghero
diff --git a/misconfiguration/unauth-fastvue-dashboard.yaml b/misconfiguration/unauth-fastvue-dashboard.yaml
index 5121faff54..256d324fd5 100644
--- a/misconfiguration/unauth-fastvue-dashboard.yaml
+++ b/misconfiguration/unauth-fastvue-dashboard.yaml
@@ -6,8 +6,8 @@ info:
severity: medium
description: Fastvue Dashboard panel was detected without authentication.
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
- cvss-score: 0.0
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ cvss-score: 5.3
cwe-id: CWE-200
metadata:
verified: true
diff --git a/network/mysql-native-password.yaml b/network/mysql-native-password.yaml
index 84c01a362e..f002924116 100644
--- a/network/mysql-native-password.yaml
+++ b/network/mysql-native-password.yaml
@@ -8,8 +8,8 @@ info:
reference:
- https://github.com/Tinram/MySQL-Brute
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.3
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ cvss-score: 0.0
cwe-id: CWE-200
tags: network,mysql,bruteforce,db
diff --git a/vulnerabilities/gnuboard/gnuboard-sms-xss.yaml b/vulnerabilities/gnuboard/gnuboard-sms-xss.yaml
index 21bad6a887..1020962baf 100644
--- a/vulnerabilities/gnuboard/gnuboard-sms-xss.yaml
+++ b/vulnerabilities/gnuboard/gnuboard-sms-xss.yaml
@@ -9,9 +9,9 @@ info:
- https://sir.kr/g5_pds/4788?page=5
- https://github.com/gnuboard/gnuboard5/commit/8182cac90d2ee2f9da06469ecba759170e782ee3
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
metadata:
verified: true
shodan-query: http.html:"Gnuboard"
diff --git a/vulnerabilities/gnuboard/gnuboard5-rxss.yaml b/vulnerabilities/gnuboard/gnuboard5-rxss.yaml
index f5622ae8d1..9b96cdd9e2 100644
--- a/vulnerabilities/gnuboard/gnuboard5-rxss.yaml
+++ b/vulnerabilities/gnuboard/gnuboard5-rxss.yaml
@@ -10,9 +10,9 @@ info:
- https://huntr.dev/bounties/ed317cde-9bd1-429e-b6d3-547e72534dd5/
- https://vulners.com/huntr/25775287-88CD-4F00-B978-692D627DFF04
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
metadata:
verified: true
shodan-query: http.html:"gnuboard5"
diff --git a/vulnerabilities/gnuboard/gnuboard5-xss.yaml b/vulnerabilities/gnuboard/gnuboard5-xss.yaml
index 8bc27e5a80..3dc6e2361c 100644
--- a/vulnerabilities/gnuboard/gnuboard5-xss.yaml
+++ b/vulnerabilities/gnuboard/gnuboard5-xss.yaml
@@ -9,9 +9,9 @@ info:
reference:
- https://huntr.dev/bounties/ad2a9b32-fe6c-43e9-9b05-2c77c58dde6a/
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
metadata:
verified: true
shodan-query: http.html:"gnuboard5"
diff --git a/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml b/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml
index d60d37ee18..80325a621e 100644
--- a/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml
+++ b/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml
@@ -8,9 +8,9 @@ info:
reference:
- https://www.dionach.com/blog/moodle-jmol-plugin-multiple-vulnerabilities/
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: moodle,xss
requests:
diff --git a/vulnerabilities/moodle/moodle-xss.yaml b/vulnerabilities/moodle/moodle-xss.yaml
index e94f6bb292..c48123110c 100644
--- a/vulnerabilities/moodle/moodle-xss.yaml
+++ b/vulnerabilities/moodle/moodle-xss.yaml
@@ -9,9 +9,9 @@ info:
- https://twitter.com/JacksonHHax/status/1391367064154042377
- https://nvd.nist.gov/vuln/detail/CVE-2021-32478
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: moodle,xss
requests:
diff --git a/vulnerabilities/other/carrental-xss.yaml b/vulnerabilities/other/carrental-xss.yaml
index a41c5c03fa..c9bf66f528 100644
--- a/vulnerabilities/other/carrental-xss.yaml
+++ b/vulnerabilities/other/carrental-xss.yaml
@@ -10,9 +10,9 @@ info:
- https://www.exploit-db.com/exploits/49546
- https://www.sourcecodester.com/
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
metadata:
verified: true
shodan-query: http.html:"Car Rental Management System"
diff --git a/vulnerabilities/other/kavita-lfi.yaml b/vulnerabilities/other/kavita-lfi.yaml
index b5fcb55af3..71cdc28a0d 100644
--- a/vulnerabilities/other/kavita-lfi.yaml
+++ b/vulnerabilities/other/kavita-lfi.yaml
@@ -3,7 +3,7 @@ id: kavita-lfi
info:
name: Kavita - Local File Inclusion
author: arafatansari
- severity: medium
+ severity: high
description: |
Kavita - Path Traversal is vulnerable to local file inclusion via abusing the Path Traversal filename parameter of the /api/image/cover-upload.
reference:
diff --git a/vulnerabilities/other/keycloak-xss.yaml b/vulnerabilities/other/keycloak-xss.yaml
index 146a86ec34..db58a6edaf 100644
--- a/vulnerabilities/other/keycloak-xss.yaml
+++ b/vulnerabilities/other/keycloak-xss.yaml
@@ -3,14 +3,14 @@ id: keycloak-xss
info:
name: Keycloak <= 8.0 - Cross-Site Scripting
author: incogbyte
- severity: info
+ severity: medium
description: Keycloak 8.0 and prior contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and thus steal cookie-based authentication credentials and launch other attacks.
reference:
- https://cure53.de/pentest-report_keycloak.pdf
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: keycloak,xss
requests:
diff --git a/vulnerabilities/squirrelmail/squirrelmail-add-xss.yaml b/vulnerabilities/squirrelmail/squirrelmail-add-xss.yaml
index 23454649c2..9bc2733e7f 100644
--- a/vulnerabilities/squirrelmail/squirrelmail-add-xss.yaml
+++ b/vulnerabilities/squirrelmail/squirrelmail-add-xss.yaml
@@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/26305
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: edb,xss,squirrelmail,plugin
requests:
diff --git a/vulnerabilities/squirrelmail/squirrelmail-vkeyboard-xss.yaml b/vulnerabilities/squirrelmail/squirrelmail-vkeyboard-xss.yaml
index 6c0d22199b..c5382ede64 100644
--- a/vulnerabilities/squirrelmail/squirrelmail-vkeyboard-xss.yaml
+++ b/vulnerabilities/squirrelmail/squirrelmail-vkeyboard-xss.yaml
@@ -8,9 +8,9 @@ info:
reference:
- https://www.exploit-db.com/exploits/34814
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: xss,squirrelmail,plugin,edb
requests:
diff --git a/vulnerabilities/weaver/ecology/ecology-arbitrary-file-upload.yaml b/vulnerabilities/weaver/ecology/ecology-arbitrary-file-upload.yaml
index 4af9d1deb9..23f5c33a4c 100644
--- a/vulnerabilities/weaver/ecology/ecology-arbitrary-file-upload.yaml
+++ b/vulnerabilities/weaver/ecology/ecology-arbitrary-file-upload.yaml
@@ -3,13 +3,13 @@ id: ecology-arbitrary-file-upload
info:
name: Ecology - Arbitrary File Upload
author: ritikchaddha
- severity: medium
+ severity: critical
description: Ecology contains an arbitrary file upload vulnerability. An attacker can upload arbitrary files to the server, which in turn can be used to make the application execute file content as code, As a result, an attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g
classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- cvss-score: 8.8
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
cwe-id: CWE-434
metadata:
fofa-query: app="泛微-协同办公OA"
diff --git a/vulnerabilities/wordpress/404-to-301-xss.yaml b/vulnerabilities/wordpress/404-to-301-xss.yaml
index 8b83ef8a27..18a4207981 100644
--- a/vulnerabilities/wordpress/404-to-301-xss.yaml
+++ b/vulnerabilities/wordpress/404-to-301-xss.yaml
@@ -9,9 +9,9 @@ info:
- https://wpscan.com/vulnerability/4a310b4f-79fa-4b74-93f8-e4522921abe1
- https://wordpress.org/plugins/404-to-301
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wpscan,wp-plugin,xss,wp,wordpress,authenticated
requests:
diff --git a/vulnerabilities/wordpress/analytify-plugin-xss.yaml b/vulnerabilities/wordpress/analytify-plugin-xss.yaml
index d4547f82d2..2c3483159e 100644
--- a/vulnerabilities/wordpress/analytify-plugin-xss.yaml
+++ b/vulnerabilities/wordpress/analytify-plugin-xss.yaml
@@ -12,9 +12,9 @@ info:
verified: true
google-query: inurl:/wp-content/plugins/wp-analytify
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wp,wordpress,analytify,wpscan,wp-plugin,xss
requests:
diff --git a/vulnerabilities/wordpress/avchat-video-chat-xss.yaml b/vulnerabilities/wordpress/avchat-video-chat-xss.yaml
index 0feaccd61a..83edeb64d3 100644
--- a/vulnerabilities/wordpress/avchat-video-chat-xss.yaml
+++ b/vulnerabilities/wordpress/avchat-video-chat-xss.yaml
@@ -12,9 +12,9 @@ info:
metadata:
verified: true
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: xss,,wp,wpscan,wordpress,wp-plugin
diff --git a/vulnerabilities/wordpress/calameo-publications-xss.yaml b/vulnerabilities/wordpress/calameo-publications-xss.yaml
index cd0c040307..a49a775dc0 100644
--- a/vulnerabilities/wordpress/calameo-publications-xss.yaml
+++ b/vulnerabilities/wordpress/calameo-publications-xss.yaml
@@ -13,9 +13,9 @@ info:
metadata:
verified: true
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wordpress,wp-plugin,xss,wp,wpscan
requests:
diff --git a/vulnerabilities/wordpress/checkout-fields-manager-xss.yaml b/vulnerabilities/wordpress/checkout-fields-manager-xss.yaml
index c432420d9e..b27172ecdb 100644
--- a/vulnerabilities/wordpress/checkout-fields-manager-xss.yaml
+++ b/vulnerabilities/wordpress/checkout-fields-manager-xss.yaml
@@ -11,9 +11,9 @@ info:
metadata:
verified: true
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: xss,wp,wordpress,authenticated,woocommerce,wpscan,wp-plugin
requests:
diff --git a/vulnerabilities/wordpress/clearfy-cache-xss.yaml b/vulnerabilities/wordpress/clearfy-cache-xss.yaml
index 2ec2d9d0af..ccab8047ba 100644
--- a/vulnerabilities/wordpress/clearfy-cache-xss.yaml
+++ b/vulnerabilities/wordpress/clearfy-cache-xss.yaml
@@ -9,9 +9,9 @@ info:
- https://wpscan.com/vulnerability/a59e7102-13d6-4f1e-b7b1-75eae307e516
- https://wordpress.org/plugins/clearfy
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: xss,wp,wordpress,authenticated,clearfy-cache,wpscan,wp-plugin
requests:
diff --git a/vulnerabilities/wordpress/curcy-xss.yaml b/vulnerabilities/wordpress/curcy-xss.yaml
index c6a2793e0a..53370854c0 100644
--- a/vulnerabilities/wordpress/curcy-xss.yaml
+++ b/vulnerabilities/wordpress/curcy-xss.yaml
@@ -11,9 +11,9 @@ info:
metadata:
verified: true
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wp-plugin,xss,wp,wordpress,authenticated,curcy,wpscan
requests:
diff --git a/vulnerabilities/wordpress/flow-flow-social-stream-xss.yaml b/vulnerabilities/wordpress/flow-flow-social-stream-xss.yaml
index c1341f0c0f..d166572954 100644
--- a/vulnerabilities/wordpress/flow-flow-social-stream-xss.yaml
+++ b/vulnerabilities/wordpress/flow-flow-social-stream-xss.yaml
@@ -8,9 +8,9 @@ info:
reference:
- https://wpscan.com/vulnerability/8354b34e-40f4-4b70-bb09-38e2cf572ce9
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: xss,wordpress,wpscan
requests:
diff --git a/vulnerabilities/wordpress/members-list-xss.yaml b/vulnerabilities/wordpress/members-list-xss.yaml
index dfe1948ff2..87a679464b 100644
--- a/vulnerabilities/wordpress/members-list-xss.yaml
+++ b/vulnerabilities/wordpress/members-list-xss.yaml
@@ -8,9 +8,9 @@ info:
reference:
- https://wpscan.com/vulnerability/d13f26f0-5d91-49d7-b514-1577d4247648
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wp,wordpress,wp-plugin,xss,wpscan
requests:
diff --git a/vulnerabilities/wordpress/modula-image-gallery-xss.yaml b/vulnerabilities/wordpress/modula-image-gallery-xss.yaml
index bff1ede706..1a9c889ee6 100644
--- a/vulnerabilities/wordpress/modula-image-gallery-xss.yaml
+++ b/vulnerabilities/wordpress/modula-image-gallery-xss.yaml
@@ -11,9 +11,9 @@ info:
metadata:
verified: true
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: authenticated,wpscan,wp-plugin,xss,wp,wordpress
requests:
diff --git a/vulnerabilities/wordpress/new-user-approve-xss.yaml b/vulnerabilities/wordpress/new-user-approve-xss.yaml
index a563667db3..8dce77653e 100644
--- a/vulnerabilities/wordpress/new-user-approve-xss.yaml
+++ b/vulnerabilities/wordpress/new-user-approve-xss.yaml
@@ -11,9 +11,9 @@ info:
metadata:
verified: true
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wordpress,xss,authenticated,wp-plugin,wpscan,wp
requests:
diff --git a/vulnerabilities/wordpress/sassy-social-share.yaml b/vulnerabilities/wordpress/sassy-social-share.yaml
index f7790fbc98..d3ca7db429 100644
--- a/vulnerabilities/wordpress/sassy-social-share.yaml
+++ b/vulnerabilities/wordpress/sassy-social-share.yaml
@@ -9,9 +9,9 @@ info:
reference:
- https://wpscan.com/vulnerability/4631519b-2060-43a0-b69b-b3d7ed94c705
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: xss,wp,wpscan,wordpress,wp-plugin,sassy
requests:
diff --git a/vulnerabilities/wordpress/seo-redirection-xss.yaml b/vulnerabilities/wordpress/seo-redirection-xss.yaml
index 663d14f2e2..1e5a50c5f0 100644
--- a/vulnerabilities/wordpress/seo-redirection-xss.yaml
+++ b/vulnerabilities/wordpress/seo-redirection-xss.yaml
@@ -10,9 +10,9 @@ info:
reference:
- https://wpscan.com/vulnerability/b694b9c0-a367-468c-99c2-6ba35bcf21ea
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wordpress,xss,wp-plugin,authenticated,wpscan
requests:
diff --git a/vulnerabilities/wordpress/shortpixel-image-optimizer-xss.yaml b/vulnerabilities/wordpress/shortpixel-image-optimizer-xss.yaml
index 04d9bb9eb8..dedabfb94c 100644
--- a/vulnerabilities/wordpress/shortpixel-image-optimizer-xss.yaml
+++ b/vulnerabilities/wordpress/shortpixel-image-optimizer-xss.yaml
@@ -11,9 +11,9 @@ info:
metadata:
verified: true
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: shortpixel,authenticated,wpscan,xss,wp-plugin,wp,wordpress
requests:
diff --git a/vulnerabilities/wordpress/woocommerce-pdf-invoices-xss.yaml b/vulnerabilities/wordpress/woocommerce-pdf-invoices-xss.yaml
index b16d64dcae..761ce389b7 100644
--- a/vulnerabilities/wordpress/woocommerce-pdf-invoices-xss.yaml
+++ b/vulnerabilities/wordpress/woocommerce-pdf-invoices-xss.yaml
@@ -9,9 +9,9 @@ info:
- https://wpscan.com/vulnerability/bc05dde0-98a2-46e3-b2c8-7bdc8c32394b
- https://wordpress.org/plugins/woocommerce-pdf-invoices-packing-slips/
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: xss,wp,wordpress,woocommerce,authenticated,wpscan,wp-plugin
requests:
diff --git a/vulnerabilities/wordpress/wordpress-wordfence-waf-bypass-xss.yaml b/vulnerabilities/wordpress/wordpress-wordfence-waf-bypass-xss.yaml
index 476f3602f1..ac36d3ec28 100644
--- a/vulnerabilities/wordpress/wordpress-wordfence-waf-bypass-xss.yaml
+++ b/vulnerabilities/wordpress/wordpress-wordfence-waf-bypass-xss.yaml
@@ -8,9 +8,9 @@ info:
reference:
- https://twitter.com/naglinagli/status/1382082473744564226
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wordpress,wordfence,xss,bypass
requests:
diff --git a/vulnerabilities/wordpress/wordpress-wordfence-xss.yaml b/vulnerabilities/wordpress/wordpress-wordfence-xss.yaml
index 9fc4199fee..9696a352c9 100644
--- a/vulnerabilities/wordpress/wordpress-wordfence-xss.yaml
+++ b/vulnerabilities/wordpress/wordpress-wordfence-xss.yaml
@@ -6,9 +6,9 @@ info:
severity: medium
description: WordPress Wordfence 7.4.6 is vulnerable to cross-site scripting.
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wordpress,wp-plugin,xss,wordfence
requests:
diff --git a/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml b/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml
index 254120356e..f9e840daba 100644
--- a/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml
+++ b/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml
@@ -10,9 +10,9 @@ info:
- https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html
- https://wpscan.com/vulnerability/e4b796fa-3215-43ff-a6aa-71f6e1db25e5
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wordpress,xss,wp,wpscan
requests:
diff --git a/vulnerabilities/wordpress/wp-all-export-xss.yaml b/vulnerabilities/wordpress/wp-all-export-xss.yaml
index 3eb71ebc08..af05459785 100644
--- a/vulnerabilities/wordpress/wp-all-export-xss.yaml
+++ b/vulnerabilities/wordpress/wp-all-export-xss.yaml
@@ -10,9 +10,9 @@ info:
reference:
- https://wpscan.com/vulnerability/de330a59-d64d-40be-86df-98997949e5e4
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wp-plugin,xss,wp,wordpress,authenticated,wpscan
requests:
diff --git a/vulnerabilities/wordpress/wp-ambience-xss.yaml b/vulnerabilities/wordpress/wp-ambience-xss.yaml
index 40c9e68bfc..0b12226038 100644
--- a/vulnerabilities/wordpress/wp-ambience-xss.yaml
+++ b/vulnerabilities/wordpress/wp-ambience-xss.yaml
@@ -10,9 +10,9 @@ info:
- https://www.exploit-db.com/expl oits/38568
- https://wpscan.com/vulnerability/c465e5c1-fe43-40e9-894a-97b8ac462381
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wp-plugin,wp,edb,wpscan,wordpress,xss
requests:
diff --git a/vulnerabilities/wordpress/wp-code-snippets-xss.yaml b/vulnerabilities/wordpress/wp-code-snippets-xss.yaml
index 0484b78dae..d1b41162c4 100644
--- a/vulnerabilities/wordpress/wp-code-snippets-xss.yaml
+++ b/vulnerabilities/wordpress/wp-code-snippets-xss.yaml
@@ -8,9 +8,9 @@ info:
reference:
- https://www.securify.nl/en/advisory/cross-site-scripting-in-code-snippets-wordpress-plugin/
classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
- cvss-score: 7.2
- cwe-id: CWE-79
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-80
tags: wordpress,xss,wp-plugin,authenticated
requests: