Rename "references" to "reference" to match the expected template info structure
Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84patch-1
parent
a6068214ac
commit
4c920b2552
|
@ -9,7 +9,7 @@ info:
|
||||||
found in ZeroShell 3.9.0 in the "/cgi-bin/kerbynet" url.
|
found in ZeroShell 3.9.0 in the "/cgi-bin/kerbynet" url.
|
||||||
As sudo is configured to execute /bin/tar without a password (NOPASSWD)
|
As sudo is configured to execute /bin/tar without a password (NOPASSWD)
|
||||||
it is possible to run root commands using the "checkpoint" tar options.
|
it is possible to run root commands using the "checkpoint" tar options.
|
||||||
references: |
|
reference: |
|
||||||
- https://www.tarlogic.com/advisories/zeroshell-rce-root.txt
|
- https://www.tarlogic.com/advisories/zeroshell-rce-root.txt
|
||||||
- https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2019-12725/ZeroShell-RCE-EoP.py
|
- https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2019-12725/ZeroShell-RCE-EoP.py
|
||||||
tags: cve,cve2019,rce
|
tags: cve,cve2019,rce
|
||||||
|
|
|
@ -11,8 +11,7 @@ info:
|
||||||
before 2.2.5 for WordPress allows unauthenticated options import,
|
before 2.2.5 for WordPress allows unauthenticated options import,
|
||||||
as demonstrated by storing an XSS payload for remote code execution.
|
as demonstrated by storing an XSS payload for remote code execution.
|
||||||
|
|
||||||
Source/References:
|
reference: https://github.com/GeneralEG/CVE-2019-15858
|
||||||
- https://github.com/GeneralEG/CVE-2019-15858
|
|
||||||
tags: cve,cve2019,wordpress,wp-plugin,xss
|
tags: cve,cve2019,wordpress,wp-plugin,xss
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: dwisiswant0
|
author: dwisiswant0
|
||||||
severity: medium
|
severity: medium
|
||||||
description: A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field).
|
description: A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field).
|
||||||
references: https://github.com/graphpaperpress/Sell-Media/commit/8ac8cebf332e0885863d0a25e16b4b180abedc47#diff-f16fea0a0c8cc36031ec339d02a4fb3b
|
reference: https://github.com/graphpaperpress/Sell-Media/commit/8ac8cebf332e0885863d0a25e16b4b180abedc47#diff-f16fea0a0c8cc36031ec339d02a4fb3b
|
||||||
tags: cve,cve2019,wordpress,wp-plugin,xss
|
tags: cve,cve2019,wordpress,wp-plugin,xss
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: critical
|
severity: critical
|
||||||
description: Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
|
description: Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
|
||||||
tags: cve,cve2020
|
tags: cve,cve2020
|
||||||
references: https://blog.max0x4141.com/post/artica_proxy/
|
reference: https://blog.max0x4141.com/post/artica_proxy/
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -17,8 +17,7 @@ info:
|
||||||
Successful attacks of this vulnerability can result
|
Successful attacks of this vulnerability can result
|
||||||
in takeover of Oracle WebLogic Server.
|
in takeover of Oracle WebLogic Server.
|
||||||
|
|
||||||
Source/References:
|
reference: https://github.com/hktalent/CVE-2020-2551
|
||||||
- https://github.com/hktalent/CVE-2020-2551
|
|
||||||
tags: cve,cve2020,oracle,weblogic,rce
|
tags: cve,cve2020,oracle,weblogic,rce
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -8,7 +8,7 @@ info:
|
||||||
SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP,
|
SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP,
|
||||||
SVN, and GitLab credentials via the api/settings/values URI.
|
SVN, and GitLab credentials via the api/settings/values URI.
|
||||||
NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it."
|
NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it."
|
||||||
references: https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/
|
reference: https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/
|
||||||
tags: cve,cve2020,sonarqube
|
tags: cve,cve2020,sonarqube
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -10,7 +10,7 @@ info:
|
||||||
A remote attacker could exploit this vulnerability to expose
|
A remote attacker could exploit this vulnerability to expose
|
||||||
sensitive information or consume memory resources.
|
sensitive information or consume memory resources.
|
||||||
|
|
||||||
references: |
|
reference: |
|
||||||
- https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-asset-management-vulnerable-information-disclosure-cve-2020-4463
|
- https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-asset-management-vulnerable-information-disclosure-cve-2020-4463
|
||||||
- https://github.com/Ibonok/CVE-2020-4463
|
- https://github.com/Ibonok/CVE-2020-4463
|
||||||
tags: cve,cve2020,ibm,xxe
|
tags: cve,cve2020,ibm,xxe
|
||||||
|
|
|
@ -10,7 +10,7 @@ info:
|
||||||
script or HTML via multiple parameters where the administrator's entries
|
script or HTML via multiple parameters where the administrator's entries
|
||||||
were not correctly sanitized.
|
were not correctly sanitized.
|
||||||
|
|
||||||
References:
|
reference:
|
||||||
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
||||||
tags: cve,cve2020,xss
|
tags: cve,cve2020,xss
|
||||||
|
|
||||||
|
|
|
@ -9,7 +9,7 @@ info:
|
||||||
Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10
|
Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10
|
||||||
before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files.
|
before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files.
|
||||||
|
|
||||||
References:
|
reference:
|
||||||
- https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/
|
- https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/
|
||||||
tags: cve,cve2020,citrix,lfi
|
tags: cve,cve2020,citrix,lfi
|
||||||
|
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: Ganofins
|
author: Ganofins
|
||||||
severity: medium
|
severity: medium
|
||||||
description: JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard.
|
description: JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard.
|
||||||
references: |
|
reference: |
|
||||||
- https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585
|
- https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585
|
||||||
- https://wordpress.org/plugins/jh-404-logger/
|
- https://wordpress.org/plugins/jh-404-logger/
|
||||||
tags: cve,cve2021,wordpress,wp-plugin,xss
|
tags: cve,cve2021,wordpress,wp-plugin,xss
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Shoppable Service Auth Token
|
name: Shoppable Service Auth Token
|
||||||
author: philippedelteil
|
author: philippedelteil
|
||||||
severity: info
|
severity: info
|
||||||
references: https://ask.shoppable.com/knowledge/quick-start-api-guide
|
reference: https://ask.shoppable.com/knowledge/quick-start-api-guide
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects bolt CMS
|
description: Detects bolt CMS
|
||||||
tags: tech,bolt,cms
|
tags: tech,bolt,cms
|
||||||
references:
|
reference:
|
||||||
- https://github.com/bolt/bolt
|
- https://github.com/bolt/bolt
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects BookStack
|
description: Detects BookStack
|
||||||
tags: tech,bookstack
|
tags: tech,bookstack
|
||||||
references: https://github.com/BookStackApp/BookStack
|
reference: https://github.com/BookStackApp/BookStack
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects Grav CMS
|
description: Detects Grav CMS
|
||||||
tags: tech,grav,cms
|
tags: tech,grav,cms
|
||||||
references: https://github.com/getgrav/grav
|
reference: https://github.com/getgrav/grav
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects Mautic CRM
|
description: Detects Mautic CRM
|
||||||
tags: tech,mautic,crm
|
tags: tech,mautic,crm
|
||||||
references:
|
reference:
|
||||||
- https://github.com/mautic/mautic
|
- https://github.com/mautic/mautic
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects MoinMoin Wiki
|
description: Detects MoinMoin Wiki
|
||||||
tags: tech,moin,moinmoin,wiki
|
tags: tech,moin,moinmoin,wiki
|
||||||
references:
|
reference:
|
||||||
- https://github.com/moinwiki/moin-1.9
|
- https://github.com/moinwiki/moin-1.9
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects OctoberCMS
|
description: Detects OctoberCMS
|
||||||
tags: tech,octobercms
|
tags: tech,octobercms
|
||||||
references: https://github.com/octobercms/october
|
reference: https://github.com/octobercms/october
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects Opencast
|
description: Detects Opencast
|
||||||
tags: tech,opencast
|
tags: tech,opencast
|
||||||
references:
|
reference:
|
||||||
- https://github.com/opencast/opencast
|
- https://github.com/opencast/opencast
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects Plone CMS
|
description: Detects Plone CMS
|
||||||
tags: tech,plone,cms
|
tags: tech,plone,cms
|
||||||
references:
|
reference:
|
||||||
- https://github.com/plone/Products.CMFPlone
|
- https://github.com/plone/Products.CMFPlone
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects Rhymix CMS
|
description: Detects Rhymix CMS
|
||||||
tags: tech,rhymix
|
tags: tech,rhymix
|
||||||
references: https://github.com/rhymix/rhymix
|
reference: https://github.com/rhymix/rhymix
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects Shopware CMS
|
description: Detects Shopware CMS
|
||||||
tags: tech,shopware,cms
|
tags: tech,shopware,cms
|
||||||
references:
|
reference:
|
||||||
- https://github.com/shopware/shopware
|
- https://github.com/shopware/shopware
|
||||||
- https://github.com/shopware/platform
|
- https://github.com/shopware/platform
|
||||||
|
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects strapi CMS
|
description: Detects strapi CMS
|
||||||
tags: tech,strapi,cms
|
tags: tech,strapi,cms
|
||||||
references:
|
reference:
|
||||||
- https://github.com/strapi/strapi
|
- https://github.com/strapi/strapi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Detects wazuh
|
description: Detects wazuh
|
||||||
tags: tech,wazuh
|
tags: tech,wazuh
|
||||||
references:
|
reference:
|
||||||
- https://github.com/wazuh/wazuh
|
- https://github.com/wazuh/wazuh
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -12,7 +12,7 @@ info:
|
||||||
making it possible to upload arbitrary files
|
making it possible to upload arbitrary files
|
||||||
to arbitrary directories or overwrite existing ones during archive extraction.
|
to arbitrary directories or overwrite existing ones during archive extraction.
|
||||||
|
|
||||||
References:
|
reference:
|
||||||
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
||||||
tags: mcafee,rce
|
tags: mcafee,rce
|
||||||
|
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: high
|
severity: high
|
||||||
description: Critical Information Disclosure on WP Courses plugin < 2.0.29 exposes private course videos and materials
|
description: Critical Information Disclosure on WP Courses plugin < 2.0.29 exposes private course videos and materials
|
||||||
tags: wordpress,plugin
|
tags: wordpress,plugin
|
||||||
references: |
|
reference: |
|
||||||
- https://www.exploit-db.com/exploits/48910
|
- https://www.exploit-db.com/exploits/48910
|
||||||
- https://www.redtimmy.com/critical-information-disclosure-on-wp-courses-plugin-exposes-private-course-videos-and-materials/
|
- https://www.redtimmy.com/critical-information-disclosure-on-wp-courses-plugin-exposes-private-course-videos-and-materials/
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue