Dashboard Enhancements + Severity Matching (#5245)

Dashboard Enhancements + Severity Matching
patch-1
MostInterestingBotInTheWorld 2022-08-29 16:21:30 -04:00 committed by GitHub
parent 4447a831de
commit 36cf9b2f61
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
33 changed files with 45 additions and 58 deletions

View File

@ -3,7 +3,7 @@ id: CNVD-2020-23735
info: info:
name: Xxunchi CMS - Local File Inclusion name: Xxunchi CMS - Local File Inclusion
author: princechaddha author: princechaddha
severity: medium severity: high
description: Xunyou CMS is vulnerable to local file inclusion. Attackers can use vulnerabilities to obtain sensitive information. description: Xunyou CMS is vulnerable to local file inclusion. Attackers can use vulnerabilities to obtain sensitive information.
reference: reference:
- https://www.cnvd.org.cn/flaw/show/2025171 - https://www.cnvd.org.cn/flaw/show/2025171

View File

@ -3,7 +3,7 @@ id: CNVD-2021-30167
info: info:
name: UFIDA NC BeanShell Remote Command Execution name: UFIDA NC BeanShell Remote Command Execution
author: pikpikcu author: pikpikcu
severity: high severity: critical
description: UFIDA NC BeanShell contains a remote command execution vulnerability in the bsh.servlet.BshServlet program. description: UFIDA NC BeanShell contains a remote command execution vulnerability in the bsh.servlet.BshServlet program.
reference: reference:
- https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A - https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A

View File

@ -3,7 +3,7 @@ id: CVE-2014-8682
info: info:
name: Gogs (Go Git Service) - SQL Injection name: Gogs (Go Git Service) - SQL Injection
author: dhiyaneshDK,daffainfo author: dhiyaneshDK,daffainfo
severity: high severity: critical
description: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go. description: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
reference: reference:
- https://nvd.nist.gov/vuln/detail/CVE-2014-8682 - https://nvd.nist.gov/vuln/detail/CVE-2014-8682

View File

@ -3,7 +3,7 @@ id: CVE-2021-25075
info: info:
name: WordPress Duplicate Page or Post <1.5.1 - Cross-Site Scripting name: WordPress Duplicate Page or Post <1.5.1 - Cross-Site Scripting
author: DhiyaneshDK author: DhiyaneshDK
severity: low severity: high
description: | description: |
WordPress Duplicate Page or Post plugin before 1.5.1 contains a stored cross-site scripting vulnerability. The plugin does not have any authorization and has a flawed cross-site request forgery check in the wpdevart_duplicate_post_parametrs_save_in_db AJAX action, allowing unauthenticated users to call it and change the plugin's settings, or perform such attack via cross-site request forgery. WordPress Duplicate Page or Post plugin before 1.5.1 contains a stored cross-site scripting vulnerability. The plugin does not have any authorization and has a flawed cross-site request forgery check in the wpdevart_duplicate_post_parametrs_save_in_db AJAX action, allowing unauthenticated users to call it and change the plugin's settings, or perform such attack via cross-site request forgery.
remediation: Fixed in version 1.5.1. remediation: Fixed in version 1.5.1.
@ -12,10 +12,9 @@ info:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25075 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25075
- https://nvd.nist.gov/vuln/detail/CVE-2021-25075 - https://nvd.nist.gov/vuln/detail/CVE-2021-25075
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 3.50 cvss-score: 7.2
cve-id: CVE-2021-25075 cwe-id: CWE-79
cwe-id: CWE-862
tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,authenticated tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,authenticated
requests: requests:

View File

@ -3,7 +3,7 @@ id: minio-default-login
info: info:
name: Minio Default Login name: Minio Default Login
author: pikpikcu author: pikpikcu
severity: medium severity: high
description: Minio default admin credentials were discovered. description: Minio default admin credentials were discovered.
reference: reference:
- https://docs.min.io/docs/minio-quickstart-guide.html# - https://docs.min.io/docs/minio-quickstart-guide.html#

View File

@ -3,7 +3,7 @@ id: ofbiz-default-login
info: info:
name: Apache OfBiz Default Login name: Apache OfBiz Default Login
author: pdteam author: pdteam
severity: medium severity: high
description: Apache OfBiz default admin credentials were discovered. description: Apache OfBiz default admin credentials were discovered.
reference: reference:
- https://cwiki.apache.org/confluence/display/OFBIZ/Apache+OFBiz+Technical+Production+Setup+Guide - https://cwiki.apache.org/confluence/display/OFBIZ/Apache+OFBiz+Technical+Production+Setup+Guide

View File

@ -8,9 +8,8 @@ info:
reference: reference:
- https://airflow.apache.org/docs/apache-airflow/stable/security/webserver.html - https://airflow.apache.org/docs/apache-airflow/stable/security/webserver.html
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 0.0
cvss-score: 8.3 cwe-id: CWE-668
cwe-id: CWE-522
metadata: metadata:
shodan-query: title:"Sign In - Airflow" shodan-query: title:"Sign In - Airflow"
tags: panel,apache,airflow,admin tags: panel,apache,airflow,admin

View File

@ -3,12 +3,11 @@ id: ambari-exposure
info: info:
name: Apache Ambari Exposure Admin Login Panel name: Apache Ambari Exposure Admin Login Panel
author: pdteam author: pdteam
severity: medium severity: info
description: An Apache Ambari panel was discovered. description: An Apache Ambari panel was discovered.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 0.0
cvss-score: 5.3 cwe-id: CWE-668
cwe-id: CWE-200
tags: panel,apache,ambari,exposure tags: panel,apache,ambari,exposure
requests: requests:

View File

@ -8,9 +8,8 @@ info:
reference: reference:
- http://www.avantfax.com/ - http://www.avantfax.com/
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 0.0
cvss-score: 5.3 cwe-id: CWE-668
cwe-id: CWE-200
metadata: metadata:
shodan-query: http.title:"AvantFAX - Login" shodan-query: http.title:"AvantFAX - Login"
tags: panel,avantfax,login tags: panel,avantfax,login

View File

@ -3,12 +3,11 @@ id: codemeter-webadmin-panel
info: info:
name: CodeMeter - WebAdmin Panel Access name: CodeMeter - WebAdmin Panel Access
author: Techryptic (@Tech) author: Techryptic (@Tech)
severity: high severity: info
description: CodeMeter WebAdmin panel was accessed. description: CodeMeter WebAdmin panel was accessed.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 0.0
cvss-score: 5.3 cwe-id: CWE-668
cwe-id: CWE-200
tags: codemeter,webadmin,panel tags: codemeter,webadmin,panel
requests: requests:

View File

@ -3,16 +3,14 @@ id: epson-access-detect
info: info:
name: Epson Device Unauthorized Access Detect name: Epson Device Unauthorized Access Detect
author: pussycat0x author: pussycat0x
severity: medium severity: info
description: A publicly available Epson device panel (printer, scanner, etc.) was detected. description: A publicly available Epson device panel (printer, scanner, etc.) was detected.
reference: reference:
- https://www.exploit-db.com/ghdb/6922 - https://www.exploit-db.com/ghdb/6922
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N cvss-score: 0.0
cvss-score: 5.8 cwe-id: CWE-668
cwe-id: CWE-522
tags: iot,printer,panel,unauth,epson,edb tags: iot,printer,panel,unauth,epson,edb
requests: requests:
- method: GET - method: GET
path: path:

View File

@ -4,15 +4,13 @@ info:
name: Open Virtualization Userportal & Webadmin Panel Detection name: Open Virtualization Userportal & Webadmin Panel Detection
author: idealphase author: idealphase
severity: info severity: info
description: Open Virtualization Userportal & Webadmin panels were detected. Open Virtualization Manager is an open-source distributed virtualization solution designed to manage enterprise infrastructure. oVirt description: Open Virtualization Userportal & Webadmin panels were detected. Open Virtualization Manager is an open-source distributed virtualization solution designed to manage enterprise infrastructure. oVirt uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible.
uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible.
reference: reference:
- https://www.ovirt.org/ - https://www.ovirt.org/
- https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html - https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 0.0
cvss-score: 5.3 cwe-id: CWE-668
cwe-id: CWE-200
metadata: metadata:
shodan-query: title:"Ovirt-Engine" shodan-query: title:"Ovirt-Engine"
google-query: intitle:"Ovirt-Engine" google-query: intitle:"Ovirt-Engine"

View File

@ -12,7 +12,6 @@ info:
verified: true verified: true
shodan-query: product:"QNAP" shodan-query: product:"QNAP"
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0 cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
tags: panel,qnap,qts tags: panel,qnap,qts

View File

@ -3,12 +3,11 @@ id: sicom-mgrng-login
info: info:
name: Sicom MGRNG - Administrative Login Found name: Sicom MGRNG - Administrative Login Found
author: sullo author: sullo
severity: low severity: info
description: | description: |
Sicom MGRNG administrative login page found. Sicom MGRNG administrative login page found.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 0.0
cvss-score: 3.7
cwe-id: CWE-668 cwe-id: CWE-668
tags: sicom,mgrng,panel tags: sicom,mgrng,panel

View File

@ -12,9 +12,8 @@ info:
shodan-query: http.title:"Tenda 11N Wireless Router Login Screen" shodan-query: http.title:"Tenda 11N Wireless Router Login Screen"
google-query: intitle:"Tenda 11N Wireless Router Login Screen" google-query: intitle:"Tenda 11N Wireless Router Login Screen"
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0 cvss-score: 0.0
cwe-id: CWE-419 cwe-id: CWE-668
tags: panel,tenda tags: panel,tenda
requests: requests:

View File

@ -3,7 +3,7 @@ id: teamcity-guest-login-enabled
info: info:
name: JetBrains TeamCity - Guest User Access Enabled name: JetBrains TeamCity - Guest User Access Enabled
author: Ph33r author: Ph33r
severity: info severity: high
description: | description: |
TeamCity provides the ability to turn on the guest login allowing anonymous access to the TeamCity UI. TeamCity provides the ability to turn on the guest login allowing anonymous access to the TeamCity UI.
reference: reference:

View File

@ -6,7 +6,6 @@ info:
description: An elFinder implementation was discovered. description: An elFinder implementation was discovered.
severity: info severity: info
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0 cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
tags: tech,elfinder tags: tech,elfinder

View File

@ -3,7 +3,7 @@ id: ibm-infoprint-lfi
info: info:
name: IBM InfoPrint 4247-Z03 Impact Matrix Printer - Local File Inclusion name: IBM InfoPrint 4247-Z03 Impact Matrix Printer - Local File Inclusion
author: harshbothra_ author: harshbothra_
severity: medium severity: high
description: IBM InfoPrint 4247-Z03 Impact Matrix Printer is subject to local file inclusion. description: IBM InfoPrint 4247-Z03 Impact Matrix Printer is subject to local file inclusion.
reference: reference:
- https://www.exploit-db.com/exploits/47835 - https://www.exploit-db.com/exploits/47835

View File

@ -3,7 +3,7 @@ id: carel-bacnet-gateway-traversal
info: info:
name: Carel pCOWeb HVAC BACnet Gateway 2.1.0 - Local File Inclusion name: Carel pCOWeb HVAC BACnet Gateway 2.1.0 - Local File Inclusion
author: gy741 author: gy741
severity: medium severity: high
description: Carel pCOWeb HVAC BACnet Gateway 2.1.0 is vulnerable to local file inclusion because of input passed through the 'file' GET parameter through the 'logdownload.cgi' Bash script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks. description: Carel pCOWeb HVAC BACnet Gateway 2.1.0 is vulnerable to local file inclusion because of input passed through the 'file' GET parameter through the 'logdownload.cgi' Bash script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.
reference: reference:
- https://www.zeroscience.mk/codes/carelpco_dir.txt - https://www.zeroscience.mk/codes/carelpco_dir.txt

View File

@ -3,7 +3,7 @@ id: finereport-path-traversal
info: info:
name: FineReport 8.0 - Local File Inclusion name: FineReport 8.0 - Local File Inclusion
author: pikpikcu author: pikpikcu
severity: medium severity: high
description: FIneReport 8.0 is vulnerable to local file inclusion. description: FIneReport 8.0 is vulnerable to local file inclusion.
reference: reference:
- http://foreversong.cn/archives/1378 - http://foreversong.cn/archives/1378

View File

@ -3,7 +3,7 @@ id: geowebserver-xss
info: info:
name: GeoVision Geowebserver 5.3.3 - Cross-Site Scripting name: GeoVision Geowebserver 5.3.3 - Cross-Site Scripting
author: madrobot author: madrobot
severity: medium severity: high
description: GeoVision Geowebserver 5.3.3 and prior versions are vulnerable to several cross-site scripting / HTML injection / local file inclusion / XML injection / code execution vectors because the application fails to properly sanitize user requests. description: GeoVision Geowebserver 5.3.3 and prior versions are vulnerable to several cross-site scripting / HTML injection / local file inclusion / XML injection / code execution vectors because the application fails to properly sanitize user requests.
reference: reference:
- https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt - https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt

View File

@ -3,7 +3,7 @@ id: hjtcloud-rest-arbitrary-file-read
info: info:
name: HJTcloud - Local File Inclusion name: HJTcloud - Local File Inclusion
author: pikpikcu author: pikpikcu
severity: low severity: high
description: HJTcloud is vulnerable to local file inclusion. description: HJTcloud is vulnerable to local file inclusion.
reference: reference:
- https://mp.weixin.qq.com/s/w2pkj5ADN7b5uxe-wmfGbw - https://mp.weixin.qq.com/s/w2pkj5ADN7b5uxe-wmfGbw

View File

@ -3,7 +3,7 @@ id: kingdee-eas-directory-traversal
info: info:
name: Kingdee EAS - Local File Inclusion name: Kingdee EAS - Local File Inclusion
author: ritikchaddha author: ritikchaddha
severity: medium severity: high
description: Kingdee EAS OA server_file is vulnerable to local file inclusion and can allow attackers to obtain sensitive server information. description: Kingdee EAS OA server_file is vulnerable to local file inclusion and can allow attackers to obtain sensitive server information.
reference: reference:
- https://github.com/nu0l/poc-wiki/blob/main/%E9%87%91%E8%9D%B6OA%20server_file%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md - https://github.com/nu0l/poc-wiki/blob/main/%E9%87%91%E8%9D%B6OA%20server_file%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md

View File

@ -3,7 +3,7 @@ id: magicflow-lfi
info: info:
name: MagicFlow - Local File Inclusion name: MagicFlow - Local File Inclusion
author: gy741 author: gy741
severity: critical severity: high
description: | description: |
MagicFlow is susceptible to local file inclusion vulnerabilities because it allows remote unauthenticated users to access locally stored files on the server and return their content via the '/msa/main.xp' endpoint and the 'Fun' parameter. MagicFlow is susceptible to local file inclusion vulnerabilities because it allows remote unauthenticated users to access locally stored files on the server and return their content via the '/msa/main.xp' endpoint and the 'Fun' parameter.
reference: reference:

View File

@ -3,7 +3,7 @@ id: nginx-merge-slashes-path-traversal
info: info:
name: Nginx Server - Local File Inclusion name: Nginx Server - Local File Inclusion
author: dhiyaneshDk author: dhiyaneshDk
severity: medium severity: high
description: Nginx server is vulnerable to local file inclusion. description: Nginx server is vulnerable to local file inclusion.
reference: reference:
- https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json

View File

@ -3,7 +3,7 @@ id: pmb-directory-traversal
info: info:
name: PMB 5.6 - Local File Inclusion name: PMB 5.6 - Local File Inclusion
author: geeknik author: geeknik
severity: medium severity: high
description: PMB 5.6 is vulnerable to local file inclusion because the PMB Gif Image is not sanitizing the content of the 'chemin' parameter. description: PMB 5.6 is vulnerable to local file inclusion because the PMB Gif Image is not sanitizing the content of the 'chemin' parameter.
reference: reference:
- https://packetstormsecurity.com/files/160072/PMB-5.6-Local-File-Disclosure-Directory-Traversal.html - https://packetstormsecurity.com/files/160072/PMB-5.6-Local-File-Disclosure-Directory-Traversal.html

View File

@ -3,7 +3,7 @@ id: symantec-messaging-gateway
info: info:
name: Symantec Messaging Gateway <=10.6.1 - Local File Inclusion name: Symantec Messaging Gateway <=10.6.1 - Local File Inclusion
author: Random_Robbie author: Random_Robbie
severity: medium severity: high
description: Symantec Messaging Gateway 10.6.1 and prior are vulnerable to local file inclusion. description: Symantec Messaging Gateway 10.6.1 and prior are vulnerable to local file inclusion.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

View File

@ -3,7 +3,7 @@ id: unauth-spark-api
info: info:
name: Unauthenticated Spark REST API name: Unauthenticated Spark REST API
author: princechaddha author: princechaddha
severity: medium severity: critical
description: The Spark product's REST API interface allows access to unauthenticated users. description: The Spark product's REST API interface allows access to unauthenticated users.
reference: reference:
- https://xz.aliyun.com/t/2490 - https://xz.aliyun.com/t/2490

View File

@ -3,7 +3,7 @@ id: simple-crm-sql-injection
info: info:
name: Simple CRM 3.0 SQL Injection and Authentication Bypass name: Simple CRM 3.0 SQL Injection and Authentication Bypass
author: geeknik author: geeknik
severity: high severity: critical
description: Simple CRM 3.0 is susceptible to SQL injection and authentication bypass vulnerabilities. description: Simple CRM 3.0 is susceptible to SQL injection and authentication bypass vulnerabilities.
reference: reference:
- https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt - https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt

View File

@ -3,7 +3,7 @@ id: ecology-filedownload-directory-traversal
info: info:
name: Ecology - Local File Inclusion name: Ecology - Local File Inclusion
author: princechaddha author: princechaddha
severity: medium severity: high
description: Ecology is vulnerable to local file inclusion. description: Ecology is vulnerable to local file inclusion.
metadata: metadata:
fofa-query: app="泛微-协同办公OA" fofa-query: app="泛微-协同办公OA"

View File

@ -3,7 +3,7 @@ id: ecology-springframework-directory-traversal
info: info:
name: Ecology Springframework - Local File Inclusion name: Ecology Springframework - Local File Inclusion
author: princechaddha author: princechaddha
severity: medium severity: high
description: Ecology Springframework is vulnerable to local file inclusion. description: Ecology Springframework is vulnerable to local file inclusion.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

View File

@ -3,7 +3,7 @@ id: my-chatbot-xss
info: info:
name: WordPress My Chatbot <= 1.1 - Reflected Cross-Site Scripting name: WordPress My Chatbot <= 1.1 - Reflected Cross-Site Scripting
author: dhiyaneshDk author: dhiyaneshDk
severity: medium severity: high
description: WordPress My Chatbot <= 1.1 is susceptible to cross-site scripting. The plugin does not sanitize or escape its tab parameter in the Settings page before outputting it back in an attribute. description: WordPress My Chatbot <= 1.1 is susceptible to cross-site scripting. The plugin does not sanitize or escape its tab parameter in the Settings page before outputting it back in an attribute.
reference: reference:
- https://wpscan.com/vulnerability/c0b6f63b-95d1-4782-9554-975d6d7bbd3d - https://wpscan.com/vulnerability/c0b6f63b-95d1-4782-9554-975d6d7bbd3d

View File

@ -3,7 +3,7 @@ id: wp-socialfit-xss
info: info:
name: WordPress SocialFit - Cross-Site Scripting name: WordPress SocialFit - Cross-Site Scripting
author: daffainfo author: daffainfo
severity: medium severity: high
description: | description: |
WordPress SocialFit is vulnerable to a cross-site scripting vulnerability via the 'msg' parameter because it fails to properly sanitize user-supplied input. WordPress SocialFit is vulnerable to a cross-site scripting vulnerability via the 'msg' parameter because it fails to properly sanitize user-supplied input.
reference: reference: