Adding missing tags
parent
ff93978e09
commit
d63b9e1cb8
|
@ -7,7 +7,7 @@ info:
|
|||
description: Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file. Combined with ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
|
||||
reference: https://www.phpmyadmin.net/security/PMASA-2009-3/
|
||||
vulhub: https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433
|
||||
tags: phpmyadmin,rce,deserialization
|
||||
tags: cve,cve2009,phpmyadmin,rce,deserialization
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
|
|
@ -10,6 +10,7 @@ info:
|
|||
- http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html
|
||||
description: |
|
||||
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak
|
||||
tags: cve,cve2015,jetty
|
||||
|
||||
requests:
|
||||
- method: POST
|
||||
|
|
|
@ -7,7 +7,7 @@ info:
|
|||
reference: |
|
||||
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8770
|
||||
- https://www.exploit-db.com/exploits/44495/
|
||||
tags: cobub,razor,exposure
|
||||
tags: cve,cve2018,cobub,razor,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
author: pussycat0x
|
||||
severity: high
|
||||
reference: https://github.com/shi-yang/jnoj/issues/53
|
||||
tegs: cve.cve2019,jnoj,lfi
|
||||
tags: cve.cve2019,jnoj,lfi
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Apache Cocoon 2.1.12 XML Injection
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
tags: cve,cve2020,apache,xml,cocoon
|
||||
description: |
|
||||
When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system.
|
||||
reference: https://lists.apache.org/thread.html/r77add973ea521185e1a90aca00ba9dae7caa8d8b944d92421702bb54%40%3Cusers.cocoon.apache.org%3E
|
||||
|
|
|
@ -6,7 +6,7 @@ info:
|
|||
severity: medium
|
||||
description: An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1.
|
||||
reference: https://trovent.io/security-advisory-2010-01
|
||||
tags: rockethchat
|
||||
tags: cve,cve2020,rockethchat
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
|
Loading…
Reference in New Issue