Adding missing tags

patch-1
sandeep 2021-05-13 00:54:59 +05:30
parent ff93978e09
commit d63b9e1cb8
6 changed files with 6 additions and 4 deletions

View File

@ -7,7 +7,7 @@ info:
description: Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file. Combined with ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
reference: https://www.phpmyadmin.net/security/PMASA-2009-3/
vulhub: https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433
tags: phpmyadmin,rce,deserialization
tags: cve,cve2009,phpmyadmin,rce,deserialization
requests:
- raw:

View File

@ -10,6 +10,7 @@ info:
- http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html
description: |
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak
tags: cve,cve2015,jetty
requests:
- method: POST

View File

@ -7,7 +7,7 @@ info:
reference: |
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8770
- https://www.exploit-db.com/exploits/44495/
tags: cobub,razor,exposure
tags: cve,cve2018,cobub,razor,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
author: pussycat0x
severity: high
reference: https://github.com/shi-yang/jnoj/issues/53
tegs: cve.cve2019,jnoj,lfi
tags: cve.cve2019,jnoj,lfi
requests:
- raw:

View File

@ -4,6 +4,7 @@ info:
name: Apache Cocoon 2.1.12 XML Injection
author: pikpikcu
severity: high
tags: cve,cve2020,apache,xml,cocoon
description: |
When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system.
reference: https://lists.apache.org/thread.html/r77add973ea521185e1a90aca00ba9dae7caa8d8b944d92421702bb54%40%3Cusers.cocoon.apache.org%3E

View File

@ -6,7 +6,7 @@ info:
severity: medium
description: An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1.
reference: https://trovent.io/security-advisory-2010-01
tags: rockethchat
tags: cve,cve2020,rockethchat
requests:
- raw: