Dashboard Enhancements + Severity Matching (#5245)
Dashboard Enhancements + Severity Matchingpatch-1
parent
4447a831de
commit
36cf9b2f61
|
@ -3,7 +3,7 @@ id: CNVD-2020-23735
|
||||||
info:
|
info:
|
||||||
name: Xxunchi CMS - Local File Inclusion
|
name: Xxunchi CMS - Local File Inclusion
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: medium
|
severity: high
|
||||||
description: Xunyou CMS is vulnerable to local file inclusion. Attackers can use vulnerabilities to obtain sensitive information.
|
description: Xunyou CMS is vulnerable to local file inclusion. Attackers can use vulnerabilities to obtain sensitive information.
|
||||||
reference:
|
reference:
|
||||||
- https://www.cnvd.org.cn/flaw/show/2025171
|
- https://www.cnvd.org.cn/flaw/show/2025171
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: CNVD-2021-30167
|
||||||
info:
|
info:
|
||||||
name: UFIDA NC BeanShell Remote Command Execution
|
name: UFIDA NC BeanShell Remote Command Execution
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: critical
|
||||||
description: UFIDA NC BeanShell contains a remote command execution vulnerability in the bsh.servlet.BshServlet program.
|
description: UFIDA NC BeanShell contains a remote command execution vulnerability in the bsh.servlet.BshServlet program.
|
||||||
reference:
|
reference:
|
||||||
- https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A
|
- https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: CVE-2014-8682
|
||||||
info:
|
info:
|
||||||
name: Gogs (Go Git Service) - SQL Injection
|
name: Gogs (Go Git Service) - SQL Injection
|
||||||
author: dhiyaneshDK,daffainfo
|
author: dhiyaneshDK,daffainfo
|
||||||
severity: high
|
severity: critical
|
||||||
description: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
|
description: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
|
||||||
reference:
|
reference:
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2014-8682
|
- https://nvd.nist.gov/vuln/detail/CVE-2014-8682
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: CVE-2021-25075
|
||||||
info:
|
info:
|
||||||
name: WordPress Duplicate Page or Post <1.5.1 - Cross-Site Scripting
|
name: WordPress Duplicate Page or Post <1.5.1 - Cross-Site Scripting
|
||||||
author: DhiyaneshDK
|
author: DhiyaneshDK
|
||||||
severity: low
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
WordPress Duplicate Page or Post plugin before 1.5.1 contains a stored cross-site scripting vulnerability. The plugin does not have any authorization and has a flawed cross-site request forgery check in the wpdevart_duplicate_post_parametrs_save_in_db AJAX action, allowing unauthenticated users to call it and change the plugin's settings, or perform such attack via cross-site request forgery.
|
WordPress Duplicate Page or Post plugin before 1.5.1 contains a stored cross-site scripting vulnerability. The plugin does not have any authorization and has a flawed cross-site request forgery check in the wpdevart_duplicate_post_parametrs_save_in_db AJAX action, allowing unauthenticated users to call it and change the plugin's settings, or perform such attack via cross-site request forgery.
|
||||||
remediation: Fixed in version 1.5.1.
|
remediation: Fixed in version 1.5.1.
|
||||||
|
@ -12,10 +12,9 @@ info:
|
||||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25075
|
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25075
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-25075
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-25075
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||||
cvss-score: 3.50
|
cvss-score: 7.2
|
||||||
cve-id: CVE-2021-25075
|
cwe-id: CWE-79
|
||||||
cwe-id: CWE-862
|
|
||||||
tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,authenticated
|
tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,authenticated
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: minio-default-login
|
||||||
info:
|
info:
|
||||||
name: Minio Default Login
|
name: Minio Default Login
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: medium
|
severity: high
|
||||||
description: Minio default admin credentials were discovered.
|
description: Minio default admin credentials were discovered.
|
||||||
reference:
|
reference:
|
||||||
- https://docs.min.io/docs/minio-quickstart-guide.html#
|
- https://docs.min.io/docs/minio-quickstart-guide.html#
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: ofbiz-default-login
|
||||||
info:
|
info:
|
||||||
name: Apache OfBiz Default Login
|
name: Apache OfBiz Default Login
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: medium
|
severity: high
|
||||||
description: Apache OfBiz default admin credentials were discovered.
|
description: Apache OfBiz default admin credentials were discovered.
|
||||||
reference:
|
reference:
|
||||||
- https://cwiki.apache.org/confluence/display/OFBIZ/Apache+OFBiz+Technical+Production+Setup+Guide
|
- https://cwiki.apache.org/confluence/display/OFBIZ/Apache+OFBiz+Technical+Production+Setup+Guide
|
||||||
|
|
|
@ -8,9 +8,8 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://airflow.apache.org/docs/apache-airflow/stable/security/webserver.html
|
- https://airflow.apache.org/docs/apache-airflow/stable/security/webserver.html
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
cvss-score: 0.0
|
||||||
cvss-score: 8.3
|
cwe-id: CWE-668
|
||||||
cwe-id: CWE-522
|
|
||||||
metadata:
|
metadata:
|
||||||
shodan-query: title:"Sign In - Airflow"
|
shodan-query: title:"Sign In - Airflow"
|
||||||
tags: panel,apache,airflow,admin
|
tags: panel,apache,airflow,admin
|
||||||
|
|
|
@ -3,12 +3,11 @@ id: ambari-exposure
|
||||||
info:
|
info:
|
||||||
name: Apache Ambari Exposure Admin Login Panel
|
name: Apache Ambari Exposure Admin Login Panel
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: medium
|
severity: info
|
||||||
description: An Apache Ambari panel was discovered.
|
description: An Apache Ambari panel was discovered.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
cvss-score: 0.0
|
||||||
cvss-score: 5.3
|
cwe-id: CWE-668
|
||||||
cwe-id: CWE-200
|
|
||||||
tags: panel,apache,ambari,exposure
|
tags: panel,apache,ambari,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -8,9 +8,8 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- http://www.avantfax.com/
|
- http://www.avantfax.com/
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
cvss-score: 0.0
|
||||||
cvss-score: 5.3
|
cwe-id: CWE-668
|
||||||
cwe-id: CWE-200
|
|
||||||
metadata:
|
metadata:
|
||||||
shodan-query: http.title:"AvantFAX - Login"
|
shodan-query: http.title:"AvantFAX - Login"
|
||||||
tags: panel,avantfax,login
|
tags: panel,avantfax,login
|
||||||
|
|
|
@ -3,12 +3,11 @@ id: codemeter-webadmin-panel
|
||||||
info:
|
info:
|
||||||
name: CodeMeter - WebAdmin Panel Access
|
name: CodeMeter - WebAdmin Panel Access
|
||||||
author: Techryptic (@Tech)
|
author: Techryptic (@Tech)
|
||||||
severity: high
|
severity: info
|
||||||
description: CodeMeter WebAdmin panel was accessed.
|
description: CodeMeter WebAdmin panel was accessed.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
cvss-score: 0.0
|
||||||
cvss-score: 5.3
|
cwe-id: CWE-668
|
||||||
cwe-id: CWE-200
|
|
||||||
tags: codemeter,webadmin,panel
|
tags: codemeter,webadmin,panel
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -3,16 +3,14 @@ id: epson-access-detect
|
||||||
info:
|
info:
|
||||||
name: Epson Device Unauthorized Access Detect
|
name: Epson Device Unauthorized Access Detect
|
||||||
author: pussycat0x
|
author: pussycat0x
|
||||||
severity: medium
|
severity: info
|
||||||
description: A publicly available Epson device panel (printer, scanner, etc.) was detected.
|
description: A publicly available Epson device panel (printer, scanner, etc.) was detected.
|
||||||
reference:
|
reference:
|
||||||
- https://www.exploit-db.com/ghdb/6922
|
- https://www.exploit-db.com/ghdb/6922
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
|
cvss-score: 0.0
|
||||||
cvss-score: 5.8
|
cwe-id: CWE-668
|
||||||
cwe-id: CWE-522
|
|
||||||
tags: iot,printer,panel,unauth,epson,edb
|
tags: iot,printer,panel,unauth,epson,edb
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
path:
|
path:
|
||||||
|
|
|
@ -4,15 +4,13 @@ info:
|
||||||
name: Open Virtualization Userportal & Webadmin Panel Detection
|
name: Open Virtualization Userportal & Webadmin Panel Detection
|
||||||
author: idealphase
|
author: idealphase
|
||||||
severity: info
|
severity: info
|
||||||
description: Open Virtualization Userportal & Webadmin panels were detected. Open Virtualization Manager is an open-source distributed virtualization solution designed to manage enterprise infrastructure. oVirt
|
description: Open Virtualization Userportal & Webadmin panels were detected. Open Virtualization Manager is an open-source distributed virtualization solution designed to manage enterprise infrastructure. oVirt uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible.
|
||||||
uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible.
|
|
||||||
reference:
|
reference:
|
||||||
- https://www.ovirt.org/
|
- https://www.ovirt.org/
|
||||||
- https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html
|
- https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
cvss-score: 0.0
|
||||||
cvss-score: 5.3
|
cwe-id: CWE-668
|
||||||
cwe-id: CWE-200
|
|
||||||
metadata:
|
metadata:
|
||||||
shodan-query: title:"Ovirt-Engine"
|
shodan-query: title:"Ovirt-Engine"
|
||||||
google-query: intitle:"Ovirt-Engine"
|
google-query: intitle:"Ovirt-Engine"
|
||||||
|
|
|
@ -12,7 +12,6 @@ info:
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: product:"QNAP"
|
shodan-query: product:"QNAP"
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
|
||||||
cvss-score: 0.0
|
cvss-score: 0.0
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
tags: panel,qnap,qts
|
tags: panel,qnap,qts
|
||||||
|
|
|
@ -3,12 +3,11 @@ id: sicom-mgrng-login
|
||||||
info:
|
info:
|
||||||
name: Sicom MGRNG - Administrative Login Found
|
name: Sicom MGRNG - Administrative Login Found
|
||||||
author: sullo
|
author: sullo
|
||||||
severity: low
|
severity: info
|
||||||
description: |
|
description: |
|
||||||
Sicom MGRNG administrative login page found.
|
Sicom MGRNG administrative login page found.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
|
cvss-score: 0.0
|
||||||
cvss-score: 3.7
|
|
||||||
cwe-id: CWE-668
|
cwe-id: CWE-668
|
||||||
tags: sicom,mgrng,panel
|
tags: sicom,mgrng,panel
|
||||||
|
|
||||||
|
|
|
@ -12,9 +12,8 @@ info:
|
||||||
shodan-query: http.title:"Tenda 11N Wireless Router Login Screen"
|
shodan-query: http.title:"Tenda 11N Wireless Router Login Screen"
|
||||||
google-query: intitle:"Tenda 11N Wireless Router Login Screen"
|
google-query: intitle:"Tenda 11N Wireless Router Login Screen"
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
|
||||||
cvss-score: 0.0
|
cvss-score: 0.0
|
||||||
cwe-id: CWE-419
|
cwe-id: CWE-668
|
||||||
tags: panel,tenda
|
tags: panel,tenda
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: teamcity-guest-login-enabled
|
||||||
info:
|
info:
|
||||||
name: JetBrains TeamCity - Guest User Access Enabled
|
name: JetBrains TeamCity - Guest User Access Enabled
|
||||||
author: Ph33r
|
author: Ph33r
|
||||||
severity: info
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
TeamCity provides the ability to turn on the guest login allowing anonymous access to the TeamCity UI.
|
TeamCity provides the ability to turn on the guest login allowing anonymous access to the TeamCity UI.
|
||||||
reference:
|
reference:
|
||||||
|
|
|
@ -6,7 +6,6 @@ info:
|
||||||
description: An elFinder implementation was discovered.
|
description: An elFinder implementation was discovered.
|
||||||
severity: info
|
severity: info
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
|
||||||
cvss-score: 0.0
|
cvss-score: 0.0
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
tags: tech,elfinder
|
tags: tech,elfinder
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: ibm-infoprint-lfi
|
||||||
info:
|
info:
|
||||||
name: IBM InfoPrint 4247-Z03 Impact Matrix Printer - Local File Inclusion
|
name: IBM InfoPrint 4247-Z03 Impact Matrix Printer - Local File Inclusion
|
||||||
author: harshbothra_
|
author: harshbothra_
|
||||||
severity: medium
|
severity: high
|
||||||
description: IBM InfoPrint 4247-Z03 Impact Matrix Printer is subject to local file inclusion.
|
description: IBM InfoPrint 4247-Z03 Impact Matrix Printer is subject to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://www.exploit-db.com/exploits/47835
|
- https://www.exploit-db.com/exploits/47835
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: carel-bacnet-gateway-traversal
|
||||||
info:
|
info:
|
||||||
name: Carel pCOWeb HVAC BACnet Gateway 2.1.0 - Local File Inclusion
|
name: Carel pCOWeb HVAC BACnet Gateway 2.1.0 - Local File Inclusion
|
||||||
author: gy741
|
author: gy741
|
||||||
severity: medium
|
severity: high
|
||||||
description: Carel pCOWeb HVAC BACnet Gateway 2.1.0 is vulnerable to local file inclusion because of input passed through the 'file' GET parameter through the 'logdownload.cgi' Bash script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.
|
description: Carel pCOWeb HVAC BACnet Gateway 2.1.0 is vulnerable to local file inclusion because of input passed through the 'file' GET parameter through the 'logdownload.cgi' Bash script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.
|
||||||
reference:
|
reference:
|
||||||
- https://www.zeroscience.mk/codes/carelpco_dir.txt
|
- https://www.zeroscience.mk/codes/carelpco_dir.txt
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: finereport-path-traversal
|
||||||
info:
|
info:
|
||||||
name: FineReport 8.0 - Local File Inclusion
|
name: FineReport 8.0 - Local File Inclusion
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: medium
|
severity: high
|
||||||
description: FIneReport 8.0 is vulnerable to local file inclusion.
|
description: FIneReport 8.0 is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- http://foreversong.cn/archives/1378
|
- http://foreversong.cn/archives/1378
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: geowebserver-xss
|
||||||
info:
|
info:
|
||||||
name: GeoVision Geowebserver 5.3.3 - Cross-Site Scripting
|
name: GeoVision Geowebserver 5.3.3 - Cross-Site Scripting
|
||||||
author: madrobot
|
author: madrobot
|
||||||
severity: medium
|
severity: high
|
||||||
description: GeoVision Geowebserver 5.3.3 and prior versions are vulnerable to several cross-site scripting / HTML injection / local file inclusion / XML injection / code execution vectors because the application fails to properly sanitize user requests.
|
description: GeoVision Geowebserver 5.3.3 and prior versions are vulnerable to several cross-site scripting / HTML injection / local file inclusion / XML injection / code execution vectors because the application fails to properly sanitize user requests.
|
||||||
reference:
|
reference:
|
||||||
- https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt
|
- https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: hjtcloud-rest-arbitrary-file-read
|
||||||
info:
|
info:
|
||||||
name: HJTcloud - Local File Inclusion
|
name: HJTcloud - Local File Inclusion
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: low
|
severity: high
|
||||||
description: HJTcloud is vulnerable to local file inclusion.
|
description: HJTcloud is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://mp.weixin.qq.com/s/w2pkj5ADN7b5uxe-wmfGbw
|
- https://mp.weixin.qq.com/s/w2pkj5ADN7b5uxe-wmfGbw
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: kingdee-eas-directory-traversal
|
||||||
info:
|
info:
|
||||||
name: Kingdee EAS - Local File Inclusion
|
name: Kingdee EAS - Local File Inclusion
|
||||||
author: ritikchaddha
|
author: ritikchaddha
|
||||||
severity: medium
|
severity: high
|
||||||
description: Kingdee EAS OA server_file is vulnerable to local file inclusion and can allow attackers to obtain sensitive server information.
|
description: Kingdee EAS OA server_file is vulnerable to local file inclusion and can allow attackers to obtain sensitive server information.
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/nu0l/poc-wiki/blob/main/%E9%87%91%E8%9D%B6OA%20server_file%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
|
- https://github.com/nu0l/poc-wiki/blob/main/%E9%87%91%E8%9D%B6OA%20server_file%20%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E.md
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: magicflow-lfi
|
||||||
info:
|
info:
|
||||||
name: MagicFlow - Local File Inclusion
|
name: MagicFlow - Local File Inclusion
|
||||||
author: gy741
|
author: gy741
|
||||||
severity: critical
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
MagicFlow is susceptible to local file inclusion vulnerabilities because it allows remote unauthenticated users to access locally stored files on the server and return their content via the '/msa/main.xp' endpoint and the 'Fun' parameter.
|
MagicFlow is susceptible to local file inclusion vulnerabilities because it allows remote unauthenticated users to access locally stored files on the server and return their content via the '/msa/main.xp' endpoint and the 'Fun' parameter.
|
||||||
reference:
|
reference:
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: nginx-merge-slashes-path-traversal
|
||||||
info:
|
info:
|
||||||
name: Nginx Server - Local File Inclusion
|
name: Nginx Server - Local File Inclusion
|
||||||
author: dhiyaneshDk
|
author: dhiyaneshDk
|
||||||
severity: medium
|
severity: high
|
||||||
description: Nginx server is vulnerable to local file inclusion.
|
description: Nginx server is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json
|
- https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: pmb-directory-traversal
|
||||||
info:
|
info:
|
||||||
name: PMB 5.6 - Local File Inclusion
|
name: PMB 5.6 - Local File Inclusion
|
||||||
author: geeknik
|
author: geeknik
|
||||||
severity: medium
|
severity: high
|
||||||
description: PMB 5.6 is vulnerable to local file inclusion because the PMB Gif Image is not sanitizing the content of the 'chemin' parameter.
|
description: PMB 5.6 is vulnerable to local file inclusion because the PMB Gif Image is not sanitizing the content of the 'chemin' parameter.
|
||||||
reference:
|
reference:
|
||||||
- https://packetstormsecurity.com/files/160072/PMB-5.6-Local-File-Disclosure-Directory-Traversal.html
|
- https://packetstormsecurity.com/files/160072/PMB-5.6-Local-File-Disclosure-Directory-Traversal.html
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: symantec-messaging-gateway
|
||||||
info:
|
info:
|
||||||
name: Symantec Messaging Gateway <=10.6.1 - Local File Inclusion
|
name: Symantec Messaging Gateway <=10.6.1 - Local File Inclusion
|
||||||
author: Random_Robbie
|
author: Random_Robbie
|
||||||
severity: medium
|
severity: high
|
||||||
description: Symantec Messaging Gateway 10.6.1 and prior are vulnerable to local file inclusion.
|
description: Symantec Messaging Gateway 10.6.1 and prior are vulnerable to local file inclusion.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: unauth-spark-api
|
||||||
info:
|
info:
|
||||||
name: Unauthenticated Spark REST API
|
name: Unauthenticated Spark REST API
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: medium
|
severity: critical
|
||||||
description: The Spark product's REST API interface allows access to unauthenticated users.
|
description: The Spark product's REST API interface allows access to unauthenticated users.
|
||||||
reference:
|
reference:
|
||||||
- https://xz.aliyun.com/t/2490
|
- https://xz.aliyun.com/t/2490
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: simple-crm-sql-injection
|
||||||
info:
|
info:
|
||||||
name: Simple CRM 3.0 SQL Injection and Authentication Bypass
|
name: Simple CRM 3.0 SQL Injection and Authentication Bypass
|
||||||
author: geeknik
|
author: geeknik
|
||||||
severity: high
|
severity: critical
|
||||||
description: Simple CRM 3.0 is susceptible to SQL injection and authentication bypass vulnerabilities.
|
description: Simple CRM 3.0 is susceptible to SQL injection and authentication bypass vulnerabilities.
|
||||||
reference:
|
reference:
|
||||||
- https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt
|
- https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: ecology-filedownload-directory-traversal
|
||||||
info:
|
info:
|
||||||
name: Ecology - Local File Inclusion
|
name: Ecology - Local File Inclusion
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: medium
|
severity: high
|
||||||
description: Ecology is vulnerable to local file inclusion.
|
description: Ecology is vulnerable to local file inclusion.
|
||||||
metadata:
|
metadata:
|
||||||
fofa-query: app="泛微-协同办公OA"
|
fofa-query: app="泛微-协同办公OA"
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: ecology-springframework-directory-traversal
|
||||||
info:
|
info:
|
||||||
name: Ecology Springframework - Local File Inclusion
|
name: Ecology Springframework - Local File Inclusion
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: medium
|
severity: high
|
||||||
description: Ecology Springframework is vulnerable to local file inclusion.
|
description: Ecology Springframework is vulnerable to local file inclusion.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: my-chatbot-xss
|
||||||
info:
|
info:
|
||||||
name: WordPress My Chatbot <= 1.1 - Reflected Cross-Site Scripting
|
name: WordPress My Chatbot <= 1.1 - Reflected Cross-Site Scripting
|
||||||
author: dhiyaneshDk
|
author: dhiyaneshDk
|
||||||
severity: medium
|
severity: high
|
||||||
description: WordPress My Chatbot <= 1.1 is susceptible to cross-site scripting. The plugin does not sanitize or escape its tab parameter in the Settings page before outputting it back in an attribute.
|
description: WordPress My Chatbot <= 1.1 is susceptible to cross-site scripting. The plugin does not sanitize or escape its tab parameter in the Settings page before outputting it back in an attribute.
|
||||||
reference:
|
reference:
|
||||||
- https://wpscan.com/vulnerability/c0b6f63b-95d1-4782-9554-975d6d7bbd3d
|
- https://wpscan.com/vulnerability/c0b6f63b-95d1-4782-9554-975d6d7bbd3d
|
||||||
|
|
|
@ -3,7 +3,7 @@ id: wp-socialfit-xss
|
||||||
info:
|
info:
|
||||||
name: WordPress SocialFit - Cross-Site Scripting
|
name: WordPress SocialFit - Cross-Site Scripting
|
||||||
author: daffainfo
|
author: daffainfo
|
||||||
severity: medium
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
WordPress SocialFit is vulnerable to a cross-site scripting vulnerability via the 'msg' parameter because it fails to properly sanitize user-supplied input.
|
WordPress SocialFit is vulnerable to a cross-site scripting vulnerability via the 'msg' parameter because it fails to properly sanitize user-supplied input.
|
||||||
reference:
|
reference:
|
||||||
|
|
Loading…
Reference in New Issue