From 566361897c8bbc96a342c6f9f3c9812e82bd720f Mon Sep 17 00:00:00 2001 From: sandeep Date: Thu, 25 Nov 2021 03:21:36 +0530 Subject: [PATCH] moving template of cves folder --- .../2016/CVE-2016-10924.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) rename vulnerabilities/wordpress/wordpress-ebook-download-lfi.yaml => cves/2016/CVE-2016-10924.yaml (85%) diff --git a/vulnerabilities/wordpress/wordpress-ebook-download-lfi.yaml b/cves/2016/CVE-2016-10924.yaml similarity index 85% rename from vulnerabilities/wordpress/wordpress-ebook-download-lfi.yaml rename to cves/2016/CVE-2016-10924.yaml index 0e1fb7249d..eb3d47e11d 100644 --- a/vulnerabilities/wordpress/wordpress-ebook-download-lfi.yaml +++ b/cves/2016/CVE-2016-10924.yaml @@ -1,4 +1,4 @@ -id: wp-ebook-download-lfi +id: CVE-2016-10924 info: name: Wordpress eBook Download < 1.2 - Directory Traversal @@ -8,7 +8,8 @@ info: reference: - https://wpscan.com/vulnerability/13d5d17a-00a8-441e-bda1-2fd2b4158a6c - https://www.exploit-db.com/exploits/39575 - tags: wordpress,wp-plugin,lfi,wordpress,ebook + - https://nvd.nist.gov/vuln/detail/CVE-2016-10924 + tags: cve,cve2021,wp-plugin,lfi,wordpress,ebook requests: - method: GET