diff --git a/.nuclei-ignore b/.nuclei-ignore index 14806f1dfa..7ec9758125 100644 --- a/.nuclei-ignore +++ b/.nuclei-ignore @@ -32,6 +32,7 @@ files: - cves/2020/CVE-2020-2036.yaml - cves/2020/CVE-2020-28351.yaml - cves/2021/CVE-2021-35265.yaml + - cves/2007/CVE-2007-2449.yaml - vulnerabilities/generic/basic-xss-prober.yaml - vulnerabilities/oracle/oracle-ebs-xss.yaml - vulnerabilities/other/nginx-module-vts-xss.yaml diff --git a/misconfiguration/apache/apache-tomcat-snoop.yaml b/cves/2007/CVE-2007-2449.yaml similarity index 90% rename from misconfiguration/apache/apache-tomcat-snoop.yaml rename to cves/2007/CVE-2007-2449.yaml index 5b16ca06fe..f6c43fcf54 100644 --- a/misconfiguration/apache/apache-tomcat-snoop.yaml +++ b/cves/2007/CVE-2007-2449.yaml @@ -1,9 +1,9 @@ -id: apache-tomcat-snoop +id: CVE-2007-2449 info: name: Apache Tomcat 4.x-7.x - Cross-Site Scripting author: pdteam - severity: high + severity: low description: Apache Tomcat 4.x through 7.x contains a cross-site scripting vulnerability which can be used by an attacker to execute arbitrary script in the browser of an unsuspecting user in the context of the affected site. reference: - https://www.rapid7.com/db/vulnerabilities/apache-tomcat-example-leaks @@ -13,7 +13,7 @@ info: cwe-id: CWE-79 metadata: shodan-query: title:"Apache Tomcat" - tags: apache,misconfig,tomcat,disclosure + tags: cve,cve2007,apache,misconfig,tomcat,disclosure,xss requests: - method: GET