From 77bfd179492ff28d8f52172c481f4aba36fefffc Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Fri, 29 Sep 2023 05:57:07 +0000 Subject: [PATCH] TemplateMan Update [Fri Sep 29 05:57:07 UTC 2023] :robot: --- http/cves/2014/CVE-2014-9180.yaml | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/http/cves/2014/CVE-2014-9180.yaml b/http/cves/2014/CVE-2014-9180.yaml index 1e5f5efc3e..2eb77dea8a 100644 --- a/http/cves/2014/CVE-2014-9180.yaml +++ b/http/cves/2014/CVE-2014-9180.yaml @@ -6,21 +6,22 @@ info: severity: medium description: | Open redirect vulnerability in go.php in Eleanor CMS allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the QUERY_STRING. - remediation: | - Update to the latest version of Eleanor CMS to fix the open redirect vulnerability. reference: - https://packetstormsecurity.com/files/129087/Eleanor-CMS-Open-Redirect.html - https://nvd.nist.gov/vuln/detail/CVE-2014-9180 + remediation: | + Update to the latest version of Eleanor CMS to fix the open redirect vulnerability. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/Au:N/C:N/I:P/A:N - cvss-score: 5.0 + cvss-score: 5 cve-id: CVE-2014-9180 cwe-id: CWE-601 metadata: - verified: true + max-request: 1 product: eleanor_cms - vendor: eleanor-cms shodan-query: html:"eleanor" + vendor: eleanor-cms + verified: true tags: cve,cve2014,eleanor,cms,redirect http: