From 33d664c86e5e1d831b8dce4d58dc853d08e26fa4 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 1 Mar 2022 12:08:46 -0500 Subject: [PATCH] Enhancement: cves/2010/CVE-2010-1717.yaml by mp --- cves/2010/CVE-2010-1717.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2010/CVE-2010-1717.yaml b/cves/2010/CVE-2010-1717.yaml index e72f52bc54..d65f97ddb5 100644 --- a/cves/2010/CVE-2010-1717.yaml +++ b/cves/2010/CVE-2010-1717.yaml @@ -1,16 +1,17 @@ id: CVE-2010-1717 + info: name: Joomla! Component iF surfALERT 1.2 - Local File Inclusion author: daffainfo severity: high description: A directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. - remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12291 - https://www.cvedetails.com/cve/CVE-2010-1717 tags: cve,cve2010,joomla,lfi classification: cve-id: CVE-2010-1717 + requests: - method: GET path: @@ -23,4 +24,5 @@ requests: - type: status status: - 200 -# Enhanced by mp on 2022/02/15 + +# Enhanced by mp on 2022/03/01