Merge branch 'projectdiscovery:main' into main

patch-1
mlec 2023-04-26 09:28:22 +02:00 committed by GitHub
commit c6850e9063
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
716 changed files with 14514 additions and 6435 deletions

View File

@ -0,0 +1,2 @@
cves/2023/CVE-2023-27524.yaml
exposed-panels/papercut-ng-panel.yaml

View File

@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags,
| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
|-----------|-------|--------------|-------|------------------|-------|----------|-------|---------|-------|
| cve | 1682 | dhiyaneshdk | 799 | cves | 1662 | info | 2790 | http | 5573 |
| panel | 862 | dwisiswant0 | 792 | exposed-panels | 854 | high | 1201 | file | 116 |
| wordpress | 741 | daffainfo | 662 | osint | 630 | medium | 961 | network | 87 |
| exposure | 651 | pikpikcu | 352 | technologies | 557 | critical | 622 | dns | 18 |
| osint | 635 | pdteam | 275 | vulnerabilities | 548 | low | 216 | | |
| wp-plugin | 635 | pussycat0x | 229 | misconfiguration | 423 | unknown | 25 | | |
| edb | 594 | geeknik | 219 | exposures | 373 | | | | |
| tech | 594 | ricardomaia | 213 | token-spray | 240 | | | | |
| xss | 592 | ritikchaddha | 195 | workflows | 190 | | | | |
| lfi | 530 | 0x_akoko | 179 | default-logins | 126 | | | | |
| cve | 1770 | dhiyaneshdk | 805 | cves | 1749 | info | 2816 | http | 5695 |
| panel | 873 | dwisiswant0 | 793 | exposed-panels | 865 | high | 1230 | file | 117 |
| wordpress | 769 | daffainfo | 662 | osint | 633 | medium | 1007 | network | 90 |
| wp-plugin | 660 | pikpikcu | 353 | technologies | 562 | critical | 654 | dns | 18 |
| exposure | 657 | pdteam | 278 | vulnerabilities | 554 | low | 215 | | |
| osint | 638 | pussycat0x | 235 | misconfiguration | 432 | unknown | 25 | | |
| xss | 624 | geeknik | 219 | exposures | 375 | | | | |
| tech | 599 | ricardomaia | 214 | token-spray | 240 | | | | |
| edb | 595 | ritikchaddha | 196 | workflows | 190 | | | | |
| lfi | 538 | 0x_akoko | 179 | default-logins | 128 | | | | |
**380 directories, 6241 files**.
**382 directories, 6373 files**.
</td>
</tr>

File diff suppressed because one or more lines are too long

File diff suppressed because it is too large Load Diff

View File

@ -1,12 +1,12 @@
| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
|-----------|-------|--------------|-------|------------------|-------|----------|-------|---------|-------|
| cve | 1682 | dhiyaneshdk | 799 | cves | 1662 | info | 2790 | http | 5573 |
| panel | 862 | dwisiswant0 | 792 | exposed-panels | 854 | high | 1201 | file | 116 |
| wordpress | 741 | daffainfo | 662 | osint | 630 | medium | 961 | network | 87 |
| exposure | 651 | pikpikcu | 352 | technologies | 557 | critical | 622 | dns | 18 |
| osint | 635 | pdteam | 275 | vulnerabilities | 548 | low | 216 | | |
| wp-plugin | 635 | pussycat0x | 229 | misconfiguration | 423 | unknown | 25 | | |
| edb | 594 | geeknik | 219 | exposures | 373 | | | | |
| tech | 594 | ricardomaia | 213 | token-spray | 240 | | | | |
| xss | 592 | ritikchaddha | 195 | workflows | 190 | | | | |
| lfi | 530 | 0x_akoko | 179 | default-logins | 126 | | | | |
| cve | 1770 | dhiyaneshdk | 805 | cves | 1749 | info | 2816 | http | 5695 |
| panel | 873 | dwisiswant0 | 793 | exposed-panels | 865 | high | 1230 | file | 117 |
| wordpress | 769 | daffainfo | 662 | osint | 633 | medium | 1007 | network | 90 |
| wp-plugin | 660 | pikpikcu | 353 | technologies | 562 | critical | 654 | dns | 18 |
| exposure | 657 | pdteam | 278 | vulnerabilities | 554 | low | 215 | | |
| osint | 638 | pussycat0x | 235 | misconfiguration | 432 | unknown | 25 | | |
| xss | 624 | geeknik | 219 | exposures | 375 | | | | |
| tech | 599 | ricardomaia | 214 | token-spray | 240 | | | | |
| edb | 595 | ritikchaddha | 196 | workflows | 190 | | | | |
| lfi | 538 | 0x_akoko | 179 | default-logins | 128 | | | | |

View File

@ -1,21 +1,23 @@
id: CNVD-2017-03561
info:
name: Panwei eMobile - OGNL Injection
name: Fanwei eMobile - OGNL Injection
author: ritikchaddha
severity: high
description: Panwei eMobile contains an object graph navigation library vulnerability. An attacker can inject arbitrary JavaScript, thus possibly obtaining sensitive information from a database, modifying data, and executing unauthorized administrative operations in the context of the affected site.
description: |
Fanwei eMobile contains an object graph navigation library vulnerability. An attacker can inject arbitrary JavaScript, thus possibly obtaining sensitive information from a database, modifying data, and executing unauthorized administrative operations in the context of the affected site.
reference:
- https://gitee.com/cute-guy/Penetration_Testing_POC/blob/master/%E6%B3%9B%E5%BE%AEe-mobile%20ognl%E6%B3%A8%E5%85%A5.md
- https://reconshell.com/vulnerability-research-list/
metadata:
verified: true
fofa-query: app="泛微-eMobile"
tags: cnvd,cnvd2017,emobile,ognl,panwei
tags: cnvd,cnvd2017,emobile,ognl,fanwei
variables:
num1: "9999"
num2: "5555"
num1: "{{rand_int(800000, 999999)}}"
num2: "{{rand_int(800000, 999999)}}"
result: "{{to_number(num1)*to_number(num2)}}"
requests:
- method: GET
@ -29,10 +31,8 @@ requests:
- type: word
part: body
words:
- '55544445'
- "{{result}}"
- type: status
status:
- 200
# Enhanced by mp on 2022/09/30

View File

@ -0,0 +1,68 @@
id: CNVD-2020-26585
info:
name: Showdoc <2.8.6 - File Uploads
author: pikpikcu,Co5mos
severity: critical
description: |
ShowDoc is an online API and technical documentation tool that is very suitable for IT teams. Showdoc has a file upload vulnerability, which attackers can exploit to gain server permissions.
reference:
- https://vul.wangan.com/a/CNVD-2020-26585
- https://blog.csdn.net/qq_48985780/article/details/122211136
- https://github.com/star7th/showdoc/pull/1059
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
cvss-score: 9.9
cwe-id: CWE-434
metadata:
verified: true
fofa-query: app="ShowDoc"
tags: cnvd,cnvd2020,showdoc,fileupload
requests:
- raw:
- |
POST /index.php?s=/home/page/uploadImg HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=--------------------------835846770881083140190633
----------------------------835846770881083140190633
Content-Disposition: form-data; name="editormd-image-file"; filename="{{randstr}}.<>txt"
Content-Type: text/plain
test{{randstr}}
----------------------------835846770881083140190633--
- |
GET /Public//Uploads//{{date}}//{{file}} HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- "test{{randstr}}"
- type: status
status:
- 200
extractors:
- type: regex
name: date
part: body
group: 1
regex:
- '(\d{4}-\d{2}-\d{2})\\/([a-f0-9]+\.txt)'
internal: true
- type: regex
name: file
part: body
group: 2
regex:
- '(\d{4}-\d{2}-\d{2})\\/([a-f0-9]+\.txt)'
internal: true
# Enhanced by mp on 2022/05/30

768
cves.json

File diff suppressed because it is too large Load Diff

View File

@ -1 +1 @@
e9759c73dd0ca8f897e61f478feaa1aa
13c725619504bbdcfa49f018547818d2

View File

@ -9,7 +9,10 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2000-0114
- https://www.exploit-db.com/exploits/19897
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cve-id: CVE-2000-0114
cwe-id: NVD-CWE-Other
cvss-score: 5.0
remediation: Upgrade to the latest version.
tags: cve,cve2000,frontpage,microsoft,edb

View File

@ -14,7 +14,10 @@ info:
- http://web.archive.org/web/20210129020617/https://www.securityfocus.com/bid/5763/
- https://nvd.nist.gov/vuln/detail/CVE-2002-1131
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cve-id: CVE-2002-1131
cwe-id: NVD-CWE-Other
cvss-score: 7.5
tags: cve2002,edb,xss,squirrelmail,cve
requests:

View File

@ -7,12 +7,14 @@ info:
description: Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
reference:
- https://www.exploit-db.com/exploits/24068
- ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
- http://security.gentoo.org/glsa/glsa-200405-16.xml
- http://web.archive.org/web/20210209233941/https://www.securityfocus.com/archive/1/361857
remediation: Upgrade to the latest version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2004-0519
cwe-id: NVD-CWE-Other
tags: squirrelmail,cve2004,cve,edb,xss
requests:

View File

@ -11,7 +11,10 @@ info:
- http://www.debian.org/security/2005/dsa-884
- http://web.archive.org/web/20210206055804/https://www.securityfocus.com/bid/15337
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
cvss-score: 10
cve-id: CVE-2005-3344
cwe-id: NVD-CWE-Other
tags: cve,cve2005,horde,unauth
requests:

View File

@ -10,7 +10,10 @@ info:
- http://web.archive.org/web/20210121165100/https://www.securityfocus.com/bid/15940/
- https://nvd.nist.gov/vuln/detail/CVE-2005-4385
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
cve-id: CVE-2005-4385
cwe-id: NVD-CWE-Other
tags: cofax,xss,cve,cve2005
requests:

View File

@ -11,7 +11,10 @@ info:
- http://www.vupen.com/english/advisories/2006/1292
- https://nvd.nist.gov/vuln/detail/CVE-2006-1681
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
cve-id: CVE-2006-1681
cwe-id: NVD-CWE-Other
tags: cherokee,httpd,xss,cve,cve2006
requests:

View File

@ -11,7 +11,10 @@ info:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32418
- https://nvd.nist.gov/vuln/detail/CVE-2007-0885
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cve-id: CVE-2007-0885
cwe-id: NVD-CWE-Other
cvss-score: 6.8
tags: cve,cve2007,jira,xss
requests:

View File

@ -12,7 +12,10 @@ info:
- https://cwiki.apache.org/confluence/display/WW/S2-001
- http://forums.opensymphony.com/ann.jspa?annID=54
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2007-4556
cwe-id: NVD-CWE-Other
tags: cve,cve2007,apache,rce,struts
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20161220160642/http://secunia.com/advisories/25446/
- https://nvd.nist.gov/vuln/detail/CVE-2007-5728
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
cve-id: CVE-2007-5728
cwe-id: CWE-79
metadata:
shodan-query: http.title:"phpPgAdmin"
tags: cve,cve2007,xss,pgadmin,phppgadmin,edb

View File

@ -12,7 +12,10 @@ info:
- http://securityreason.com/securityalert/3896
- https://nvd.nist.gov/vuln/detail/CVE-2008-2398
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cve-id: CVE-2008-2398
cwe-id: CWE-79
cvss-score: 4.3
tags: cve,cve2008,xss
requests:

View File

@ -11,7 +11,10 @@ info:
- http://securityreason.com/securityalert/4464
- https://nvd.nist.gov/vuln/detail/CVE-2008-4668
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:P/A:P
cvss-score: 9
cve-id: CVE-2008-4668
cwe-id: CWE-22
tags: cve,cve2008,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20151104173853/http://secunia.com/advisories/33263
- https://nvd.nist.gov/vuln/detail/CVE-2008-5587
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2008-5587
cwe-id: CWE-22
metadata:
shodan-query: http.title:"phpPgAdmin"
tags: cve,cve2008,lfi,phppgadmin,edb

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140804232841/http://secunia.com/advisories/32367/
- http://web.archive.org/web/20210121184108/https://www.securityfocus.com/bid/31892/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2008-6172
cwe-id: CWE-22
tags: cve2008,joomla,lfi,edb,cve
requests:

View File

@ -11,7 +11,10 @@ info:
- http://www.zeroshell.net/eng/announcements/
- http://www.ikkisoft.com/stuff/LC-2009-01.txt
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
cvss-score: 10
cve-id: CVE-2009-0545
cwe-id: CWE-20
tags: edb,cve,cve2009,zeroshell,kerbynet,rce
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.dsecrg.com/pages/vul/show.php?id=122
- https://nvd.nist.gov/vuln/detail/CVE-2009-1872
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cve-id: CVE-2009-1872
cwe-id: CWE-79
cvss-score: 4.3
metadata:
shodan-query: http.component:"Adobe ColdFusion"
verified: "true"

View File

@ -11,7 +11,10 @@ info:
- https://web.archive.org/web/20210121192413/https://www.securityfocus.com/bid/36441/
- http://www.exploit-db.com/exploits/9706
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cve-id: CVE-2009-3318
cwe-id: CWE-22
cvss-score: 7.5
tags: joomla,lfi,edb,cve,cve2009
requests:

View File

@ -11,7 +11,10 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2009-4202
- http://web.archive.org/web/20210121191031/https://www.securityfocus.com/bid/35201/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2009-4202
cwe-id: CWE-22
tags: cve2009,joomla,lfi,photo,edb,cve
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/10216
- https://nvd.nist.gov/vuln/detail/CVE-2009-4223
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cve-id: CVE-2009-4223
cwe-id: CWE-94
cvss-score: 7.5
tags: cve,cve2009,krweb,rfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20140722130146/http://secunia.com/advisories/37760/
- http://www.exploit-db.com/exploits/10754
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cve-id: CVE-2009-4679
cwe-id: CWE-22
cvss-score: 7.5
tags: cve,cve2009,joomla,lfi,nexus,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74321
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cve-id: CVE-2009-5114
cwe-id: CWE-22
cvss-score: 5.0
tags: edb,cve,cve2009,lfi
requests:

View File

@ -12,7 +12,10 @@ info:
- http://packetstormsecurity.org/1001-exploits/joomlabiblestudy-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cve-id: CVE-2010-0157
cwe-id: CWE-22
cvss-score: 7.5
tags: cve,cve2010,joomla,lfi,edb,packetstorm
requests:

View File

@ -11,7 +11,10 @@ info:
- http://www.rapid7.com/security-center/advisories/R7-0037.jsp
- http://www.vupen.com/english/advisories/2010/2673
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
cvss-score: 10
cve-id: CVE-2010-0219
cwe-id: CWE-255
metadata:
shodan-query: http.html:"Apache Axis"
tags: cve,cve2010,axis,apache,default-login,axis2

View File

@ -12,7 +12,10 @@ info:
- http://www.joomlaworks.gr/content/view/77/34/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-0696
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20210121194344/https://www.securityfocus.com/bid/38296/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-0759
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,plugin,edb
requests:

View File

@ -11,7 +11,10 @@ info:
- http://packetstormsecurity.org/1001-exploits/joomlajvideodirect-traversal.txt
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-0942
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,packetstorm,cve
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20210121193737/https://www.securityfocus.com/bid/37692/
- http://web.archive.org/web/20140724215426/http://secunia.com/advisories/33486/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-0943
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,cve
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/11088
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-0944
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,packetstorm,cve
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/11738
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-0972
cwe-id: CWE-22
tags: edb,cve,cve2010,joomla,lfi
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20151104182451/http://secunia.com/advisories/37917/
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2010-0982
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/10948
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-0985
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20151023104850/http://secunia.com/advisories/38982/
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1056
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -11,7 +11,10 @@ info:
- http://www.corejoomla.com/component/content/article/1-corejoomla-updates/40-community-polls-v153-security-release.html
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1081
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20210624111408/https://www.securityfocus.com/bid/38866
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2010-1217
cwe-id: CWE-22
tags: edb,packetstorm,cve,cve2010,joomla,lfi,plugin
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20210617075625/https://www.securityfocus.com/bid/38746
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1219
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20140805062036/http://secunia.com/advisories/39200/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1302
cwe-id: CWE-22
tags: edb,cve,cve2010,joomla,lfi,graph
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/11998
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1304
cwe-id: CWE-22
tags: cve2010,joomla,lfi,status,edb,cve
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20140806165126/http://secunia.com/advisories/39351/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1305
cwe-id: CWE-22
tags: joomla,lfi,edb,cve,cve2010
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20210121195240/https://www.securityfocus.com/bid/39200/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1306
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.vupen.com/english/advisories/2010/0806
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1307
cwe-id: CWE-22
tags: edb,cve,cve2010,joomla,lfi
requests:

View File

@ -11,7 +11,10 @@ info:
- http://www.vupen.com/english/advisories/2010/0809
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1308
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://packetstormsecurity.org/1004-exploits/joomlanewportal-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1312
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb,packetstorm
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/12082
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
cve-id: CVE-2010-1313
cwe-id: CWE-22
cvss-score: 4.3
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1314
cwe-id: CWE-22
tags: lfi,edb,packetstorm,cve,cve2010,joomla
requests:

View File

@ -12,7 +12,10 @@ info:
- http://packetstormsecurity.org/1004-exploits/joomlaweberpcustomer-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1315
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb,packetstorm
requests:

View File

@ -12,7 +12,10 @@ info:
- http://packetstormsecurity.org/1003-exploits/joomlajresearch-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1340
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,packetstorm,cve
requests:

View File

@ -11,7 +11,10 @@ info:
- http://www.exploit-db.com/exploits/11785
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1345
cwe-id: CWE-22
tags: lfi,edb,cve,cve2010,joomla
requests:

View File

@ -12,7 +12,10 @@ info:
- http://packetstormsecurity.org/1004-exploits/joomlajukebox-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1352
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb,packetstorm
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20210121195246/https://www.securityfocus.com/bid/39212/
- http://www.vupen.com/english/advisories/2010/0808
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1353
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20140724190841/http://secunia.com/advisories/39296/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1354
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb,packetstorm
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/12232
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cve-id: CVE-2010-1461
cwe-id: CWE-22
cvss-score: 5.0
tags: cve,cve2010,joomla,lfi,photo,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/12146
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cve-id: CVE-2010-1469
cwe-id: CWE-22
cvss-score: 6.8
tags: lfi,edb,packetstorm,cve,cve2010,joomla
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/12166
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1470
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,cve
requests:

View File

@ -10,7 +10,10 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1471
- http://www.vupen.com/english/advisories/2010/0862
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1471
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/12167
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1472
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20140723213338/http://secunia.com/advisories/39410/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1473
cwe-id: CWE-22
tags: joomla,lfi,edb,packetstorm,cve,cve2010
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140723205926/http://secunia.com/advisories/39388/
- http://www.exploit-db.com/exploits/12182
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1474
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140723203010/http://secunia.com/advisories/39285/
- http://www.exploit-db.com/exploits/12147
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1475
cwe-id: CWE-22
tags: edb,cve,cve2010,joomla,lfi
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.alphaplug.com/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1476
cwe-id: CWE-22
tags: joomla,lfi,edb,packetstorm,cve,cve2010
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20210121195422/https://www.securityfocus.com/bid/39390/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1478
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20140724060325/http://secunia.com/advisories/39533/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1491
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,packetstorm,cve
requests:

View File

@ -11,7 +11,10 @@ info:
- http://www.exploit-db.com/exploits/12113
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1494
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://packetstormsecurity.org/1004-exploits/joomlamatamko-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1495
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,packetstorm,cve
requests:

View File

@ -11,7 +11,10 @@ info:
- http://packetstormsecurity.org/1004-exploits/joomlaredshop-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1531
cwe-id: CWE-22
tags: lfi,edb,packetstorm,cve,cve2010,joomla
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20210127202836/https://www.securityfocus.com/bid/39348/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1532
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb,packetstorm
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/12142
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cve-id: CVE-2010-1533
cwe-id: CWE-22
cvss-score: 7.5
tags: cve2010,joomla,lfi,edb,cve
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20140724182459/http://secunia.com/advisories/39352/
remediation: Upgrade to a supported version
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1534
cwe-id: CWE-22
tags: joomla,lfi,edb,cve,cve2010
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140725030342/http://secunia.com/advisories/39254/
- http://www.exploit-db.com/exploits/12151
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cve-id: CVE-2010-1535
cwe-id: CWE-22
cvss-score: 7.5
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140721042709/http://secunia.com/advisories/38777/
- http://web.archive.org/web/20210121194559/https://www.securityfocus.com/bid/38530/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1540
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140803084823/http://secunia.com/advisories/39472/
- http://packetstormsecurity.org/1004-exploits/joomlajacomment-lfi.txt
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1601
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,packetstorm,cve
requests:

View File

@ -10,7 +10,10 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1602
- http://packetstormsecurity.org/1004-exploits/joomlazimbcomment-lfi.txt
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1602
cwe-id: CWE-22
tags: lfi,edb,packetstorm,cve,cve2010,joomla
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.vupen.com/english/advisories/2010/0931
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1603
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,cve
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20210121195713/https://www.securityfocus.com/bid/39608/
- http://web.archive.org/web/20111227231442/http://secunia.com/advisories/39539/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1607
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -11,7 +11,10 @@ info:
- http://packetstormsecurity.org/1004-exploits/joomlagraphics-lfi.txt
- http://web.archive.org/web/20210121195909/https://www.securityfocus.com/bid/39743/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1653
cwe-id: CWE-22
tags: edb,packetstorm,cve,cve2010,joomla,lfi
requests:

View File

@ -11,7 +11,10 @@ info:
- http://www.vupen.com/english/advisories/2010/1006
- http://web.archive.org/web/20210121195906/https://www.securityfocus.com/bid/39740/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1657
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -10,7 +10,10 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1658
- http://www.vupen.com/english/advisories/2010/1007
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1658
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20210121195906/https://www.securityfocus.com/bid/39739/
- http://www.exploit-db.com/exploits/12426
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1659
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,cve
requests:

View File

@ -11,7 +11,10 @@ info:
- http://packetstormsecurity.org/1004-exploits/joomlaarcadegames-lfi.txt
- http://web.archive.org/web/20140723192327/http://secunia.com/advisories/39413/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1714
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb,packetstorm
requests:

View File

@ -10,7 +10,10 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1715
- http://packetstormsecurity.org/1004-exploits/joomlaonlineexam-lfi.txt
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1715
cwe-id: CWE-22
tags: joomla,lfi,edb,packetstorm,cve,cve2010
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140805095004/http://secunia.com/advisories/39526/
- http://www.vupen.com/english/advisories/2010/0924
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1717
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,cve
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140805094212/http://secunia.com/advisories/39521/
- http://web.archive.org/web/20210121195621/https://www.securityfocus.com/bid/39545/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1718
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -10,7 +10,10 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2010-1719
- http://www.exploit-db.com/exploits/12233
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1719
cwe-id: CWE-22
tags: lfi,edb,cve,cve2010,joomla
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140723201810/http://secunia.com/advisories/39409/
- http://www.exploit-db.com/exploits/12177
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1722
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140805101847/http://secunia.com/advisories/39524/
- http://www.exploit-db.com/exploits/12289
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1723
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://packetstormsecurity.org/1003-exploits/joomlasmestorage-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1858
cwe-id: CWE-22
tags: cve2010,joomla,lfi,edb,packetstorm,cve
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20140802140355/http://secunia.com/advisories/39074/
- http://web.archive.org/web/20210121194939/https://www.securityfocus.com/bid/38912/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1875
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -11,7 +11,10 @@ info:
- http://web.archive.org/web/20210121195712/https://www.securityfocus.com/bid/39606/
- http://packetstormsecurity.org/1004-exploits/joomlaorgchart-lfi.txt
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1878
cwe-id: CWE-22
tags: lfi,edb,packetstorm,cve,cve2010,joomla
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/12239
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1952
cwe-id: CWE-22
tags: cve,cve2010,joomla,lfi,edb
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/12288
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cve-id: CVE-2010-1953
cwe-id: CWE-22
cvss-score: 7.5
tags: cve2010,joomla,lfi,edb,cve
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/12287
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1954
cwe-id: CWE-22
tags: edb,cve,cve2010,joomla,lfi
requests:

View File

@ -12,7 +12,10 @@ info:
- http://web.archive.org/web/20140803091440/http://secunia.com/advisories/39473/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1955
cwe-id: CWE-22
tags: lfi,edb,cve,cve2010,joomla
requests:

View File

@ -12,7 +12,10 @@ info:
- http://www.exploit-db.com/exploits/12285
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1956
cwe-id: CWE-22
tags: joomla,lfi,edb,cve,cve2010
requests:

Some files were not shown because too many files have changed in this diff Show More