From 1fef102243e776a6ed7c282b607d21b4c1912ddc Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 17 Oct 2022 21:36:14 +0530 Subject: [PATCH] Delete CVE-2007-2449.yaml --- cves/2007/CVE-2007-2449.yaml | 36 ------------------------------------ 1 file changed, 36 deletions(-) delete mode 100644 cves/2007/CVE-2007-2449.yaml diff --git a/cves/2007/CVE-2007-2449.yaml b/cves/2007/CVE-2007-2449.yaml deleted file mode 100644 index 91a37b90f1..0000000000 --- a/cves/2007/CVE-2007-2449.yaml +++ /dev/null @@ -1,36 +0,0 @@ -id: CVE-2007-2449 - -info: - name: Apache Tomcat 4.x-7.x - Cross-Site Scripting - author: pdteam - severity: low - description: Apache Tomcat 4.x through 7.x contains a cross-site scripting vulnerability which can be used by an attacker to execute arbitrary script in the browser of an unsuspecting user in the context of the affected site. - reference: - - https://www.rapid7.com/db/vulnerabilities/apache-tomcat-example-leaks - - http://tomcat.apache.org/security-6.html - - http://tomcat.apache.org/security-4.html - - http://tomcat.apache.org/security-5.html - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N - cvss-score: 7.2 - cwe-id: CWE-79 - metadata: - shodan-query: title:"Apache Tomcat" - tags: cve,cve2007,apache,misconfig,tomcat,disclosure,xss - -requests: - - method: GET - path: - - "{{BaseURL}}/examples/jsp/snp/snoop.jsp" - - matchers-condition: and - matchers: - - type: word - words: - - 'Request URI: /examples/jsp/snp/snoop.jsp' - - - type: status - status: - - 200 - -# Enhanced by mp on 2022/09/15