diff --git a/.github/workflows/templates-sync.yml b/.github/workflows/templates-sync.yml
index b07f36c8e5..ce289d14dd 100644
--- a/.github/workflows/templates-sync.yml
+++ b/.github/workflows/templates-sync.yml
@@ -3,6 +3,14 @@ on:
push:
paths:
- '.new-additions'
+ - 'http/cves/2015/CVE-2015-2794.yaml'
+ - 'http/cves/2023/CVE-2023-42343.yaml'
+ - 'http/cves/2023/CVE-2023-46574.yaml'
+ - 'http/exposures/docker-daemon-exposed.yaml'
+ - 'http/token-spray/api-openai.yaml'
+ - 'http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml'
+ - 'http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml'
+ - 'http/vulnerabilities/yonyou/yonyou-ksoa-dept-sqli.yaml'
workflow_dispatch:
jobs:
triggerRemoteWorkflow:
diff --git a/.new-additions b/.new-additions
index 9d24e17c29..c89e7f038f 100644
--- a/.new-additions
+++ b/.new-additions
@@ -1,2 +1,19 @@
+cloud/enum/aws-app-enum.yaml
+cloud/enum/aws-s3-bucket-enum.yaml
+cloud/enum/azure-db-enum.yaml
+cloud/enum/azure-vm-cloud-enum.yaml
+cloud/enum/azure-website-enum.yaml
+cloud/enum/gcp-app-engine-enum.yaml
+cloud/enum/gcp-bucket-enum.yaml
+cloud/enum/gcp-firebase-app-enum.yaml
+cloud/enum/gcp-firebase-rtdb-enum.yaml
+http/cves/2015/CVE-2015-2794.yaml
+http/cves/2023/CVE-2023-41109.yaml
+http/cves/2023/CVE-2023-42343.yaml
+http/cves/2023/CVE-2023-46574.yaml
+http/exposures/docker-daemon-exposed.yaml
http/token-spray/api-openai.yaml
+http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml
http/vulnerabilities/ruijie/ruijie-rg-eg-web-mis-rce.yaml
+http/vulnerabilities/yonyou/yonyou-ksoa-dept-sqli.yaml
+network/misconfig/erlang-daemon.yaml
diff --git a/cloud/enum/aws-app-enum.yaml b/cloud/enum/aws-app-enum.yaml
new file mode 100644
index 0000000000..ab7ed36795
--- /dev/null
+++ b/cloud/enum/aws-app-enum.yaml
@@ -0,0 +1,37 @@
+id: aws-app-enum
+
+info:
+ name: AWS Apps - Cloud Enumeration
+ author: initstring
+ severity: info
+ description: |
+ Searches for AWS apps (WorkDocs, WorkMail, Connect, etc.)
+ metadata:
+ verified: true
+ max-request: 1
+ tags: cloud,cloud-enum,aws
+
+self-contained: true
+
+variables:
+ BaseDNS: "awsapps.com"
+
+http:
+ - raw:
+ - |
+ GET https://{{wordlist}}.{{BaseDNS}} HTTP/1.1
+ Host: {{wordlist}}.{{BaseDNS}}
+
+ redirects: false
+
+ attack: batteringram
+ threads: 10
+
+ matchers:
+ - type: status
+ name: "Registered AWS App"
+ status:
+ - 200
+ - 302
+ condition: or
+# digest: 490a0046304402206cc21deaf3d479badf5b8b46dbe3448bd60ec76fc64503726d554051cca8a9bc02204dba37b6781d1c66eca341ac1c6c7a5041cfb376832d862700a864cc91af8870:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/cloud/enum/aws-s3-bucket-enum.yaml b/cloud/enum/aws-s3-bucket-enum.yaml
new file mode 100644
index 0000000000..7c692dda40
--- /dev/null
+++ b/cloud/enum/aws-s3-bucket-enum.yaml
@@ -0,0 +1,41 @@
+id: aws-s3-bucket-enum
+
+info:
+ name: AWS S3 Buckets - Cloud Enumeration
+ author: initstring
+ severity: info
+ description: |
+ Searches for open and protected buckets in AWS S3
+ metadata:
+ verified: true
+ max-request: 1
+ tags: cloud,cloud-enum,aws
+
+self-contained: true
+
+variables:
+ BaseDNS: "s3.amazonaws.com"
+
+http:
+ - raw:
+ - |
+ GET http://{{wordlist}}.{{BaseDNS}} HTTP/1.1
+ Host: {{wordlist}}.{{BaseDNS}}
+
+ redirects: false
+
+ attack: batteringram
+ threads: 10
+
+ matchers-condition: or
+ matchers:
+ - type: status
+ name: "Open AWS S3 Bucket"
+ status:
+ - 200
+
+ - type: status
+ name: "Protected AWS S3 Bucket"
+ status:
+ - 403
+# digest: 4b0a00483046022100c0cbb1d95cb9a7d7b9bd7a4bf578af739426ab59afa3faa001104c29c4ff999e022100cdfc9930e3c0ae01086792f1391ff33c22070722d3bd874d1e3f87f31c938a17:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/cloud/enum/azure-db-enum.yaml b/cloud/enum/azure-db-enum.yaml
new file mode 100644
index 0000000000..8a3ec2887d
--- /dev/null
+++ b/cloud/enum/azure-db-enum.yaml
@@ -0,0 +1,32 @@
+id: azure-db-enum
+
+info:
+ name: Azure Databases - Cloud Enumeration
+ author: initstring
+ severity: info
+ description: |
+ Searches for Azure databases via their registered DNS names
+ metadata:
+ verified: true
+ max-request: 1
+ tags: cloud,cloud-enum,azure
+
+self-contained: true
+
+variables:
+ BaseDNS: "database.windows.net"
+
+dns:
+ - name: "{{wordlist}}.{{BaseDNS}}"
+ type: A
+ class: inet
+
+ recursion: true
+
+ attack: batteringram
+ matchers:
+ - type: word
+ part: answer
+ words:
+ - "IN\tA"
+# digest: 4a0a004730450221008d5f64c419db15f1c1bce4a802f395bdcc44847f878890831869236c37a1678002205d7502015cece8506d34b9c319643441e334856c7fd34e1baa70a6a6942f134e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/cloud/enum/azure-vm-cloud-enum.yaml b/cloud/enum/azure-vm-cloud-enum.yaml
new file mode 100644
index 0000000000..7ed0d03f3c
--- /dev/null
+++ b/cloud/enum/azure-vm-cloud-enum.yaml
@@ -0,0 +1,65 @@
+id: azure-vm-cloud-enum
+
+info:
+ name: Azure Virtual Machines - Cloud Enumeration
+ author: initstring
+ severity: info
+ description: |
+ Searches for Azure virtual machines via their registered DNS names.
+ metadata:
+ verified: true
+ tags: cloud,cloud-enum,azure
+
+self-contained: true
+
+variables:
+ BaseDNS: "cloudapp.azure.com"
+ regionname:
+ - eastasia
+ - southeastasia
+ - centralus
+ - eastus
+ - eastus2
+ - westus
+ - northcentralus
+ - southcentralus
+ - northeurope
+ - westeurope
+ - japanwest
+ - japaneast
+ - brazilsouth
+ - australiaeast
+ - australiasoutheast
+ - southindia
+ - centralindia
+ - westindia
+ - canadacentral
+ - canadaeast
+ - uksouth
+ - ukwest
+ - westcentralus
+ - westus2
+ - koreacentral
+ - koreasouth
+ - francecentral
+ - francesouth
+ - australiacentral
+ - australiacentral2
+ - southafricanorth
+ - southafricawest
+
+dns:
+ - name: "{{wordlist}}.{{regionname}}.{{BaseDNS}}"
+ type: A
+ class: inet
+
+ recursion: true
+
+ attack: batteringram
+
+ matchers:
+ - type: word
+ part: answer
+ words:
+ - "IN\tA"
+# digest: 4b0a004830460221008d223bfdb3585e335e8282ca206945a6f7704dab4a2899d3410229bf0db7132d022100b9de9af2b393a559575b67a5b25b6334fe8cddd1ceed5059ee634dc3b0292d50:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/cloud/enum/azure-website-enum.yaml b/cloud/enum/azure-website-enum.yaml
new file mode 100644
index 0000000000..94737b9889
--- /dev/null
+++ b/cloud/enum/azure-website-enum.yaml
@@ -0,0 +1,36 @@
+id: azure-website-enum
+
+info:
+ name: Azure Websites - Cloud Enumeration
+ author: initstring
+ severity: info
+ description: |
+ Searches for Azure websites that are registered and responding.
+ metadata:
+ verified: true
+ tags: cloud,azure
+
+self-contained: true
+
+variables:
+ BaseDNS: "azurewebsites.net"
+
+http:
+ - raw:
+ - |
+ GET https://{{wordlist}}.{{BaseDNS}} HTTP/1.1
+ Host: {{wordlist}}.{{BaseDNS}}
+
+ redirects: false
+
+ attack: batteringram
+ threads: 10
+
+ matchers:
+ - type: status
+ name: "Available Azure Website"
+ status:
+ - 200
+ - 302
+ condition: or
+# digest: 490a00463044022001ff1a4cff9e33f3817df1e824a00e35f76c6f8e22cd34e3616e452978dc46f702200913c7710eba2b3df98325a1bb7da86b55cde6d4a3d7199a7d952f1f7988a3fa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/cloud/enum/gcp-app-engine-enum.yaml b/cloud/enum/gcp-app-engine-enum.yaml
new file mode 100644
index 0000000000..25da290f22
--- /dev/null
+++ b/cloud/enum/gcp-app-engine-enum.yaml
@@ -0,0 +1,42 @@
+id: gcp-app-engine-enum
+
+info:
+ name: GCP App Engine (Appspot) - Cloud Enumeration
+ author: initstring
+ severity: info
+ description: |
+ Searches for App Engine Apps in GCP.
+ metadata:
+ verified: true
+ tags: cloud,cloud-enum,gcp
+
+self-contained: true
+
+variables:
+ BaseDNS: "appspot.com"
+ loginRedirect: "accounts.google.com"
+
+http:
+ - raw:
+ - |
+ GET https://{{wordlist}}.{{BaseDNS}} HTTP/1.1
+ Host: {{wordlist}}.{{BaseDNS}}
+
+ redirects: false
+
+ attack: batteringram
+ threads: 10
+
+ matchers:
+ - type: dsl
+ name: "Open GCP App Engine App"
+ dsl:
+ - "status_code==200"
+
+ - type: dsl
+ name: "Protected GCP App Engine App"
+ dsl:
+ - "status_code==302"
+ - contains(location, "login")
+ condition: and
+# digest: 490a0046304402204edc5a3fc90ff80b8397219e37a716d5b582c9821dbb0edda2c52c585aa241ca022067b0c7178f7f345975f765bdd56afc967505028e459ed113c8fbd450a1dcb76a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/cloud/enum/gcp-bucket-enum.yaml b/cloud/enum/gcp-bucket-enum.yaml
new file mode 100644
index 0000000000..6889edcaad
--- /dev/null
+++ b/cloud/enum/gcp-bucket-enum.yaml
@@ -0,0 +1,39 @@
+id: gcp-bucket-enum
+
+info:
+ name: GCP Buckets - Cloud Enumeration
+ author: initstring
+ severity: info
+ description: |
+ Searches for open and protected buckets in GCP.
+ metadata:
+ verified: true
+ tags: cloud,cloud-enum,gcp
+
+self-contained: true
+
+variables:
+ BaseDNS: "storage.googleapis.com"
+
+http:
+ - raw:
+ - |
+ GET http://{{wordlist}}.{{BaseDNS}} HTTP/1.1
+ Host: {{wordlist}}.{{BaseDNS}}
+
+ redirects: false
+
+ attack: batteringram
+ threads: 10
+
+ matchers:
+ - type: status
+ name: "Open GCP Bucket"
+ status:
+ - 200
+
+ - type: status
+ name: "Protected GCP Bucket"
+ status:
+ - 403
+# digest: 490a004630440220549241cfe0dbdadf24bcbdabd6cbf8e82a45bea577710e8409da53f3bdef37d202203bab8b09dea7b68aafc32f8214b331ee6dc4dbe85c0e7a34693b8062dec6fb6a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/cloud/enum/gcp-firebase-app-enum.yaml b/cloud/enum/gcp-firebase-app-enum.yaml
new file mode 100644
index 0000000000..45a6277ff7
--- /dev/null
+++ b/cloud/enum/gcp-firebase-app-enum.yaml
@@ -0,0 +1,34 @@
+id: gcp-firebase-app-enum
+
+info:
+ name: GCP Firebase Apps - Cloud Enumeration
+ author: initstring
+ severity: info
+ description: |
+ Searches for Firebase Apps in GCP.
+ metadata:
+ verified: true
+ tags: cloud,cloud-enum,gcp
+
+self-contained: true
+
+variables:
+ BaseDNS: "firebaseapp.com"
+
+http:
+ - raw:
+ - |
+ GET https://{{wordlist}}.{{BaseDNS}} HTTP/1.1
+ Host: {{wordlist}}.{{BaseDNS}}
+
+ redirects: false
+
+ attack: batteringram
+ threads: 10
+
+ matchers:
+ - type: status
+ name: "Open GCP Firebase App"
+ status:
+ - 200
+# digest: 490a004630440220721a516d58d71b3c20990c97c22986fd212caafa366f2641bdb4fe9df0a53f9802205ecd4bfcda0808d5002e9d1194e0ec0f4d2b2f2140170c0df4ffb11372a6470f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/cloud/enum/gcp-firebase-rtdb-enum.yaml b/cloud/enum/gcp-firebase-rtdb-enum.yaml
new file mode 100644
index 0000000000..27a2ee646e
--- /dev/null
+++ b/cloud/enum/gcp-firebase-rtdb-enum.yaml
@@ -0,0 +1,50 @@
+id: gcp-firebase-rtdb-enum
+
+info:
+ name: GCP Firebase Realtime Database - Cloud Enumeration
+ author: initstring
+ severity: info
+ description: |
+ Searches for Firebase Realtime Databases in GCP.
+ metadata:
+ verified: true
+ tags: cloud,cloud-enum,gcp
+
+self-contained: true
+
+variables:
+ BaseDNS: "firebaseio.com"
+
+http:
+ - raw:
+ - |
+ GET https://{{wordlist}}.{{BaseDNS}}/.json HTTP/1.1
+ Host: {{wordlist}}.{{BaseDNS}}
+
+ redirects: false
+
+ attack: batteringram
+ threads: 10
+
+ matchers-condition: or
+ matchers:
+ - type: status
+ name: "Open GCP Firebase RTDB"
+ status:
+ - 200
+
+ - type: status
+ name: "Protected GCP Firebase RTDB"
+ status:
+ - 401
+
+ - type: status
+ name: "Payment GCP on Google Firebase RTDB"
+ status:
+ - 402
+
+ - type: status
+ name: "Deactivated GCP Firebase RTDB"
+ status:
+ - 423
+# digest: 490a0046304402200dcb47ae02c77c619eea0d95a6ab7dc9f2be071cea09abee3a7ab748b11e561c022034956ced05346f9cfcc9d425d92fa1242c979572e8ae02030496597f64ccfe82:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/cves.json b/cves.json
index b67a7f0312..5227679936 100644
--- a/cves.json
+++ b/cves.json
@@ -271,6 +271,7 @@
{"ID":"CVE-2015-2166","Info":{"Name":"Ericsson Drutt MSDP - Local File Inclusion","Severity":"medium","Description":"Ericsson Drutt Mobile Service Delivery Platform (MSDP) 4, 5, and 6 allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the default URI in the Instance Monitor.","Classification":{"CVSSScore":"5"}},"file_path":"http/cves/2015/CVE-2015-2166.yaml"}
{"ID":"CVE-2015-2196","Info":{"Name":"WordPress Spider Calendar \u003c=1.4.9 - SQL Injection","Severity":"high","Description":"WordPress Spider Calendar plugin through 1.4.9 is susceptible to SQL injection. An attacker can execute arbitrary SQL commands via the cat_id parameter in a spiderbigcalendar_month action to wp-admin/admin-ajax.php, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2015/CVE-2015-2196.yaml"}
{"ID":"CVE-2015-2755","Info":{"Name":"WordPress AB Google Map Travel \u003c=3.4 - Stored Cross-Site Scripting","Severity":"medium","Description":"WordPress AB Google Map Travel plugin through 3.4 contains multiple stored cross-site scripting vulnerabilities. The plugin allows an attacker to hijack the administrator authentication for requests via the (1) lat (Latitude), (2) long (Longitude), (3) map_width, (4) map_height, or (5) zoom (Map Zoom) parameters in the ab_map_options page to wp-admin/admin.php.\n","Classification":{"CVSSScore":"6.8"}},"file_path":"http/cves/2015/CVE-2015-2755.yaml"}
+{"ID":"CVE-2015-2794","Info":{"Name":"DotNetNuke 07.04.00 - Administration Authentication Bypass","Severity":"critical","Description":"The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2015/CVE-2015-2794.yaml"}
{"ID":"CVE-2015-2807","Info":{"Name":"Navis DocumentCloud \u003c0.1.1 - Cross-Site Scripting","Severity":"medium","Description":"Navis DocumentCloud plugin before 0.1.1 for WordPress contains a reflected cross-site scripting vulnerability in js/window.php which allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter.","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2015/CVE-2015-2807.yaml"}
{"ID":"CVE-2015-2863","Info":{"Name":"Kaseya Virtual System Administrator - Open Redirect","Severity":"medium","Description":"Kaseya Virtual System Administrator 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 are susceptible to an open redirect vulnerability. An attacker can redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.\n","Classification":{"CVSSScore":"4.3"}},"file_path":"http/cves/2015/CVE-2015-2863.yaml"}
{"ID":"CVE-2015-2996","Info":{"Name":"SysAid Help Desk \u003c15.2 - Local File Inclusion","Severity":"high","Description":"SysAid Help Desk before 15.2 contains multiple local file inclusion vulnerabilities which can allow remote attackers to read arbitrary files via .. (dot dot) in the fileName parameter of getGfiUpgradeFile or cause a denial of service (CPU and memory consumption) via .. (dot dot) in the fileName parameter of calculateRdsFileChecksum.\n","Classification":{"CVSSScore":"8.5"}},"file_path":"http/cves/2015/CVE-2015-2996.yaml"}
diff --git a/cves.json-checksum.txt b/cves.json-checksum.txt
index 71b0875aee..8953152fe4 100644
--- a/cves.json-checksum.txt
+++ b/cves.json-checksum.txt
@@ -1 +1 @@
-94707e96d497767157be7c0c5b06fac3
+8ba13563d80d4c1e36d4b6dff2c7f027
diff --git a/http/cnvd/2021/CNVD-2021-32799.yaml b/http/cnvd/2021/CNVD-2021-32799.yaml
index 796167b833..7511eb7eaf 100644
--- a/http/cnvd/2021/CNVD-2021-32799.yaml
+++ b/http/cnvd/2021/CNVD-2021-32799.yaml
@@ -4,6 +4,8 @@ info:
name: 360 Xintianqing - SQL Injection
author: SleepingBag945
severity: high
+ description: |
+ The Tianqing Terminal Security Management System, designed for government and enterprise use, faces a SQL injection vulnerability. This flaw could enable attackers to access sensitive database information.
reference:
- https://blog.51cto.com/u_9691128/4295047
- https://www.cnvd.org.cn/patchInfo/show/270651
@@ -38,5 +40,4 @@ http:
- type: status
status:
- 200
-
-# digest: 4a0a00473045022006cca5f941e35ce5c204962052c2d4eb74627fc58d6de9b9976b967b1643ea8f022100e2b50bf34a6ee4636802796f5b1e866212a29264161bbc98a5553a60186651d1:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100e6b9c102bfc4fd3eaa2d00c82e03d07f7309513da8828cc6c303d4d071c2d5540221009d3c3f3d937d8ac546abaa6d94a3aee02d5c4c7c8831dfbce456591d4b252eda:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2000/CVE-2000-0114.yaml b/http/cves/2000/CVE-2000-0114.yaml
index 9703e7591c..6e8ab39c98 100644
--- a/http/cves/2000/CVE-2000-0114.yaml
+++ b/http/cves/2000/CVE-2000-0114.yaml
@@ -5,6 +5,8 @@ info:
author: r3naissance
severity: medium
description: Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
+ impact: |
+ High: Remote code execution or denial of service.
remediation: Upgrade to the latest version.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2000-0114
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220080130ec958d5667203f63c2fb769d081d8684edeb1132b8114624eb9cefeeeb022015c92a448c22916bdc29de05205539f746ae2fc9b6b641b54ef2b913d151c11f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100d75cf6bb5b96928d10a267c9d3b68c6d215cafe2f946fc1e3c6faa5ba73986d1022100cf0262c0fa9aa5da8c6f8751c553cc77be07ca9fc62f3aec8bb35a8b9f16b490:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2001/CVE-2001-0537.yaml b/http/cves/2001/CVE-2001-0537.yaml
index f391661eec..10c5c7f16a 100644
--- a/http/cves/2001/CVE-2001-0537.yaml
+++ b/http/cves/2001/CVE-2001-0537.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
+ impact: |
+ Successful exploitation of this vulnerability could lead to unauthorized access to the affected device.
remediation: |
Apply the appropriate patch or upgrade to a fixed version of the Cisco IOS software.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022058d9a8ffc9ad0c9eb0fa65e129eec136d44e8e6582b68665220d55745cff08270220209369d1debe9d289316990990aee95bdaa71cd748bcd23d1f7189442c298347:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502201446b3c9bf46dead91bf4ef4ad77cbe180d6d69fb175901a10fa0c1ede45e8640221009f8fada5bf28bf8ede431e3ef75a13367f4164a18df286db6e1528ed038181da:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml
index 6c576e31ec..4cc511bf5f 100644
--- a/http/cves/2002/CVE-2002-1131.yaml
+++ b/http/cves/2002/CVE-2002-1131.yaml
@@ -5,6 +5,8 @@ info:
author: dhiyaneshDk
severity: high
description: The Virtual Keyboard plugin for SquirrelMail 1.2.6/1.2.7 is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, data theft, or other malicious activities.
remediation: |
Upgrade to a patched version of SquirrelMail or apply the necessary security patches to mitigate the XSS vulnerability.
reference:
@@ -53,4 +55,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100919662cf99fc2c8685a185341929e70c52f2d6e4708bffe8294fe45d56f7cb81022071b199174fe64ab885ef44d2c7d1e298ea1ee34b6eab5737b7afb1bd0b713799:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220097cefba0b33bb087a8dba970ed43866b17c92bfc316e2e3d619b9b6485b57710221009ad2de84214b6c521984839454d0766d906957945e2b51dce527cd4c0cc82c50:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2004/CVE-2004-0519.yaml b/http/cves/2004/CVE-2004-0519.yaml
index d6fa858eaf..dd72a4ab41 100644
--- a/http/cves/2004/CVE-2004-0519.yaml
+++ b/http/cves/2004/CVE-2004-0519.yaml
@@ -5,6 +5,8 @@ info:
author: dhiyaneshDk
severity: medium
description: Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, phishing attacks, or defacement of the SquirrelMail interface.
remediation: Upgrade to the latest version.
reference:
- https://www.exploit-db.com/exploits/24068
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205d3c4477a61a53a5207dd95d10b69b27e255779626d269dd24c329d22d574969022037aecc3ef5111112878affc3d64765c06c484c318e8435b97dcf1f44c9c9daac:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009838e283e3afa06a62182a21bc8b0059f223c7716b521ee426f5a5971f3feadf022100dd82c1e652cb490cb66a1a96bc0aca2beecdf45fedf86f75b5376ac8fc69c6d3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2004/CVE-2004-1965.yaml b/http/cves/2004/CVE-2004-1965.yaml
index 77801a1ef9..108c014d2e 100644
--- a/http/cves/2004/CVE-2004-1965.yaml
+++ b/http/cves/2004/CVE-2004-1965.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.
+ impact: |
+ Successful exploitation of these vulnerabilities could lead to unauthorized access, phishing attacks, and potential data theft.
remediation: |
Upgrade to a patched version of Open Bulletin Board (OpenBB) or apply necessary security patches to mitigate the vulnerabilities.
reference:
@@ -37,4 +39,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
-# digest: 4a0a004730450220464a4d9ce1d6cbeaf71f551a06fd319a5a15203f7c40b1228809ef413ce6d869022100cb853dd541a12cbe5b12d10daaebc247d1b20e32d173b410d5191367fb6f5839:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100aa37066896608be1f1389ed813b9756b52f89f2581a494bf04c0e91f743d7cd3022012425b62227648da21636d2b3acaa1fdb865e29f57e39c13c84e0e2511f4c908:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2005/CVE-2005-2428.yaml b/http/cves/2005/CVE-2005-2428.yaml
index 9fcb975ce4..5f20ec31d2 100644
--- a/http/cves/2005/CVE-2005-2428.yaml
+++ b/http/cves/2005/CVE-2005-2428.yaml
@@ -5,6 +5,8 @@ info:
author: CasperGN
severity: medium
description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled (which is by default) allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).
+ impact: |
+ The vulnerability can lead to the disclosure of sensitive information, potentially compromising user privacy and system security.
remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
reference:
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c31e97e6801605f82c05e1819cf99bdb1e7ad21b859fbf96bab1d67b1496832302201de7a5c5f9fd1f832a121691d1c419464c4d56aa1261f00b415c933633470308:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202fa68c993471257cf8942b7addbd0c8ba10500cf91c42f00109404cec47f6af0022100e5d9e9567e00ffecb85211757541b21325517ca1cba3705fa3c8e4437bf71706:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2005/CVE-2005-3344.yaml b/http/cves/2005/CVE-2005-3344.yaml
index 0a0daef60a..20a0675c96 100644
--- a/http/cves/2005/CVE-2005-3344.yaml
+++ b/http/cves/2005/CVE-2005-3344.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: critical
description: Horde Groupware contains an administrative account with a blank password, which allows remote attackers to gain access.
+ impact: |
+ An attacker can gain unauthorized access to sensitive administrative functions and potentially compromise the entire system.
remediation: |
Apply the latest security patches or upgrade to a patched version of Horde Groupware to fix the vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c038f1228140ac219d52db4ac935001c95f9c1d446165668109ce4beee89ce54022053555ab9030c57883e97f6b5387e415d1116add7b8c7d61fcf0f53f8f63abb6d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022012df863c30fb119eab34b1e075cfc549f79b962d5ee0256cc191605f184b042c022100ee6d6910021f8368041415f1c29568a224afa0bd4c90711c6ecef91e15f67a13:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2005/CVE-2005-3634.yaml b/http/cves/2005/CVE-2005-3634.yaml
index f70ba9afda..a7f24f1089 100644
--- a/http/cves/2005/CVE-2005-3634.yaml
+++ b/http/cves/2005/CVE-2005-3634.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
frameset.htm in the BSP runtime in SAP Web Application Server (WAS) 6.10 through 7.00 allows remote attackers to log users out and redirect them to arbitrary web sites via a close command in the sap-sessioncmd parameter and a URL in the sap-exiturl parameter.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks.
remediation: |
Apply the latest security patches and updates provided by SAP to fix the open redirect vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
-# digest: 490a0046304402201ed65f33515c85457e0554acc0db27813e67680002c76547791a87a2528ee8f702200cf156ab25abae0ba9b6284d127206b2afbbf1449ef60b0bd8d1643a3ab35938:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100bd85215e179a268944da628fd2825c25be84f1d781f2eb54871fa7e3e13d9e9e022100d3ddb1c0a27197923318f0dd20a6ba42024cfd43b86ef1ab690f72558f0d6c36:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2005/CVE-2005-4385.yaml b/http/cves/2005/CVE-2005-4385.yaml
index af5db26817..3ca9ec067a 100644
--- a/http/cves/2005/CVE-2005-4385.yaml
+++ b/http/cves/2005/CVE-2005-4385.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: Cofax 2.0 RC3 and earlier contains a cross-site scripting vulnerability in search.htm which allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a version of Cofax that is not affected by this vulnerability or apply the necessary patches provided by the vendor.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220109614eef224949e56be06ed96b7253bf9eeaaaca6b3e4d13bad94f187f50763022025be825f048689d4e2fb40c8cab4f5be2a16e56a263e77a4c10b8b718f948edc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502207b167d92c80698ced12089ab60b5599c68ac644764fc7c498b54ba3b419645a7022100df03e54fcb0545995de5efa160937f4291cc667f1492d78e48ce8afcff374056:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2006/CVE-2006-1681.yaml b/http/cves/2006/CVE-2006-1681.yaml
index 0b474c8ba4..4e07c04fa4 100644
--- a/http/cves/2006/CVE-2006-1681.yaml
+++ b/http/cves/2006/CVE-2006-1681.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: Cherokee HTTPD 0.5 and earlier contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of Cherokee HTTPD or apply the necessary security patches to mitigate the XSS vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022033ff4b2d0618993f110bdcee1826f352569694a911159307a8f47963b4726556022038d273a79b3532c7f80935bec832c34c7892f005e3108ecc80ca91912b3eb12e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502200a624286010449dfbca736566eca4b83ef242b54957df99d637e088e9f74d226022100df79ccce801ecbe05018cb6c9e29bc7f6acf5836a0f68bc4640d5c55a8fdbdbf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2006/CVE-2006-2842.yaml b/http/cves/2006/CVE-2006-2842.yaml
index ecc0901ff3..ddc0cd6633 100644
--- a/http/cves/2006/CVE-2006-2842.yaml
+++ b/http/cves/2006/CVE-2006-2842.yaml
@@ -5,6 +5,8 @@ info:
author: dhiyaneshDk
severity: high
description: SquirrelMail 1.4.6 and earlier versions are susceptible to a PHP local file inclusion vulnerability in functions/plugin.php if register_globals is enabled and magic_quotes_gpc is disabled. This allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Upgrade Squirrelmail to a version higher than 1.4.6 or apply the necessary patches to fix the LFI vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100cf681f51c8fd7ad8f71ddb5ab7fbf70ab26af8ef9f4e1eecf899ef7e15a9cfc7022100fd0d57febf53d04624632cee41a8d0d9e2d2fccd8fb7fa76c099ec12679f4da0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022070351a9e8db3cd73242680b18ba040226de4685b2c47e1382a982513fb0fc4f6022100e11c42b749f6d407caa47bb25997db8749ff4658e5d89ccf2215774153751083:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2007/CVE-2007-4504.yaml b/http/cves/2007/CVE-2007-4504.yaml
index ce8f0cf862..0b75097769 100644
--- a/http/cves/2007/CVE-2007-4504.yaml
+++ b/http/cves/2007/CVE-2007-4504.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! RSfiles 1.0.2 and earlier is susceptible to local file inclusion in index.php in the RSfiles component (com_rsfiles). This could allow remote attackers to arbitrarily read files via a .. (dot dot) in the path parameter in a files.display action.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution.
remediation: |
Upgrade to the latest version of Joomla! RSfiles or apply the necessary patches provided by the vendor.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220712fc391a3e3be1f9f89f83c89ca00e016a1ae009e593ef7f256bc272a71792f022100eddfcc0868a4e91ff4b82eaa8fa52e5f192d150f48f12b868d02d656b1a5f363:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100b096332d183a0234d0cbd3bfbc4b5149fddfbfe961ca49519ef85975a12413e50221008eee0c4a8fbdcd33a40800400dd5bd396f02ffb63cb375616260a0d10b0fce8d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2007/CVE-2007-4556.yaml b/http/cves/2007/CVE-2007-4556.yaml
index 5a9fa71597..04f66dce08 100644
--- a/http/cves/2007/CVE-2007-4556.yaml
+++ b/http/cves/2007/CVE-2007-4556.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Apache Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via for"m input beginning with a "%{" sequence and ending with a "}" character.
+ impact: |
+ Remote code execution
remediation: |
Update to the latest version of Apache Struts2
reference:
@@ -49,4 +51,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022063c92b81235f315f81680c3e5e93dc814dfe125814e43dcb6cff373d90d06df2022100a730d9a5439ccba872f1932b6625658746e1dedae50d3d88b40a0e484f9399cd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100efb00dfbe2fbe5543741c32ac6e81e36f307f5d67597644c0e036fb51692ea570220191deb545db561480334ffe98f010ae2ca82883fae8e71451c75675f56ee4501:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2007/CVE-2007-5728.yaml b/http/cves/2007/CVE-2007-5728.yaml
index 5ebb21682c..aa28240ef1 100644
--- a/http/cves/2007/CVE-2007-5728.yaml
+++ b/http/cves/2007/CVE-2007-5728.yaml
@@ -5,6 +5,8 @@ info:
author: dhiyaneshDK
severity: medium
description: phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, is vulnerable to cross-site scripting and allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, which are different vectors than CVE-2007-2865.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of phpPgAdmin or apply the necessary security patches provided by the vendor.
reference:
@@ -50,4 +52,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ad3097a5f6494d45fc14b874469d62f42b9c84b273bc97b0688766f2d713b972022100e9ef7b1933fd6aa3ae8272f3d178f59cab4f4f5998bf9faaa1791557fec4245c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100dc5ae294908867ea9cfb3d84402f9150ea3eba52581a1435594505653c59b4a902202749fa215a1e51172d887e6a52ca776e6530f8537f8df687fba7ed249836eb6e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-1059.yaml b/http/cves/2008/CVE-2008-1059.yaml
index b869d3db02..86cffe969a 100644
--- a/http/cves/2008/CVE-2008-1059.yaml
+++ b/http/cves/2008/CVE-2008-1059.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
PHP remote file inclusion vulnerability in modules/syntax_highlight.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the libpath parameter.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire WordPress installation.
remediation: |
Update WordPress Sniplets to the latest version or apply the patch provided by the vendor to mitigate the LFI vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100db5f69276d7187ac5e9ccd8fd496e438c208ccece891c346d8bde457e12843ed02204a3892717752fadf89f73626fb71fb105db24ea7b2a8f774024dc523cbaa3831:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202baf6dbc687b03d671808dd265b4bd483e0db5122a79101074736b0280a3b8a6022100fe1672451273fca5b4feda5dac2ed3961821928bc670fa6690bb5a5816910bd2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-1061.yaml b/http/cves/2008/CVE-2008-1061.yaml
index 327215f351..0b16c19cce 100644
--- a/http/cves/2008/CVE-2008-1061.yaml
+++ b/http/cves/2008/CVE-2008-1061.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress Sniplets 1.1.2 and 1.2.2 plugin contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via the text parameter to warning.php, notice.php, and inset.php in view/sniplets/, and possibly modules/execute.php; via the url parameter to view/admin/submenu.php; and via the page parameter to view/admin/pager.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Update WordPress Sniplets plugin to the latest version available, which addresses the XSS vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022009e0335783eef020014410f2e510ddaeb0729cbd858f61bd7142e3099b53a47e022064cfb538a41735c933bef0eec4be787cb021a3e82f3ed2904ecaecb8b3f60015:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d8a1715cd99d2a316fc96a49ad96d5fcb9e60d314fa0227f341da5c5964d63d1022034fc66ce4d2ff88c7bbaad9997d6a4da683cffe1a97d693b84d3918d4654d340:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-1547.yaml b/http/cves/2008/CVE-2008-1547.yaml
index f7e977732c..182e4ff960 100644
--- a/http/cves/2008/CVE-2008-1547.yaml
+++ b/http/cves/2008/CVE-2008-1547.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in exchweb/bin/redir.asp in Microsoft Outlook Web Access (OWA) for Exchange Server 2003 SP2 (aka build 6.5.7638) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the URL parameter.
+ impact: |
+ An attacker can exploit this vulnerability to trick users into visiting malicious websites, leading to potential phishing attacks.
remediation: |
Apply the necessary security patches or upgrade to a newer version of Microsoft Exchange Server.
reference:
@@ -40,4 +42,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
-# digest: 4b0a00483046022100ea8393f7c2fcb36e817067e028b4eb79d7da58d6cb3df979f437089ae9ec5b44022100b5b40586f3165ddb2cbf5e9678ec12ed29ef4c8039ab93e0a5b04f0aa31a595e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022042de3ed0e9fbe496c588f3edb67152006b98090716fbf000556dc8edaf836bf9022056dc3d31d210a950d8ddc0f728c2e9712fe5ec45775636b0fbb655b92a58e095:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml
index bd4476c962..eb2dd50f03 100644
--- a/http/cves/2008/CVE-2008-2398.yaml
+++ b/http/cves/2008/CVE-2008-2398.yaml
@@ -5,6 +5,8 @@ info:
author: unstabl3
severity: medium
description: AppServ Open Project 2.5.10 and earlier contains a cross-site scripting vulnerability in index.php which allows remote attackers to inject arbitrary web script or HTML via the appservlang parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Upgrade to a patched version of AppServ Open Project (>=2.5.11) or apply the necessary security patches provided by the vendor.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502204c02560c678b8087c28bfeed200bf5f25dc9f74261527fa9d7a2fb3b146becf8022100dee5ed65d2accf8d9f2bd7d38d04efb7b5eb7e70f8a26b9ebb580f3c5279e580:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022042436195e99587054a6a10ee089470c1fadab498fe1b556fc0cdcde579d92d5602201b1af0719bba0f8007ca800e10004e6be93d7ec53b7ec4fe0f627c5372dcdca9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-2650.yaml b/http/cves/2008/CVE-2008-2650.yaml
index 4a5a879c39..3dacac2ead 100644
--- a/http/cves/2008/CVE-2008-2650.yaml
+++ b/http/cves/2008/CVE-2008-2650.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
CMSimple 3.1 is susceptible to local file inclusion via cmsimple/cms.php when register_globals is enabled which allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire system.
remediation: |
Upgrade CMSimple to a patched version or apply the necessary security patches provided by the vendor.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502203023e84e303b4688ad150f602ceea289a63ee29df8e12b9f39e6ebac23772d86022100f6e29101c5642afe45708838994bce4898278fe0adfb03b7b2124b7f0ceef30f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100bbdf518966c75a44af19b519ed2a3d642aced2b7aaff600afa01c21c5509066f0221009c184332053f598d45bba3340388cadda4c7c8b8dabdb66884deea62912365b3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-4668.yaml b/http/cves/2008/CVE-2008-4668.yaml
index 686bb887ce..60ae910df7 100644
--- a/http/cves/2008/CVE-2008-4668.yaml
+++ b/http/cves/2008/CVE-2008-4668.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: critical
description: Joomla! Image Browser 0.1.5 rc2 is susceptible to local file inclusion via com_imagebrowser which could allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage.
remediation: |
Upgrade to a patched version of Joomla! Image Browser or apply the necessary security patches to mitigate the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402202feaa0d486d5070e9e7bfd4efd73233251cc5396a98dfc67390f6a5630c2e633022010d10fb2d53407cc4f72002217767dfdf8eef452f44b74b5fe6c27a5029e9c99:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402206851937b7e99292685636e8eef2e6b0b33d2b8d19446ba160013767d605e5fbb0220103e5f70323feb34b2b691f0e0fc3c7c89a457f0e351756ea16091a69d38e1c7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-5587.yaml b/http/cves/2008/CVE-2008-5587.yaml
index 11253a4d4e..2d59d570f4 100644
--- a/http/cves/2008/CVE-2008-5587.yaml
+++ b/http/cves/2008/CVE-2008-5587.yaml
@@ -5,6 +5,8 @@ info:
author: dhiyaneshDK
severity: medium
description: phpPgAdmin 4.2.1 is vulnerable to local file inclusion in libraries/lib.inc.php when register globals is enabled. Remote attackers can read arbitrary files via a .. (dot dot) in the _language parameter to index.php.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server and potentially execute arbitrary code.
remediation: |
Upgrade phpPgAdmin to a version higher than 4.2.1 or apply the necessary patches provided by the vendor.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022033f0c2315a611613fda0fb73c18a12113fa19156574aefbf477b092d512c58710221009494212e159047a9d4f26d0d900af8c3a6c04abb2086da29e47e858052513990:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ad5280aa6eac0929495f63d9882328a6c7dfd9bc0e135183d17a7c4cbc1e741e02203c987c6747a3bd616cd71adf3e491eeaee52d52f4dc1c2e0d5041d063956d83c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-6080.yaml b/http/cves/2008/CVE-2008-6080.yaml
index 3a02907d51..2a1765763f 100644
--- a/http/cves/2008/CVE-2008-6080.yaml
+++ b/http/cves/2008/CVE-2008-6080.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! ionFiles 4.4.2 is susceptible to local file inclusion in download.php in the ionFiles (com_ionfiles) that allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution.
remediation: |
Update Joomla! ionFiles to the latest version or apply the provided patch to mitigate the vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c9a4ffd62555b868c4f74ccec0a683f901fce786056f157a2b745ae2d175c6c902200803e8831676633b7e4035222f60a624ca213872992d2bdf3e6024bc574be95a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e01b4968812ad7ad9b056cd634b2606c5650c02cf33012f5aef863b48bc969340220533ab0def58e9b6e81e56a8ae60e8116c2a03ef694aa21fc9601afd4798bce87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-6172.yaml b/http/cves/2008/CVE-2008-6172.yaml
index af1feed620..bbac849887 100644
--- a/http/cves/2008/CVE-2008-6172.yaml
+++ b/http/cves/2008/CVE-2008-6172.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage.
remediation: |
Update Joomla! Component RWCards to the latest version to mitigate the vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210095f2553fda2f3bf455c5d6646d07cd536a1461506147b3d9f7c73b2c95aaa238022100cd50381518519c3903ec58739cca597e15d2f61c984c96e95876e26a79b860b7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100aef3f723e04346fa7a2f8ac6c5abcf0174ca81a3aeb442367ae4d018f6ff964d0220337061d4274cc4456d6d13a49d5c1782ecb4b44cade9063e2389ffe246990c55:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-6222.yaml b/http/cves/2008/CVE-2008-6222.yaml
index 56eb5bedb9..529ec4dfe5 100644
--- a/http/cves/2008/CVE-2008-6222.yaml
+++ b/http/cves/2008/CVE-2008-6222.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, sensitive information disclosure, and potential remote code execution.
remediation: |
Apply the latest security patches or upgrade to a patched version of Joomla! ProDesk to mitigate the vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e1afab8f9b7ea6d75940642627e9093d1248edb6b7f67043b5d83c2234eab0ea02206f00bafb8c8bdd919ddfde1f0d342b74d4d12749e255eca7e04072de4c509453:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100fff4f0725abf21bcf55b6825cfd022b20b75e41e680ce18e4b08169f2923f78102210092bfa1840e5d2b94020d6226d2bbb157df2c1f344bef122db55ec8da3aba7044:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-6465.yaml b/http/cves/2008/CVE-2008-6465.yaml
index ff0f77db1b..3b7a0f0c62 100644
--- a/http/cves/2008/CVE-2008-6465.yaml
+++ b/http/cves/2008/CVE-2008-6465.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Parallels H-Sphere 3.0.0 P9 and 3.1 P1 contains multiple cross-site scripting vulnerabilities in login.php in webshell4. An attacker can inject arbitrary web script or HTML via the err, errorcode, and login parameters, thus allowing theft of cookie-based authentication credentials and launch of other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patches or upgrade to a newer version of Parallels H-Sphere to mitigate the XSS vulnerability.
reference:
@@ -51,4 +53,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100b80eb05b64f804b1723e8d639c5985bc0aa09179c5f49be126abebb760da43db022100cda31ba602da0faee37f3838369448ee852a5c9a1b2c14cf70103dd503be9475:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402202610c0f8d75d86e21ed6b2d7639a5f879540ed64700ccef63d61d5c49545056802200ccac5c2868b1a18b7542ad02343694a9839c8aa827db9bfde1ab7ba81d1844c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml
index 870d23297f..51f1f21cbc 100644
--- a/http/cves/2008/CVE-2008-6668.yaml
+++ b/http/cves/2008/CVE-2008-6668.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, including configuration files, credentials, and other sensitive data.
remediation: |
Upgrade to a patched version of nweb2fax or apply the necessary security patches provided by the vendor.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100854eb0a19f68fd8f0c16b795237778394d481fedef431451051251d791f7e7d202203cc01a5cbd10885ed29bef8ebf64d830be1f221982512b569ffd9a9a79fdc8b4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f317aa209617a0ac0f5b27dc38710858835641d5769cd8499709bad9cc17fa84022100b0cb6a925a432d6b22fd4ee7412c7fb438956de1fe797d92627665c8aee77a32:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2008/CVE-2008-6982.yaml b/http/cves/2008/CVE-2008-6982.yaml
index d945879fc2..3fd4331563 100644
--- a/http/cves/2008/CVE-2008-6982.yaml
+++ b/http/cves/2008/CVE-2008-6982.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Devalcms 1.4a contains a cross-site scripting vulnerability in the currentpath parameter of the index.php file.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 500
-# digest: 4a0a0047304502201dea20a32ebb693d393be0d294a74bfb5b9eecb6827a8f58f157213a60428483022100e6ccfd9ff53c1724d243de900f9df24ec006a615484403dbdafa7537a3f0adca:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022060c1d7a1d7f167f4a7725386e3770f50fc41cf720cfb3766a490be90bbfc632902207e45517728eabf9310ab9dc5a100c296a85431a2f94ce584aefb7d6c05833a1f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-0347.yaml b/http/cves/2009/CVE-2009-0347.yaml
index 35660774d8..159656a9ff 100644
--- a/http/cves/2009/CVE-2009-0347.yaml
+++ b/http/cves/2009/CVE-2009-0347.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.
+ impact: |
+ An attacker can craft a malicious URL that redirects users to a malicious website, leading to potential phishing attacks.
remediation: |
Apply the vendor-supplied patch or upgrade to a newer version of Autonomy Ultraseek that addresses the open redirect vulnerability.
reference:
@@ -38,4 +40,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
-# digest: 4a0a0047304502203ea8208e5f9c9a959ba132a829842ec16412e7e89e96459e772d992c1a0b419c022100bd66f70af78b54921981fa5210b7501871ae6c713617a56758b1f9b014f98e92:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022051577f83aae8349027a0a3bfc2ed4386c0b9e1c09644dc0ddd098802e023c7e0022100e69fe1be6eeae6d3523eaf92aa776f94d0e42396edf72f348c0378ef7cd1da9c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-0545.yaml b/http/cves/2009/CVE-2009-0545.yaml
index b3d9db9a47..007940e9e3 100644
--- a/http/cves/2009/CVE-2009-0545.yaml
+++ b/http/cves/2009/CVE-2009-0545.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: critical
description: ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action.
+ impact: |
+ Successful exploitation of this vulnerability allows remote attackers to execute arbitrary code on the affected system.
remediation: |
Upgrade to a patched version of ZeroShell.
reference:
@@ -37,4 +39,4 @@ http:
part: body
regex:
- "root:.*:0:0:"
-# digest: 490a0046304402203105e50de1b89b0165f438c48a50bd8a44fa30fe03592c5339c4a2949854804f02205fe7cbf331da5c49f1ac8be6ab55653b4358eb25d9be80a5c5df917c3cf205a2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c159232e524cc33af61389e36bdf93790ac051100d465a44d101fed437d6d01902204c3f4b377b80d05a6d606971b970a5f55e7a05e99e48a7ded66295d9c1c523c2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-0932.yaml b/http/cves/2009/CVE-2009-0932.yaml
index d70da60c02..3da2192a79 100644
--- a/http/cves/2009/CVE-2009-0932.yaml
+++ b/http/cves/2009/CVE-2009-0932.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 are susceptible to local file inclusion in framework/Image/Image.php because it allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server.
remediation: |
Apply the latest security patches or upgrade to a patched version of Horde/Horde Groupware.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a48cabc5ed3721b402591d4860fd38d126b7e940ba2c6425733a7625ad7cabea0220690367ee6216c533f32eee62a5df670afffdd17227db036d876ae0a981872bdb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100907faaad405c2236acd897cde184a91ef45ebbb033646c1c1e188b95abf7c2c202207c5a4151cd8bfbbf28ff42b726095b019cc0d25d4d1e2105313cc0a7cbd516a9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-1151.yaml b/http/cves/2009/CVE-2009-1151.yaml
index 3dcdf47ba4..646906dc75 100644
--- a/http/cves/2009/CVE-2009-1151.yaml
+++ b/http/cves/2009/CVE-2009-1151.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: high
description: PhpMyAdmin Scripts 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 are susceptible to a remote code execution in setup.php that allows remote attackers to inject arbitrary PHP code into a configuration file via the save action. Combined with the ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and potential compromise of the affected system.
remediation: |
Update PhpMyAdmin to the latest version or apply the necessary patches.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221008e02fe97aa25d53673b25be320c0bb7d2c2f5de32b0479a6642d19caeac3176302204fbb68c73be955fb7ee136f5de9ba91f1183b932cd44a37339a3cb3629f682ff:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022072b55f94dd31deffee60f3cb3634845a62d55cb762cc7ff386cbb87e86628a46022100f409fca70224214acee88679b54a62d491ea8aa4097e70f6ae316fefbf08c8dc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-1496.yaml b/http/cves/2009/CVE-2009-1496.yaml
index 451e83adbc..6f335992fb 100644
--- a/http/cves/2009/CVE-2009-1496.yaml
+++ b/http/cves/2009/CVE-2009-1496.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Joomla! Cmimarketplace 0.1 is susceptible to local file inclusion because com_cmimarketplace allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution.
remediation: |
Apply the latest patch or upgrade to a newer version of Joomla! Cmimarketplace to mitigate the vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bf287275ed797bae0cb3d5d4acfc9b8e5bd3828436e45f96592c55c65cb1baa4022100ef79bc142d4be9f1c8cdca1b30e44293bf696b5686318e5ae13a18638f2267ad:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c631ca9827b32f40f6e831f6b142d509929a3a274aaa2539bd9a3bc70a6a277902202282dc777de13ade8043e5e0b684506c08b0f8362cece8841ae64f2d12922f4c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml
index 5edad531aa..66e6bfa43e 100644
--- a/http/cves/2009/CVE-2009-1558.yaml
+++ b/http/cves/2009/CVE-2009-1558.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Cisco Linksys WVC54GCA 1.00R22/1.00R24 is susceptible to local file inclusion in adm/file.cgi because it allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the device, potentially leading to unauthorized access or information disclosure.
remediation: |
Apply the latest firmware update provided by Cisco to fix the local file inclusion vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022072672def0c3c68dd608f3004581175afa8c339fb1dbe169c26b79537cc7a0619022100c7d94e2588ae1fc4f1093b3f7e02e4d2aa8e3d985506056636a77e58ba170c1f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009c71a1215235e49ed75ae5b6eeee4ad1e9cf5c5fbc2255aa4d4100800dbcc4ba022100814e7f6abe3bd9504fea75427a7595f0867986ff0f82ad2a6723448d3890a0ab:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml
index 81d0a7f865..ce82b92d4a 100644
--- a/http/cves/2009/CVE-2009-1872.yaml
+++ b/http/cves/2009/CVE-2009-1872.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: medium
description: Adobe ColdFusion Server 8.0.1 and earlier contain multiple cross-site scripting vulnerabilities which allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade Adobe Coldfusion to a version higher than 8.0.1 or apply the necessary patches provided by the vendor.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100f880585c3b7a9bf4bace78a0d12cc7b59987555063071d3b42d5a6ec991e5fc402206d9ea98a5964a7b6b3fd001ec59a4a6a4018795896552e88707057bbf2984cf1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100bcb065b4315286d0190f8d478c738b86bc6bbf0a9eee7e6b4c473e41e01c1802022100c1f7c414f91bd4fa0876cc2bd72f1be77b892b1d20003177d66640667e38aa3b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-2015.yaml b/http/cves/2009/CVE-2009-2015.yaml
index cda2bb459b..4ca2de61da 100644
--- a/http/cves/2009/CVE-2009-2015.yaml
+++ b/http/cves/2009/CVE-2009-2015.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Joomla! Ideal MooFAQ 1.0 via com_moofaq allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter (local file inclusion).
+ impact: |
+ The vulnerability allows an attacker to include arbitrary files from the local file system, potentially leading to unauthorized access, information disclosure.
remediation: |
Update Joomla! MooFAQ to the latest version or apply the official patch provided by the vendor.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ecd994a0eb2717ce10c4b5c91e5280c1fd8fac39010ab27a6e7dd81ad84421d3022061a0659d0ab3cf0e69480b1407ab7d15ea63da4942aa97535f935fe18c40d1ae:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d8c26e00ba2ed5716865bac39ee41243548410e07a5e04e196f13ecb86b5f6f0022029bacb42734f85338a1131945160673281e9ebda83ca881f2aba07019b4c2330:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-2100.yaml b/http/cves/2009/CVE-2009-2100.yaml
index 0e4ce039d9..57cfc09f72 100644
--- a/http/cves/2009/CVE-2009-2100.yaml
+++ b/http/cves/2009/CVE-2009-2100.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! JoomlaPraise Projectfork (com_projectfork) 2.0.10 allows remote attackers to read arbitrary files via local file inclusion in the section parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation.
remediation: |
Upgrade to a patched version of JoomlaPraise Projectfork or apply the necessary security patches to mitigate the LFI vulnerability.
reference:
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100843946ac00e19969b2641e5f8b8c44b890e6dd8226f04c95aa84a62843d6219b0221009a53d57de2bfea8a7b8bb17dd7fd7b8ae9299a4080a7610269331a945dc481df:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210091f181784616328a479c0a45ea51ca6e3ec45cf35125c50b1a74018f9dd535a7022100dc27152143b4d3818133866645b2e1e1f647b142875a267d0667d9e9c7c867f9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-3053.yaml b/http/cves/2009/CVE-2009-3053.yaml
index 4fa1250de8..af5743455d 100644
--- a/http/cves/2009/CVE-2009-3053.yaml
+++ b/http/cves/2009/CVE-2009-3053.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! Agora 3.0.0b (com_agora) allows remote attackers to include and execute arbitrary local files via local file inclusion in the action parameter to the avatars page, reachable through index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, sensitive information disclosure, and potential remote code execution.
remediation: |
Apply the latest security patches or upgrade to a patched version of Joomla! Agora to mitigate the vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100b811a5bc6dc389222b5a3b2f6348b1bcdc4da180e2f621afdd6b06581e7db2be022100f760318fa5da56e59b4164508d2560e355438a21041091b07eb695f19467d51d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100a1f28b173218b3d629d38aced121196c827be859dc4aca670b95c7b18307b430022049aa913dbdffabe7a2c1cf439f0b580f53add89ba434c8ad0a2a22652bd51bc4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-3318.yaml b/http/cves/2009/CVE-2009-3318.yaml
index b5b5fe5691..0500d83687 100644
--- a/http/cves/2009/CVE-2009-3318.yaml
+++ b/http/cves/2009/CVE-2009-3318.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Joomla! Roland Breedveld Album 1.14 (com_album) is susceptible to local file inclusion because it allows remote attackers to access arbitrary directories and have unspecified other impact via a .. (dot dot) in the target parameter to index.php.
+ impact: |
+ The vulnerability allows an attacker to include arbitrary files from the local file system, potentially leading to unauthorized access, data disclosure.
remediation: |
Update to the latest version of Joomla! Roland Breedveld Album and apply any available patches or security updates.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022025c84025809994ed122c6b1eee98bcf3d7b45244c28b2e007708b624f8fed7ca022100e65d6b60af4d2ac032f3e91762da0bb8d31027cf10958a2c6de7112ec4c2aa69:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205a8d55e39ef2ea81aef6917c75f74e1c17a628dc7048d68593bbf43b03dc8d86022100ebf7f9db037558e784a25d3fbb3d33cd5aaaa5cfef70c4974e29a2bc48f623b8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-4202.yaml b/http/cves/2009/CVE-2009-4202.yaml
index c34bbe52a1..a3da99748f 100644
--- a/http/cves/2009/CVE-2009-4202.yaml
+++ b/http/cves/2009/CVE-2009-4202.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Joomla! Omilen Photo Gallery (com_omphotogallery) component Beta 0.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution.
remediation: |
Upgrade to a patched version of Joomla! Omilen Photo Gallery or apply the necessary security patches to mitigate the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100cc34793390f6a455392251d314e76db191c695bb242f901992f2fed5d30deb2a02203db9da85de2f6409024c76ec318dee40be8344b6c1484486afbb1a6986bcf231:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220039a98604f42ee7ccff3678a04d529befe9dd08295868ac0d4e6e725a91cbfd10220045ad4a883e12545de1290ad6fed5f97abefbc452ac43de71e42e1904acbebb7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-4223.yaml b/http/cves/2009/CVE-2009-4223.yaml
index dbf62e2b38..4cab0df46c 100644
--- a/http/cves/2009/CVE-2009-4223.yaml
+++ b/http/cves/2009/CVE-2009-4223.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: high
description: KR-Web 1.1b2 and prior contain a remote file inclusion vulnerability via adm/krgourl.php, which allows remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter.
+ impact: |
+ An attacker can exploit this vulnerability to include arbitrary files from remote servers, leading to remote code execution or information disclosure.
remediation: |
Upgrade to a patched version of KR-Web or apply the necessary security patches to fix the remote file inclusion vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a31c2cc438bd399b0ff46d0737df967df4f8636a9545dacfb35f4c0fd16fbfe8022100d8ff3adcae6bbe7f02f215edf09b98d9890993edad83c73ddbfad540d5862f9e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f241e186edb9af52a94d640b6a9e57852c75c54669bd59af1aafb3cf6ee08258022100c680d5c1c0b6b27a520c2401d2c1aa0a9978874b840bf8f52c24ba6fc4c50121:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-4679.yaml b/http/cves/2009/CVE-2009-4679.yaml
index f7d8a7e9b7..be572176b2 100644
--- a/http/cves/2009/CVE-2009-4679.yaml
+++ b/http/cves/2009/CVE-2009-4679.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Joomla! Portfolio Nexus 1.5 contains a remote file inclusion vulnerability in the inertialFATE iF (com_if_nexus) component that allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
remediation: |
Apply the latest security patches and updates provided by Joomla! to fix the Remote File Inclusion vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221008b806c6b509027ab419fab38023c2270cef1e3f60dc3b633fcacb5f8983dd8cf02205a10ec21151ba918555d2ea46f2e687dc5d87cec0d39ebc0a0b57409e230999f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100fd99275b8ffe3388f14498c542a677e467dc6409ffdede89b682d47aa5e98d8b02205e878695cd94db9f7e485d448c02aa9df416a8c7cfd6d160dc8197f103e279d7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-5020.yaml b/http/cves/2009/CVE-2009-5020.yaml
index 93bf8a58c2..08a8e291fd 100644
--- a/http/cves/2009/CVE-2009-5020.yaml
+++ b/http/cves/2009/CVE-2009-5020.yaml
@@ -5,6 +5,8 @@ info:
author: pdteam
severity: medium
description: An open redirect vulnerability in awredir.pl in AWStats < 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
+ impact: |
+ Allows attackers to redirect users to malicious websites or phishing pages.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2009-5020
@@ -35,4 +37,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-# digest: 4a0a00473045022014c3212369c069e74aced2e09cce019e7e3b3886dfccc0ba176b48f527d4b043022100f78dc1e0ff2cac698e269f9ef77e3fcdcd42093d0b5e83408b716fe56dc61a24:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402200bd227f253fce18d4e4dd678a4cc08f7497a6058e0f1f1b544eb1e5ba22785f7022069b1097b262d7b9c4eb7fc023566c7c5ed00eba4c26e9dbf4400cbb4b4b9cc58:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2009/CVE-2009-5114.yaml b/http/cves/2009/CVE-2009-5114.yaml
index 6b4c683be3..4fcbcb99ec 100644
--- a/http/cves/2009/CVE-2009-5114.yaml
+++ b/http/cves/2009/CVE-2009-5114.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in wgarcmin.cgi in WebGlimpse 2.18.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the DOC parameter.
+ impact: |
+ An attacker can view, modify, or delete sensitive files on the server, potentially leading to unauthorized access or data leakage.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/36994
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b6c44cb3482f8af652dee916a6c29922919394156205dd5af4613be52de7636c0220267ff1847f78cf578c20c01583d01239ad9f6e99849d7ba6c676758599057209:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c11864aea146ea6435caa4fa55436335832385d19a76a69f9b1e4d0715768f20022064458c5f14208af4e71638abc8560be81a228ca423a9dfbcf3bed250a4e70ed8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0157.yaml b/http/cves/2010/CVE-2010-0157.yaml
index 0accd4e0c6..47a5d2a53f 100644
--- a/http/cves/2010/CVE-2010-0157.yaml
+++ b/http/cves/2010/CVE-2010-0157.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Bible Study (com_biblestudy) component 6.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter in a studieslist action to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/10943
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ceeedcc9f9dd5600c7fc59e5441a85a74f2cf464291aaaf3aff0e3a10ff69453022100d99175c115a1b1205fa7d13ea7fc618f6db58e8b226011dfc16aa015c67b1064:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100862d6d8773869cf58419d323a548a4fe4934ffe52e1a773f8332d9c8bbb0efb60221008df16010b4804b0f237b8798cc9cdc67311efd336768a46455967917e0f4bac8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0219.yaml b/http/cves/2010/CVE-2010-0219.yaml
index 12c6d0ec15..3aa975a83c 100644
--- a/http/cves/2010/CVE-2010-0219.yaml
+++ b/http/cves/2010/CVE-2010-0219.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: critical
description: Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information or the ability to modify or delete data.
remediation: |
Disable or restrict access to the Axis2 web interface, or apply the necessary patches or updates provided by the vendor.
reference:
@@ -59,4 +61,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221008aeb0223b59b1f43d1b5d86891682f6fdabd96f95cf747888a3ea67ea2d961a0022100ebb625cdd128e413ab38e6562e20e3b8cebdf838ac95c99355133af62512e6a0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100da41e43897f5784bf8aa6bc1dfb5721db7618454aaf6c4182246a13b30b47a86022100ca97f29ef3b646a1cdf2f366ed582fdbfcf01a0a1c1c32ba84089c386e96edf1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0467.yaml b/http/cves/2010/CVE-2010-0467.yaml
index dbe1f28190..3c83303be4 100644
--- a/http/cves/2010/CVE-2010-0467.yaml
+++ b/http/cves/2010/CVE-2010-0467.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the ccNewsletter (com_ccnewsletter) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a ccnewsletter action to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage.
remediation: Apply all relevant security patches and upgrades.
reference:
- https://www.exploit-db.com/exploits/11282
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502204dc0e897ea68285bef1f12bcf5834d2cf101e68c156ce46626c2a06f4985d407022100822e5427795b4bd8e13344064b70a624e097115c521a1eea3ec95769751e9e83:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402200df40dfac907595943e5906f98bfab1609a82ae9c703da4b7d0fb4ea5284c2b9022073136420b9d293e938fbbd6db582642f6c0f5836eda85d321af7e0855670c72b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0696.yaml b/http/cves/2010/CVE-2010-0696.yaml
index e823a0ff4c..2102ec0059 100644
--- a/http/cves/2010/CVE-2010-0696.yaml
+++ b/http/cves/2010/CVE-2010-0696.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in includes/download.php in the JoomlaWorks AllVideos (Jw_allVideos) plugin 3.0 through 3.2 for Joomla! allows remote attackers to read arbitrary files via a ./../.../ (modified dot dot) in the file parameter.
+ impact: |
+ An attacker can exploit this vulnerability to retrieve arbitrary files from the server.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11447
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100aecd172f508073b0b8d64784bcb420de171daff3e0a8732d29ac71488c81596f022100f9b3c9f9ed1f055178cca21e303628b061871cbbd562c6202a00d7a71ced76e5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100801f99e10fa7f37fb9a01ff4c8eb0a4b11e2193c7e16b9c3b8a0c50ca6e4a242022077c086d823e3b8131dff5b37562334ce5fb778ead2312cb35f1b49c8fc26f8fc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0759.yaml b/http/cves/2010/CVE-2010-0759.yaml
index 29cd373d06..3d6f5cab73 100644
--- a/http/cves/2010/CVE-2010-0759.yaml
+++ b/http/cves/2010/CVE-2010-0759.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php in the Core Design Scriptegrator plugin 1.4.1 for Joomla! allows remote attackers to read, and possibly include and execute, arbitrary files via directory traversal sequences in the files[] parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access or information disclosure.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11498
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205591d9316f159c3eb27f1e668e68d61205761aaa141dbe50f406eb90e779fa5602207db633a31bf0a118f73eed7a38df4e593557497eafcd2199a5435cf7bf09c1d4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220255aee4e219ee166e143888630a4e6af23c3e9b385d922dd866339bdc5d96be2022071f5391c8ceecfede26dd5441388c1f6728c9f693e05b50f408851b94f23f21a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0942.yaml b/http/cves/2010/CVE-2010-0942.yaml
index 31ebe56064..d8d2e8e160 100644
--- a/http/cves/2010/CVE-2010-0942.yaml
+++ b/http/cves/2010/CVE-2010-0942.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11089
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022006730e9bc41d35c653ab87390772b2a4df527eb5cb3c9344d8dd31c4a2fc4f4202201c6ad57ef58398872f397ae0061c50864c955cd569b5f40316da8f32f5f15289:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022078b7a4981e20f380f36effbae103d8a364963690fa024b7b4b7f0a7731eb4faa022074cef19a8c876a25c892881ca87de44f31f764fac0538c01c8de31916e40390c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0943.yaml b/http/cves/2010/CVE-2010-0943.yaml
index 06b53b272d..e423797e96 100644
--- a/http/cves/2010/CVE-2010-0943.yaml
+++ b/http/cves/2010/CVE-2010-0943.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JA Showcase (com_jashowcase) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a jashowcase action to index.php.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server.
remediation: |
Update to the latest version of Joomla! Component com_jashowcase to fix the directory traversal vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b4abc2e6bac634509e9798e53e57b2bf8a45ca56ea0a39fd25d23d5cdffeabe102204899c1bede7831fe28b97c5b8da0cc7813575cd66ce76771af9cda761cfefc91:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100fe6e90550c4cac8714140e552ca1f8dffae1d1cf10acfda1fc2a4f1eeb04e6070220261fe0eb98e8dd254ca2bcec2deb3e7ca3c6a2bb20a00488f400c2ba4764814d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0944.yaml b/http/cves/2010/CVE-2010-0944.yaml
index a0c069d86b..b9411f790a 100644
--- a/http/cves/2010/CVE-2010-0944.yaml
+++ b/http/cves/2010/CVE-2010-0944.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JCollection (com_jcollection) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11088
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210093fe6fc6aafb9aae82395913f89c943a912983b9c5963c6f58f9b5fa0209f5c9022100f3694c1e8c9202a4cf29516761dba19426b82ac5ac959b3c88540c780c35b698:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210087ecb7ece9df8ee3e3e0fc6760a67762868e12f33b0c59f6ea3bc3ccc135a1b10220607ba4bacb84ca32dd3502bcd9973930e71855eb417a6afbb0bc270df349b136:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0972.yaml b/http/cves/2010/CVE-2010-0972.yaml
index 3bf1da94b0..af6e5f85dd 100644
--- a/http/cves/2010/CVE-2010-0972.yaml
+++ b/http/cves/2010/CVE-2010-0972.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access or information disclosure.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11738
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a6b583f7a3d7c073b0520d3c46a03a8381d6af0c086b1e37d29a024ce3a4736f022100cceb855f29d8dbef1c720e88cc3b9e57f023e4eeed5ff44b55a8b3c5f105e020:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100835d6327ecf3d8a79d891ab1671b58279390bedc0356214c4e0de666716a7abf022100e97639abcc162d391b35333f8165ab636eb06cff21510992ef20035e525b535f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0982.yaml b/http/cves/2010/CVE-2010-0982.yaml
index 9557b32d20..16da120308 100644
--- a/http/cves/2010/CVE-2010-0982.yaml
+++ b/http/cves/2010/CVE-2010-0982.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Allows an attacker to read arbitrary files on the server, leading to potential information disclosure and further exploitation.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/10942
@@ -37,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402207804d47856db88004e7d770a6b9e4905869a3bf0bb5f80c77a0db3fc02ab2e0702207ef90a49afdf02b83e9ae8900297deec4d77ec96ed9e67afa4ad99a64d3c1da5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022004764a55873eedeef437f72de5243dc952d7938bf93ba6a44be94b1e3203d4b40221009e8e1775682357e291ce78522ca980a6d8238ef79e4e6f7cf72548f7e5bec5aa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-0985.yaml b/http/cves/2010/CVE-2010-0985.yaml
index 569a077687..e19aab2f21 100644
--- a/http/cves/2010/CVE-2010-0985.yaml
+++ b/http/cves/2010/CVE-2010-0985.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/10948
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022055b85a1187baab16c8619c44f333fa95a769f02d9c90cdc3b92da9af37ea765c022100ec5a4ddaf568dd08d9c499fa59981a08562d8b461b1d21bb0dc8d0479619d3b1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f11e7c1ef169ed3e6f170b354e5066def58df0ecb303905be2cb692bc749d50f022100bc2fa70ab2d2506cdd3c9d9a30d099823223d9a45ca34c9ebef974f8ebb45242:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1056.yaml b/http/cves/2010/CVE-2010-1056.yaml
index 36ded21767..2f02fa0e59 100644
--- a/http/cves/2010/CVE-2010-1056.yaml
+++ b/http/cves/2010/CVE-2010-1056.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11760
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a460424f7d97033dcbe266eb3791229f7a28b8fc530061e37d85ab04597effb002200a8c83bccd2fed2c3c8bfe321e68864093f992bda6481aa461d52b0a581836f2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206f23347fc78c49c9e4569468806b46c1f3a0a646c189a57c6e021e848668bc52022100d08e6c11bd627fc6eb6668dd39684ae70f76f50186063a230f92a15306a6dafe:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1081.yaml b/http/cves/2010/CVE-2010-1081.yaml
index c1fcc917f2..811b4cafde 100644
--- a/http/cves/2010/CVE-2010-1081.yaml
+++ b/http/cves/2010/CVE-2010-1081.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11511
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100de73743eee8e218a64f00aee1fe51a44879f19bcc8b23166f946f07745624b6d02200c0609ad7c96266004a9dbd6ffe741bfeb5bfd2af21dc17c18c71b2b1deea71d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e30cde27274d020eca121c42cb054cc13396f5f6f7ec473d9e230814405ba65f02207f6f47e4db6c69be8b7442d0214777a30b8b37a8b5f04dd07b5e7e12bd3c3ee5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1217.yaml b/http/cves/2010/CVE-2010-1217.yaml
index bab015b3ea..5bbe680253 100644
--- a/http/cves/2010/CVE-2010-1217.yaml
+++ b/http/cves/2010/CVE-2010-1217.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE -- the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11814
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bd055bd6502d4b4a22b3f99f8b75ae7fd4d249a00d2d63062d041dd7dc23747d022100f3d3a5787ce5a40534d37ac4cde47925775cf0f453c8048bad186baee48a0e4d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402204b0e6fbebe96039eec5eb535b07e2d769ebf29d714105a0e8516df81a99580eb02200d0bce9a850e85fdf23c0adde163f704107a4b53554740537a0b640c66956d6f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1219.yaml b/http/cves/2010/CVE-2010-1219.yaml
index 8f579c6260..d744e23582 100644
--- a/http/cves/2010/CVE-2010-1219.yaml
+++ b/http/cves/2010/CVE-2010-1219.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11757
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022028b9258dfa53cbf4a25f22b1a2d54ca076fd0af9d1b91249b029d848b42cbc7002202aba1a085f6eeb87eacccc07c59515c2e66ae771bd35fee5cedb8b8aa36620a7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220596ef1369c12f8e3a916e8f9e33299432b1178e9ce95fde59ddc34f77142d2f7022100e9739fb2c8ce4e2826687b0ebd6931d92e35a1568effea53043306c97259db88:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1302.yaml b/http/cves/2010/CVE-2010-1302.yaml
index 994ddce73e..07a22db236 100644
--- a/http/cves/2010/CVE-2010-1302.yaml
+++ b/http/cves/2010/CVE-2010-1302.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access or information disclosure.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11978
@@ -37,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220346626db9d1e2e9dc2cb7b66f34fd4785e75af4d9d5f7c6643cb298e1be166ad022100a2d43a822439066dbbd49736f821a4ffa4128015862c28991a7e243f7d511cfd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100b57708e6b86599b708a873726d3263ce9e0d49d0e76391bb6e037a1e4937404e02205933cbacd47892558c18c7db7b4e88a0b4baec456d1c7c5491d0e2c9866f4c1c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1305.yaml b/http/cves/2010/CVE-2010-1305.yaml
index 12ad4332e0..4b9c11b144 100644
--- a/http/cves/2010/CVE-2010-1305.yaml
+++ b/http/cves/2010/CVE-2010-1305.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12065
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e0a4475a7c35058ce79f49d108bb180242d90cc120c530dd911afd5c66f8a9dc022076d45a27b53fd0cafb5d7adac7596d2f6b6c776544037f7117ba2e8693824aec:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e7b04454a6bb69f264e4dd4754eee56b3022c4c5ac84e46575de2bb39dcd4a51022100956719ea0bbde43fd2079b3d401d9f87038ff2daa9c9f264755da2c0fc2a9aae:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1306.yaml b/http/cves/2010/CVE-2010-1306.yaml
index 92be8dcec6..6fb0d4e198 100644
--- a/http/cves/2010/CVE-2010-1306.yaml
+++ b/http/cves/2010/CVE-2010-1306.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12058
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100db8f60e834d718a187a6affc3ddd8cb07625e1fb067e4d68b5a6f6bab98a0eb3022100b6da76ed5c5b35f5529aa45b95f8de9cc608a6c066dd69264579dc8b909dd0bb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e1f4f0060c68c73b81b05fa0c036c433de7e7de661c13e245b6519b209dd0686022100f724f0853fa864ea201f7b3377b3a7ae4bafc82fb0db4544f09b7092d505e11c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1307.yaml b/http/cves/2010/CVE-2010-1307.yaml
index 9cf836c028..360c5c2c26 100644
--- a/http/cves/2010/CVE-2010-1307.yaml
+++ b/http/cves/2010/CVE-2010-1307.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Magic Updater (com_joomlaupdater) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12070
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022048439f47a8b21a74b4b97fa613ad972080db3db4fe053230262199d82317045c022100eadd5c390ee4731465f6f514079896cd72f934fd9895315d895f65374aea4e72:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204ea305e21cf6b002e44afd364c3d21030b96316a544c492604ec10f5ff96ecac022100cca452f129982dde163f273a63e54d06d5e6496eef9837cb8c2de19cbe2f74cc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1308.yaml b/http/cves/2010/CVE-2010-1308.yaml
index b7bcb60de3..7ab4dfd294 100644
--- a/http/cves/2010/CVE-2010-1308.yaml
+++ b/http/cves/2010/CVE-2010-1308.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the SVMap (com_svmap) component 1.1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12066
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402206a9af6404f873c9d3a57fe9df213511138f01fd29e3ea7105a802d41cf78924102205cb464a7bda81580894d76175190846c791dc1cd402a21817590737b159112e2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022064827a2b3a8d58ef4a2a3c46803548cec0052632c4c7f8d21f18118ebd14b3c6022058eb78319f044f69ba50ef4e0d899e39e70636966010a842185bd8f281387cc8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1312.yaml b/http/cves/2010/CVE-2010-1312.yaml
index cd667f1c0d..fb3b2be6e3 100644
--- a/http/cves/2010/CVE-2010-1312.yaml
+++ b/http/cves/2010/CVE-2010-1312.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12077
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f17626c6c2fb265ab27fa0646a728898f1b0c9f3fa847a9fb431a0e39fa82e8b022100f8103d182a1847d338a89d951149a9075835a9588ed011933dfed7688f480995:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100867fd351a2a90244ed77e8046adc2180f92604b75e069d398751668b18310e9802202d41ba7430bbc6e96d855278855e1aefd1286ec09c836f3de9de918bde460e87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1313.yaml b/http/cves/2010/CVE-2010-1313.yaml
index 8e12721736..e298444bc2 100644
--- a/http/cves/2010/CVE-2010-1313.yaml
+++ b/http/cves/2010/CVE-2010-1313.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the Joomla! CMS.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12082
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100fd165e012bb572dc265b83b5ca8b9c947ddf01bea06fde0c71635d59e7c796e0022013898e8cab7e473e13999ca183c3d97e6bc26290443ddbae95c4946d4faf0ef0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022069608b00d6cce302d41960d97e53dffd2328158a421962cdc5d326a3c65c13d60220253869fcf736190901161cb37df82fd67626fa6b943ac18ade19c1ade10bcba0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1314.yaml b/http/cves/2010/CVE-2010-1314.yaml
index 502fc07ce6..6b7a0166ed 100644
--- a/http/cves/2010/CVE-2010-1314.yaml
+++ b/http/cves/2010/CVE-2010-1314.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12086
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c6e61051c3e71766db8c93f1cba690d9e313100d617e7e936a55e737e9bfb3a802206edbc197346bf2a84a7297e202c7b67251c8f0546df7eb690cfaaa5d18b11595:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402203ab74f27464637000a111771ceabe7ebf60c232bbce13a6e98a322da6de8bee8022004e7174b83c84a10ed6ef3361845038a32769c167a8c9af5e13cf68801097e59:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1315.yaml b/http/cves/2010/CVE-2010-1315.yaml
index 55697e9658..263ae97d41 100644
--- a/http/cves/2010/CVE-2010-1315.yaml
+++ b/http/cves/2010/CVE-2010-1315.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11999
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100935bdcc2bd3179773fce042c4a61ef810c9d2f814a47b93881e7c146477ff010022100a764011c1841a4d9b132ac59b8dfdb0592de77768416839b1f9c5f345112fb51:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100dc7c7d05af07a16c8189bdfeedfdefc06822cfb29f3b88ef920758007b104b2702200f9367dbbdc9cff4443413464334b1c74617dc88858f43e18aa91c25673c5203:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1340.yaml b/http/cves/2010/CVE-2010-1340.yaml
index 2965e9af5e..bc54569366 100644
--- a/http/cves/2010/CVE-2010-1340.yaml
+++ b/http/cves/2010/CVE-2010-1340.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ The vulnerability allows an attacker to include arbitrary local files, leading to remote code execution or sensitive information disclosure.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/33797
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e147f2ff0fcbc48bff40b1ff5321883b2cc1adc91b31edfbb2600c5a8263862402201d97ad50b2b9fde2cff5a0c0239416196581f96dc8d5eff323bec0845867888b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008fe8611cd1efc4f804b1ee87a4214c6c9b21fc126850ea0f1f125c3338f0ed18022100b42e613cc4df538c18194ca7642095e0466c2d796db442442718dadcae08c21c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1345.yaml b/http/cves/2010/CVE-2010-1345.yaml
index c290568252..50c58cc2fc 100644
--- a/http/cves/2010/CVE-2010-1345.yaml
+++ b/http/cves/2010/CVE-2010-1345.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ The LFI vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/15453
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402203bd1daa526a86b54b75dd6e090df43e78b56b22d1ddbff6a1ef56f04466f7e5b0220739e8df81fe0c2e77b397f7d2e0b4e334394ce071ea6a71f9168fea8414a941f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100df0e15dc8ad751dfc509ae1b4143e07b3fb4ed6a605f8ade6971a5802196c61e022100e1d144cc199d7989faa57edff4c8b453911e79d83078f283231bc8863acab853:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1352.yaml b/http/cves/2010/CVE-2010-1352.yaml
index 71916abfbd..450a69d822 100644
--- a/http/cves/2010/CVE-2010-1352.yaml
+++ b/http/cves/2010/CVE-2010-1352.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12084
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100cfca9f9c725e410d29e54e6b5d02eedb50e515395715de8019d2c3314e3cf3d302202df3ddf237a67c191f3bde94abc572e0a3ffe5dc0f56dbcf14e0921c3bc8d812:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220499958bd8b65329c91db733607eda67f42e998529c2f50d7bd31533e2f16099f0221009a946f09a949fae53df09425fbda4d4ed20e2bbe6efff9498d618febbfa13ba7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1353.yaml b/http/cves/2010/CVE-2010-1353.yaml
index 600685cd42..caaaf7e905 100644
--- a/http/cves/2010/CVE-2010-1353.yaml
+++ b/http/cves/2010/CVE-2010-1353.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: |
Apply the latest security patches or updates provided by Joomla! to fix the LFI vulnerability in LoginBox component.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221008d048e5078f229b37cb81e90eaf130150a30ba619c876b18220cd4e112a07930022100c9c281d897386357f77dd4b97c302ab1490dc0a2c85ac217b57c888b3a82f978:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100a72b93687ae905cb435bd660f819c05235fbbba93843921d66c92829f89326e5022100fa0275f518da4c827f358b9e50a65d64a79c88d9575fb5c2345c113944b2b673:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1354.yaml b/http/cves/2010/CVE-2010-1354.yaml
index c347f154c8..9e17bd4159 100644
--- a/http/cves/2010/CVE-2010-1354.yaml
+++ b/http/cves/2010/CVE-2010-1354.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12102
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e7ffeef32693f6aaa1b9e73715026da5c9cc7ae3faeeba9b011d109229d4d711022043a4839f8f123a837925e5cbb0dbcd262d27ed75f3e07bd926872ccf644d6f44:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100b5d1dc1258511f9a3bbcbb0f0046814c02884c77cd78b0aeb5347a539fd1704202210092074be1dceaa45c5bec4c8cdebe96901e5956aeff8bb2296f16b5e79131c0a9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml
index 72e511305c..89fc3bed5a 100644
--- a/http/cves/2010/CVE-2010-1429.yaml
+++ b/http/cves/2010/CVE-2010-1429.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Red Hat JBoss Enterprise Application Platform 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 is susceptible to sensitive information disclosure. A remote attacker can obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression.
+ impact: |
+ An attacker can exploit this vulnerability to gain access to sensitive information, potentially leading to further attacks.
remediation: |
Apply the necessary patches or updates provided by Red Hat to fix the vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100cdc0f292decb28743adf2f23fffa226f0cfd208303a82282a13b1d34c1342f3e02204329a76e1cb2adadd04c7c271fc5fa03ea4030315e839638599a046a5ee65c9b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100eeb17d0a55fe9c292ed360d93e7dc16c7902595cadb704b45bded9319b572a7b022025cecd4333e92104c46103332061db86c2f1fb967473f61b7cd1f0f37afdc41d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1461.yaml b/http/cves/2010/CVE-2010-1461.yaml
index be154b3e06..a832f1351d 100644
--- a/http/cves/2010/CVE-2010-1461.yaml
+++ b/http/cves/2010/CVE-2010-1461.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php.
+ impact: |
+ The LFI vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the Joomla! application.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12232
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e85030cf632a155f98ccd3f5428e6c94f85503b2707ebe8c899f9efcb0af1ba1022100b682c31513f0e846c2ee8df5221596ebfe97005c4c2e2e939d6e2891ac80b27e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210096d617b9e4bee8999116e4486ab5679a0f8a0e2c3499f80dfbd7e82d29148637022052f87a0ce7cd16e33e9ff539425d1f7229f81901d825193e4586e89a021a2f87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1469.yaml b/http/cves/2010/CVE-2010-1469.yaml
index 15c908a6ce..f9902c7043 100644
--- a/http/cves/2010/CVE-2010-1469.yaml
+++ b/http/cves/2010/CVE-2010-1469.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Ternaria Informatica JProject Manager (com_jprojectmanager) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12146
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220509cc2f4146534580c7a7913594d4ef19b77fd1c74f0e0d29f242ebf6d537c08022100eb4cc1d1d8e3eac73b3a16e6bd7201945be29c95421c8d152f8af462e85066be:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502207a230c9a42e5a5c8bb0d395087e0aca9cefd7285a167fa42c9a5a93b14c46d88022100e8550828a91b082e4c908b27285a1ef13d48a2f7580ec020f4ab09aecec205e1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1470.yaml b/http/cves/2010/CVE-2010-1470.yaml
index 9cf6cd730b..3dcaccf62e 100644
--- a/http/cves/2010/CVE-2010-1470.yaml
+++ b/http/cves/2010/CVE-2010-1470.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and have possibly other unspecified impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12166
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022033273cdd3751604b219df79fef83b2a2db3cf41a006ebab132c3830ceca3d425022100e304d2b821ca739759d57be72ff0e9c59814d16e0666d337ac2fb4b458c175ec:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210090ded558efdc68efdfc4f1021042fe040fd9623e489a797a51ae65dca54add4d022036194cfa1b5329324aac1be6674cbcd60f3f2f02ce8109881a3575f46e7f4929:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1471.yaml b/http/cves/2010/CVE-2010-1471.yaml
index 0d10ebec46..9bb821bd3a 100644
--- a/http/cves/2010/CVE-2010-1471.yaml
+++ b/http/cves/2010/CVE-2010-1471.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: |
Update to the latest version of Joomla! Component Address Book or apply the necessary patches to fix the LFI vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210098fd435fd7ff07962ed5ecb7ad76b65b3dae0a06d576d7845b5495a5b706059e02205eb795796f5fe00743d1e3bc7f48d3c196e1590c792b75dcfdc1b7547e8b2d39:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402207abe352a0287053462859d617d5bd1fad54ddcac4ece82145ff93edb42ea650d0220645a86c6f1c30a29acafb429ee6448d393085220af5a5749ff0c71b29114a1d0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1472.yaml b/http/cves/2010/CVE-2010-1472.yaml
index 72c2f14382..d62dd254c7 100644
--- a/http/cves/2010/CVE-2010-1472.yaml
+++ b/http/cves/2010/CVE-2010-1472.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potentially execute arbitrary code.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12167
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d7ecff15693dcc6ba114f6d0d873f07201f187f4caf25f0e5358e6c48f3a158d022056dbab57d855141513e2fd556ceb44f45df93528c1af8d2aacfa57015bd86945:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100a968e604f3d5eb04a9d0d2b89e3a82a0abfaf1175bdac3d8cc895972c44b442b02201c5bbbefc7883b0bc96f5ffc6096d834707dcc79a31426f6d0a8f90c0c5394d1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1473.yaml b/http/cves/2010/CVE-2010-1473.yaml
index ef7afa0bb4..e41af7fe09 100644
--- a/http/cves/2010/CVE-2010-1473.yaml
+++ b/http/cves/2010/CVE-2010-1473.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12171
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d8b5aff97935929d851f2dd64b4d5f439dbb135651412c45bda3b4d3cecfa09d022100b691dfb257d7493f6f77958108d5ff0293326faf008105be0505feccb6dd50b7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202e2f5d6ac3b345ee3cfa7384339109d6498d73396a041237ba62f85526c5755b022100a131f30562e84b03ddfb91b97024de09c91c88583778ffeeeb1feb0787c279c9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1474.yaml b/http/cves/2010/CVE-2010-1474.yaml
index 466d0d3096..a14291eb9c 100644
--- a/http/cves/2010/CVE-2010-1474.yaml
+++ b/http/cves/2010/CVE-2010-1474.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: |
Update to the latest version of Joomla! Component Sweetykeeper or apply the necessary patches to fix the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402204dfe9e502a57e3e916593caf6ae1ab12d5cfe1a70bee11c5af267d6697516c9a02201c43a3e7c17e20f7e27061439acf0f3149516160d37295a7b5c0a3fccea39819:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402203fac14474eded012145b6cc5d2952b23724d33d7a6533cb251a4ff33a6a7403e022046a06cd61e75005c10d20e74a8989cb3b5b7b7279333ef5743ec00241aa04eef:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1475.yaml b/http/cves/2010/CVE-2010-1475.yaml
index c92a9af787..ff03ca3d3b 100644
--- a/http/cves/2010/CVE-2010-1475.yaml
+++ b/http/cves/2010/CVE-2010-1475.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ The LFI vulnerability can allow an attacker to read arbitrary files on the server, potentially exposing sensitive information or executing malicious code.
remediation: |
Update to the latest version of Joomla! Component Preventive And Reservation and apply any available patches or fixes to mitigate the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220347d65e25b5cbb302e9d5c17cd657658391d5a8a0a9af81cedbcba316b32f27c02204a31659e2975ec31b519c73c1528294a159f14bcacbe2d810dfd611310873822:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402205121f2e892c037b7ac973a0080003faa18a9c705a9a025279a23a5942b4a362902204df0392cc98a96774f98772e99e110f26e6e3a2afc572f453bffd4305d0d6e90:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1476.yaml b/http/cves/2010/CVE-2010-1476.yaml
index 52de1efe20..814bae2adc 100644
--- a/http/cves/2010/CVE-2010-1476.yaml
+++ b/http/cves/2010/CVE-2010-1476.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the view parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12150
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a2269cd1a53c24c6af0a68b496ff1b58b824e0d9255746297ae1f3504c06c090022013fd2262d9d0190dbfb2d6ccd01eb44c559b7f073d64df1c96f40717e864d8e5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d5417a03479c8004cc8a34cbb7abdbe70cdd7a851a528792d72560c471d52e8e022013f0d023748d6b1e1c3bf7582cc10d8f230a60aa0f03d58a4cb5ace89cccbc52:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1478.yaml b/http/cves/2010/CVE-2010-1478.yaml
index 7505906626..0aff8845de 100644
--- a/http/cves/2010/CVE-2010-1478.yaml
+++ b/http/cves/2010/CVE-2010-1478.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12145
@@ -37,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022071fef327ece73af4e957ebdacb2f283ddcf0666206beeb7d6e7675bff6a4a680022100b2eb72abc7691d8444931c4c42bdda1bfb8cfcf31a3d52d5dc9e360e39f8e311:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221008141ca5c007f7e8cef45d147c64118c92755dbe18bad5efacb93ba4bee5f784102205acdbd62f9d1e6b512ddc3f4ce80f249330376fad2ddac92fd2968cbf1090103:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1491.yaml b/http/cves/2010/CVE-2010-1491.yaml
index 077829d7d2..7ee62cea87 100644
--- a/http/cves/2010/CVE-2010-1491.yaml
+++ b/http/cves/2010/CVE-2010-1491.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ The LFI vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the Joomla! CMS.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12318
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210099c131a4be3b851face18f6292bd13bac9b76ebf6a9575080d389fba020855fa0221009d80872f5b43b6ac579ed968ef752215290aa43a8fdb5febb7d322d300ee2cec:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100d829381add883dd1d5af538546bab9cfd00e470a806b5543ae8731c1621a8395022100f8dc253e35b6cc1342ee3b3a5e3f8292439de7542ef702b51140cc83fcf147df:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1494.yaml b/http/cves/2010/CVE-2010-1494.yaml
index 21dc944764..c8ed5a3eba 100644
--- a/http/cves/2010/CVE-2010-1494.yaml
+++ b/http/cves/2010/CVE-2010-1494.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12113
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d3eaa3e347e6a2d8632599d435f90a88248f4c5f70d0bbce63138bf06521ec98022064c5ce2112150b47e8ed672aeb937f6a4a7518a2ea6eb7e8aa6f24a41f936c52:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009ba34cfc30e2696d2f60567dfda7a22293776c64a3fec9689f2b5d44e69b7da5022055c4c0938d9a9cee5e650c746792770cdfe8bdbb9584093dc0247acb1cafa355:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1495.yaml b/http/cves/2010/CVE-2010-1495.yaml
index 2d04ebc424..94e5906378 100644
--- a/http/cves/2010/CVE-2010-1495.yaml
+++ b/http/cves/2010/CVE-2010-1495.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12286
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c10fbc9874082966906af3524ab31606fcf801ea2cfb768869dc213399ed866d022058fedfcd23f360fac72d00c1d9eb14e3028d75300c60dc34eda86e57744ade68:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204bc942e036cac7325edc601114a5bed76a616e7848e29f355f99aaa6b41d2526022100d8473b1793386d25bc4d72b6be8233568b651c311b9c109a28847ed26c4c8b77:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1531.yaml b/http/cves/2010/CVE-2010-1531.yaml
index 2e44a95919..fbed245fbe 100644
--- a/http/cves/2010/CVE-2010-1531.yaml
+++ b/http/cves/2010/CVE-2010-1531.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12054
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220338df5544487b4a6fea12da607569bc1708ce8c61e722fb0696bd277f79f7257022018696a318d9442606410bfebb671c036c2531863bf271e432b43826e6133ca27:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204de369cdcd5642bfba5117d8bd6d580d376907887b0db877e5010bf9b7af696d022100fc299cf2a0b7049e80bc3b6c69471724da1be4f2f738b50df7815291c0cddb3b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1532.yaml b/http/cves/2010/CVE-2010-1532.yaml
index 14913ecc9f..bbfb68b5b6 100644
--- a/http/cves/2010/CVE-2010-1532.yaml
+++ b/http/cves/2010/CVE-2010-1532.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12118
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c53613a3cef1c1353f982e3b54f717214b9f9be8267b9c33425391a494b15be402205d5d020b8b17c4345d34548574513a9c92152595795128aa23ee3bc0a155de9d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100d219bfb3f6cbf16b9e8fc5c98b899808a4e51dd967f238011fb2e021fdefe55c022100e6c92c27a313dfb2117711d107cfad86965ec2e46b2f68abcbf96a58ce448d3d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1533.yaml b/http/cves/2010/CVE-2010-1533.yaml
index 2a8553275f..48855c5b76 100644
--- a/http/cves/2010/CVE-2010-1533.yaml
+++ b/http/cves/2010/CVE-2010-1533.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, sensitive information disclosure, and potential remote code execution.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12142
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022068e2ec4b051f1fee79347d7820d0374c3e65526b9cdbdb42e28feeb1d6583c4c022100eb51ea517e54a8da87b3b2cc145192a026d887a530c031f7ec7a4a9e4fb97ef0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e6531faa16beb682aa96eb4b61b502041d816dd7bb5d4e27ff102cc19c33553f022100bc65f33d23e213b2505cbe37ad46be4dfdd435ac7e764407cebe193a08f4c271:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1535.yaml b/http/cves/2010/CVE-2010-1535.yaml
index ebb17a1f22..34368ce661 100644
--- a/http/cves/2010/CVE-2010-1535.yaml
+++ b/http/cves/2010/CVE-2010-1535.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: |
Update to the latest version of Joomla! Component TRAVELbook or apply the necessary patches to fix the LFI vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b89546a3f4377ba956987cf591456cee6237129ca51ff5c62849be0868c1dae302205bd70312a251c90f0107558ca2664b3af4ed7ec2c5896f7e32cbd263ffb087dc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009a1ca762268be18b1225d800ffa6847afa432024b0724f1e85f24f18b2ec1ce3022100c5bfbeeb89ead13f3b2b34b0557f86727df26bf3f33464c6d7fdfd28bc78d612:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1540.yaml b/http/cves/2010/CVE-2010-1540.yaml
index 17edebb83c..4b8bb4fcc0 100644
--- a/http/cves/2010/CVE-2010-1540.yaml
+++ b/http/cves/2010/CVE-2010-1540.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter.
+ impact: |
+ An attacker can access sensitive files on the server, potentially leading to unauthorized disclosure of sensitive information.
remediation: |
Apply the latest security patches or updates provided by Joomla! to fix the directory traversal vulnerability in com_blog component.
reference:
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a71de48e476071ed5a83fba8a0f1bf2f987513816aa280177504a878bee962e602205f41d0579c41e5643d6410013081f30a0c5c35006b9d4b6f5734381a635feb56:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009a9a56652a6b615e6dd15e8aaee28b3bc822f7a818542029ef8ba83c2df7ea1702204c46b96e486e65d2ab0bc8669738b56d4226444fb04cecc26803e7d17489c080:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1586.yaml b/http/cves/2010/CVE-2010-1586.yaml
index 32f4e6f63e..77b3cf12dc 100644
--- a/http/cves/2010/CVE-2010-1586.yaml
+++ b/http/cves/2010/CVE-2010-1586.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to potential phishing attacks or the download of malware.
remediation: |
Apply the latest patches or updates provided by HP to fix the open redirect vulnerability.
reference:
@@ -36,4 +38,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
-# digest: 490a004630440220096ee755e28cfd4b0b033c34ef6523da4772378fab56cb37f7968e0547e43f8b0220601f13af2d58faa914ab66670384d1dc19446e5dff304827d045f4a7c5f393c0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022036ec89a20bfbd44d98ab6a1a972b575521992faef4f4fcded33a447ae95f003d022100a4a2c52f0bb6af88942a06e56af358752329728b51ceff63c8f00fbdbdd900a0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1601.yaml b/http/cves/2010/CVE-2010-1601.yaml
index 724aa4a847..b816c6afbb 100644
--- a/http/cves/2010/CVE-2010-1601.yaml
+++ b/http/cves/2010/CVE-2010-1601.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JA Comment (com_jacomment) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server, leading to unauthorized access and potential data leakage.
remediation: |
Apply the latest security patches or upgrade to a patched version of Joomla! Component JA Comment to mitigate the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502202f8bed8ea5e690594ee1ad6e799e3bbd5cd55c73d459987d3454df7eda28cd63022100d98eadf0eec286baa287de1b3656090d60213830c083a98d0e4782d18f2d3a83:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402206edac5876107d5f82bf5701673a37f3855b77a2c31a6b6e7a1da22af90f3766c02200cafb34ac24bd0d1367f64014bc6727b58a6f2468d783e4c6c81a064475b7390:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1602.yaml b/http/cves/2010/CVE-2010-1602.yaml
index 6c88629fa2..58616861ae 100644
--- a/http/cves/2010/CVE-2010-1602.yaml
+++ b/http/cves/2010/CVE-2010-1602.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: |
Update to the latest version of Joomla! Component ZiMB Comment or apply the provided patch to fix the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100f478e39b58afbb9fa6409bf223c04f8d623d7eb70fd32595e8c3f26b0536aaae0220130513e188e10dcb39aa7387f309129fee2d824a97afc8d5468461613bd36d00:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220290dd86db1faa992098c4b0f73c7654644b03eae53f450b35197edbf4e50fce4022100cbb7f50a7c405a13407ff912e856d09735e30d47ee3817ea21f93f440ee0b250:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1603.yaml b/http/cves/2010/CVE-2010-1603.yaml
index 498352f342..35dedf0ded 100644
--- a/http/cves/2010/CVE-2010-1603.yaml
+++ b/http/cves/2010/CVE-2010-1603.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the ZiMB Core (aka ZiMBCore or com_zimbcore) component 0.1 in the ZiMB Manager collection for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, sensitive information disclosure, and potential remote code execution.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12284
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502203cf2eeccc078d88371100d37399663d39e29c9c42fd3a3c8015919d7b5693e08022100ee99dfdf9159565c59f59ec55511836ade02e0fbd95430969b12c031e9d6567a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402207aecc61f14dc32fb3d52d57a02f65e6ca7fe1248d479866cc2f270ad70d2e8350220192b03370d673feadc5f0f056dbe32af6752750a5b3a6189824b373ee9942481:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1607.yaml b/http/cves/2010/CVE-2010-1607.yaml
index bda12284af..9c08e97b52 100644
--- a/http/cves/2010/CVE-2010-1607.yaml
+++ b/http/cves/2010/CVE-2010-1607.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in wmi.php in the Webmoney Web Merchant Interface (aka WMI or com_wmi) component 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution.
remediation: |
Update Joomla! Component WMI to the latest version or apply the provided patch to fix the LFI vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402202097e8ae97446ecd72d7d9e8503dd648487fe87303f6159756c65d151718d5c5022055a6373d734b67cc3b8effcd0197251720d23cf7779100c578e06c8027eb94fe:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c37f564e45b1a095557537556e6fc5529db3861979d9f8cc7871bf45b972789602201f14d3c585153158d6d1513c809426cdc5bf4b8cd4e579b2528bad36d980eeaa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1653.yaml b/http/cves/2010/CVE-2010-1653.yaml
index 2d178fdecb..58c66e492b 100644
--- a/http/cves/2010/CVE-2010-1653.yaml
+++ b/http/cves/2010/CVE-2010-1653.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ The LFI vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the entire Joomla! installation.
remediation: |
Update Joomla! Component Graphics to the latest version or apply the patch provided by the vendor to mitigate the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220785f703fa2e90058c8205c34879eee0b28e0f340d75d4b8b6e94c78c441113db02207d30d9982d3a1cc338c5985ca9853ee23ad6aeba48b55a5dff969003346b83e9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022029242a7077a7b45969c4a0a50616a234fa8121b3ec50fbccf8898c87125a79c202203b5db4964669217bd6cb0595d2e58027e8dc4e1cbf3ad44f9c3c75c38876fb01:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1657.yaml b/http/cves/2010/CVE-2010-1657.yaml
index f0b4ef9ce2..fc0062f4ee 100644
--- a/http/cves/2010/CVE-2010-1657.yaml
+++ b/http/cves/2010/CVE-2010-1657.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: |
Update to the latest version of Joomla! Component SmartSite or apply the necessary patches to fix the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402201058e656f143389fb2390812be886b40c04539f44b3c994fc5cb9a19288ec5f402204c25fdd80681b2162aa5d47d090f9dd8c668c5fa823d1a82600068a255f82362:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402206b45fb3e22374f56b528d0224831a712aaa3d82734c27f64bbb830b3aae3e4270220045de48c4ef548d03f4c030408a96d3185aa9c4cc71155f433ec2297e75b8551:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1658.yaml b/http/cves/2010/CVE-2010-1658.yaml
index 08db918e6d..1df114c744 100644
--- a/http/cves/2010/CVE-2010-1658.yaml
+++ b/http/cves/2010/CVE-2010-1658.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Code-Garage NoticeBoard (com_noticeboard) component 1.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can allow an attacker to read arbitrary files on the server, potentially leading to unauthorized access, sensitive information disclosure, or further attacks.
remediation: |
Update to the latest version of Joomla! Component NoticeBoard or apply the necessary patches to fix the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100f3ae9fa23d2b965d99b9af2fa3e774533a6826983faeb9fe2da9f29dc8cc3c8a02205943c1cd68eb5c929f337a5bea9c49c8a512a5aec8575d2e97c4239586c58ca9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100a67780f4ffb8421b4913c9bb7356d2085f6d8010c2f57544b503e3267b1a5f2b02207f4253e96686e926c8d0c5570f0a1cd5935383902fbdde47cf9482ebe68a6ad7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1659.yaml b/http/cves/2010/CVE-2010-1659.yaml
index 680159226f..92ade001f1 100644
--- a/http/cves/2010/CVE-2010-1659.yaml
+++ b/http/cves/2010/CVE-2010-1659.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Ultimate Portfolio (com_ultimateportfolio) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation.
remediation: |
Apply the latest security patches or updates provided by the Joomla! project to fix the LFI vulnerability in Ultimate Portfolio 1.0 component.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bbcd4f5ca339848a9c25c7221083dc46b003a2599fcfaedc6aa827174686650c022100a3a3fd55af036a15c13cbc7d6185b4805ea628f9a415f2b1fc601c3d878ebfc5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100eab4d7279b5c617e1dc60ed807028331e0a3a20f663fcaa96d5ecace5d023deb022046c25e560476c8b53806bea5ef61a2792625e87d30bf4cc411462aaaa51f70ed:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1717.yaml b/http/cves/2010/CVE-2010-1717.yaml
index 2c236eee6e..b7b8c9a375 100644
--- a/http/cves/2010/CVE-2010-1717.yaml
+++ b/http/cves/2010/CVE-2010-1717.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage.
remediation: |
Apply the latest patch or upgrade to a newer version of the Joomla! Component iF surfALERT to mitigate the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d66bb2526cd6fd21a6ae7c7c7c36e79f6449673ab0633d5299e5d639c213074d022100a079157860f11d0e7c4522bc6ee64b110b4b39ab57c3c2c46a99e9c38e947d64:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022024c6cad07f9234d03bda1b47bcff7b62648b645d181fe28d2cfdf9cd1372e1be022100ca59cc8f108f456637034771d6dfe518d39d33e8539d607a963ba328f8acf6a6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1719.yaml b/http/cves/2010/CVE-2010-1719.yaml
index 59f5052bed..0851ce5cd1 100644
--- a/http/cves/2010/CVE-2010-1719.yaml
+++ b/http/cves/2010/CVE-2010-1719.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the MT Fire Eagle (com_mtfireeagle) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: |
Apply the latest security patches or updates provided by the Joomla! Component MT Fire Eagle 1.2 vendor.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022020138b379909d2b98b55d8d5e6f1b588f9063645935e13c38038b6166529a9fb022100eee3b2517664caaca450438d2d1ec91248967baa6702fa74cecde689a71bab82:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220142f9dcdd56f429cd511e16b35108914b7eafc2b970541a565bf5a517e3c9e840220363d23a03fae02e91d4ef98823a6c443cb14d0a6d9efac30106888db03c09d13:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1722.yaml b/http/cves/2010/CVE-2010-1722.yaml
index ddd42c1da4..333a2aa3a5 100644
--- a/http/cves/2010/CVE-2010-1722.yaml
+++ b/http/cves/2010/CVE-2010-1722.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Online Market (com_market) component 2.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage.
remediation: |
Apply the latest security patches or updates provided by Joomla! to fix the LFI vulnerability in the Online Market 2.x component.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402201967b4c3c553b85753c96453352662e3f7890a26eb58a993edced6f3be58650c022035e5f1890e59fee34c845574cfbccbce4299a018eec5ef2b1d87d3bce5ad134d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204029fb965c07390c26ef14cd50c268e79b556490205f907ea2518cd51b310187022100fc6c41b9d87e8863813ab20b07ed17cab76497f2ff13b40f2bb722b76ee9224b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1723.yaml b/http/cves/2010/CVE-2010-1723.yaml
index 2326b0ee80..3ff52be6ef 100644
--- a/http/cves/2010/CVE-2010-1723.yaml
+++ b/http/cves/2010/CVE-2010-1723.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the iNetLanka Contact Us Draw Root Map (com_drawroot) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can result in unauthorized access to sensitive files on the server, potentially leading to further compromise of the system.
remediation: |
Update to the latest version of the iNetLanka Contact Us Draw Root Map component or apply the patch provided by the vendor to fix the LFI vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502201cc16ba6256c0a7700fd76e341194e4ca6a09969021e24381387dd24f828b260022100db3855c65874d12567c3012a5e88f1c59bca1a6399395707e262c32d9800744c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022025b9b98f4d35753e0c141616a32cc51ad3a7ba2109c5eadcffdf73c6be6d596b02210096818c1f3cb022812038e4df2cbeaee4a59c717b09ae154ceba6ec71683353be:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1858.yaml b/http/cves/2010/CVE-2010-1858.yaml
index 980db82714..09c267dabe 100644
--- a/http/cves/2010/CVE-2010-1858.yaml
+++ b/http/cves/2010/CVE-2010-1858.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the SMEStorage (com_smestorage) component before 1.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server, leading to unauthorized access and potential data leakage.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11853
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022028f7506b0d389861b6c14cb8e45f7aad5539739eaa27dc0b483c77de1f8d4ff0022077f110f38f6bfd7515973550ae149bc20180e3f0e5fbf5932244278174539a5b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f608aef30150d5e5c232e9d8dcc6df9cdfd7e21f5ce65d95be6a773a89e08a7202206ba7e3cdef270c98019ad813be0f23b6d5fc484487c52d466c8d0f694ebb3050:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1870.yaml b/http/cves/2010/CVE-2010-1870.yaml
index d50675fd6f..3bbf52e59f 100644
--- a/http/cves/2010/CVE-2010-1870.yaml
+++ b/http/cves/2010/CVE-2010-1870.yaml
@@ -5,6 +5,8 @@ info:
author: b0yd
severity: medium
description: A struts-based OGNL remote code execution vulnerability exists in ListSERV Maestro before and including version 9.0-8.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Upgrade to a patched version of ListSERV Maestro that is not affected by this vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- 'LISTSERV Maestro\s+[5678]'
- 'Administration Hub 9\.0-[123456780]'
- 'Administration Hub [5678]'
-# digest: 4a0a00473045022100a242b0189ad97b2d795336624cf531136e407e57b6e0c52c0fc8e4eca692a39a02204f15c177244d9ea3fe83da7eeca74327c80f817d5993bf6ab6c7138792e07cb5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502200ef3e6075b857e768a6c73e6ab6b832333c026b5215f724a1c1326d408f7476702210080cedbaf8d0aa28a9ecf41eef8caa268141b32cd8ef87dbfd6c6bf9506c177e7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1875.yaml b/http/cves/2010/CVE-2010-1875.yaml
index c2708d5c0c..56261b336d 100644
--- a/http/cves/2010/CVE-2010-1875.yaml
+++ b/http/cves/2010/CVE-2010-1875.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Real Estate Property (com_properties) component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ This vulnerability can result in the exposure of sensitive data, such as configuration files, database credentials, or other sensitive information stored on the server.
remediation: |
To remediate this vulnerability, it is recommended to update the affected Joomla! component to the latest version or apply the necessary patches provided by the vendor.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210082eaff0ee8d516e24c4bda026bd64d2c248a32fb9769408dc83c25f73bedbfaf022100fc766d692c0d0efa229ded3594f84a17852493e59583a2b28307dbbed494c325:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210096599b6938468d1724b9c666c12272f8761f1c49b7234c79b9da17d8069660b0022100ae9cad5a44599e30600a668bdaf45f2c7c5933125c8a51761948d9a0edac674f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1878.yaml b/http/cves/2010/CVE-2010-1878.yaml
index 5027b915a7..62426ab49f 100644
--- a/http/cves/2010/CVE-2010-1878.yaml
+++ b/http/cves/2010/CVE-2010-1878.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the OrgChart (com_orgchart) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: |
Apply the latest patch or upgrade to a newer version of the Joomla! Component OrgChart to mitigate the vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f556a8ecae8a105097cafc748304efd98467005b886d5581307d7c6ae81865df022100d72c132b485850e259696c0787eb84cf71febebeb35edcdc362558b5fbbe9001:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402204fe41f3fd8697df9c9c614652c99e747d454f93efd44feb9db9d1713ff84bdd1022041601d6ab93517d57967de9b29c4d524a4020d711d1f56e102ea04795e6c2bd5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1952.yaml b/http/cves/2010/CVE-2010-1952.yaml
index 317602d80b..04edc067bb 100644
--- a/http/cves/2010/CVE-2010-1952.yaml
+++ b/http/cves/2010/CVE-2010-1952.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, sensitive information disclosure, and potential remote code execution.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12239
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100bbdb472620fe8b7619082d1034a20032869a7431015b7d1e3b78227c90e345e30220553ca1a44ee7d7ce74d987b448d6cc12e680570cb855abb87493fafcab7b8dd8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100b77b1aa781afb8f30a0407d366a5c4b2a339748c0653b543fac57e537f06f0b90220374c1afe6bc15dfb4dbac3f006793b00b9507f2de2358b1d30c92c9b60a2865d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1953.yaml b/http/cves/2010/CVE-2010-1953.yaml
index d0d30f8994..8c32ba2958 100644
--- a/http/cves/2010/CVE-2010-1953.yaml
+++ b/http/cves/2010/CVE-2010-1953.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can result in unauthorized access to sensitive files on the server, potentially leading to further compromise of the system.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12288
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100b35cca42ac21b6983cc8ed8e8faeb1c08f207601722e06191e199996f0c4ea5a022100a0148ec52a2c91914dabb8cffdd31ca9e044205365100e35a3c97e512945537d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009a8c827a37e9c486aa5fa22a7d5bb958527f763e3356b20a6a00bd7686088a3a02201160221b0ce54c42b9010b07dea23a4285638a613b99006da211d6d2461c513b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1955.yaml b/http/cves/2010/CVE-2010-1955.yaml
index 5b09fdd669..9eb526f467 100644
--- a/http/cves/2010/CVE-2010-1955.yaml
+++ b/http/cves/2010/CVE-2010-1955.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory) component 1.1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12238
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210089eb4102ae44a2ffd45bcbd216308af8b26c7bf5720beb809ada98574dbbafca022039a4babd37caf5eb8dbc07d87a1bf443275ca6ed7c50431525e711958865c5ad:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f4489f8b45d80704037cd3d084a66bed44d825de4f0b0e9976e13041a708d0eb022034251a6380f133fdee626900b4c3e35fe6f53cbb1a0e06226b9af9fa92d5be3d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1956.yaml b/http/cves/2010/CVE-2010-1956.yaml
index 2d85939a4c..1b512a94d8 100644
--- a/http/cves/2010/CVE-2010-1956.yaml
+++ b/http/cves/2010/CVE-2010-1956.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Gadget Factory (com_gadgetfactory) component 1.0.0 and 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12285
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220080495bc9c6b9ab3c198fc6455d36b7e23044d2268509fe920bed5822f0786e4022100f26e0f382f9195769af095ee5855209fbead3a17efe0ec00181fae2b340e42a8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100cd813160bc5df34b92a04ebe5bc25538644b05407f4557d7f1e3699eb2738477022100d6e64050632ee2df63a0646d3c279e06a4169ad9c47bc6234a6bd00febcfe022:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1957.yaml b/http/cves/2010/CVE-2010-1957.yaml
index 545668d97c..0a9bca3a17 100644
--- a/http/cves/2010/CVE-2010-1957.yaml
+++ b/http/cves/2010/CVE-2010-1957.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Love Factory (com_lovefactory) component 1.3.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12235
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022071798c7cb01da8bd4310fb461e84ddcad992aa3213671db2ac78fe85c9e22c0f022100f87cd8b7f953e34e4f7a6a65344ad491eeb41d2ec209c7ad93f1f7cea9881eae:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f674e133070fef23bfc4ae1cd446c12b63e60dddd20fa2bbf3a6b386b663f9d002210090748da31b933be0ac8c56c26b1a0c81da8b037c7457ed3f7f9de00e6d1b1988:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1977.yaml b/http/cves/2010/CVE-2010-1977.yaml
index 85cbdcafac..184d1cd462 100644
--- a/http/cves/2010/CVE-2010-1977.yaml
+++ b/http/cves/2010/CVE-2010-1977.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the J!WHMCS Integrator (com_jwhmcs) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12083
@@ -37,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e00cc4b75ad7ed3fe500137eea231351e71682b2967f06db378471e92b20492e02200a4efa7715adf1e532dd6858da1b0cb743bbc1b145db3949aed56a06f48fcf84:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f381c6bd2f0253efe1483cbd1ff74b59a37069dfa799e862e6c431de98e344c702202062a659f3bf9bf958e1a4aadbf67e07fb30d90d88140602aaa10158caac3347:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1979.yaml b/http/cves/2010/CVE-2010-1979.yaml
index 720316587d..c2e68854c0 100644
--- a/http/cves/2010/CVE-2010-1979.yaml
+++ b/http/cves/2010/CVE-2010-1979.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Affiliate Datafeeds (com_datafeeds) component build 880 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, including configuration files, credentials, and other sensitive data.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12088
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220648b163ba23a62b4760d669300fdc055f48cbe973b35b0aa57e6dfb899fe7e3a022044e08f679e2a97632bbf72f81e56239c9b19df9b09198e1d4e97be70d14fbc3f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204d0d7fb9b7ca49039651bba15cdae46e8d3c34eab245c063d2d85a86cd4edb6c022100eda90cae8a943ceabe34fc18d99c354c3c00473ad8b80d22f9c56f449c84633c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1980.yaml b/http/cves/2010/CVE-2010-1980.yaml
index 4ad2eefd05..25c1b9eabf 100644
--- a/http/cves/2010/CVE-2010-1980.yaml
+++ b/http/cves/2010/CVE-2010-1980.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in joomlaflickr.php in the Joomla! Flickr (com_joomlaflickr) component 1.0.3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access or information disclosure.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12085
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022021dc15978a79e101c18758979e7b13c2063785423553fce7e0690ee9157ddd0802206fed8046d2113545d7e7cd869e868130ca7db443430ddbac3249f88d075ca341:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220539f782a9c5542207d586e38c6b76362a601745fa4c623a93ed82ef86c0964bf022047be814d1d5bfbf20ec8397ab00a88cc61feafb3db3673b1a3ff16eafb58d261:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1981.yaml b/http/cves/2010/CVE-2010-1981.yaml
index b938122ee1..ee53c321b2 100644
--- a/http/cves/2010/CVE-2010-1981.yaml
+++ b/http/cves/2010/CVE-2010-1981.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Fabrik (com_fabrik) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12087
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d80b9fc7fb3e35d2dc6047c33f3e7a7cba9925bc1dc99bc13ab184106a8af09f02206dac061cd8719aef9b943e898d44a6b25b552293c451030e89dc552354473fb4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e8dd075c2ff4fcbe1ea6c7990fcc179393d96de943d6da50ee5d4bfb9709eca0022100fa05ee5d0e8996852dbd4c47e067becca1e6317d96ce5cf3a59f4967ea5e8dd0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1982.yaml b/http/cves/2010/CVE-2010-1982.yaml
index f1195e034a..2ba73f338c 100644
--- a/http/cves/2010/CVE-2010-1982.yaml
+++ b/http/cves/2010/CVE-2010-1982.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JA Voice (com_javoice) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12121
@@ -37,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221009b2d29941ae7eccf4af8b3cb8e6cb11621e89186f1f6d4b96ef3dda7828e05650220088fafea1fcb85dd966b8431d7ef52e54b3478bfa59e50ece9d086ff7de74c84:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502201c4befc54c58c718425c23978d26d27f5186f121b1526e5ae8e8ba31b03609bb022100fd9f75d9caca461ff58f9e699377a521b225791878c5f76517151fcbf0967697:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-1983.yaml b/http/cves/2010/CVE-2010-1983.yaml
index 5ad768d414..44e3198e6f 100644
--- a/http/cves/2010/CVE-2010-1983.yaml
+++ b/http/cves/2010/CVE-2010-1983.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A drectory traversal vulnerability in the redTWITTER (com_redtwitter) component 1.0.x including 1.0b11 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12055
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205c03f407c696255cb2181d11f9a488de589f775cb8d1ec9a5fd668d68e7cc3ea02202472c73bd9ac55cdbac6c1605637ebc35bbfb0cdf4d916680a81b88bc6debfda:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206f21979aa6337361f235bf3e8a9d6dbe8f1d9649dcacfe9b1c1cc6c2bc821b56022100f6c096abff5b3c5258c2f2ef595d7277245e11e619fad038a3b45e02ffd10f27:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2033.yaml b/http/cves/2010/CVE-2010-2033.yaml
index 919d504232..d417e287d9 100644
--- a/http/cves/2010/CVE-2010-2033.yaml
+++ b/http/cves/2010/CVE-2010-2033.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://packetstormsecurity.com/files/89654/Joomla-Percha-Categories-Tree-0.6-Local-File-Inclusion.html
@@ -37,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b7369948bb6455f3080ef7570b840bd8d6e2cb0502c00d30f16afa198705d1a402203832fbe6d2fefccf2d349cfb20a3234b3c5c446282667caf02d01ddaa694fb8a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008b85c8dbd2c3d870feaa77152d698d27e68ba3e633388167d223ed2d52f5a4c8022100a81bd1c134ea547ab9327934e70f799d61760947e8c45b6772398819c583c8f1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2034.yaml b/http/cves/2010/CVE-2010-2034.yaml
index bf1c825e71..43e2ec117e 100644
--- a/http/cves/2010/CVE-2010-2034.yaml
+++ b/http/cves/2010/CVE-2010-2034.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Percha Image Attach (com_perchaimageattach) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files from the server, potentially leading to unauthorized access or sensitive information disclosure.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/34003
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022008b630abf7eb18bc19fc250229e81145829391209c282e3ffe156e6d2a32f03c02205e1f52dbcca831a745cf5b0699da12b42f4772ed70524628883c9b0a08a0ce6f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100aa640c948119b286df93f9be8d64309532b2e40defe14624efb45252ffe48c63022100b9bebade79b7fd6623d04434246593e6f22a9dfe5df5ebf2b7932d6ebf35060d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2035.yaml b/http/cves/2010/CVE-2010-2035.yaml
index 8ea3c47ad7..764f39ae1a 100644
--- a/http/cves/2010/CVE-2010-2035.yaml
+++ b/http/cves/2010/CVE-2010-2035.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Percha Gallery (com_perchagallery) component 1.6 Beta for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ An attacker can access sensitive files on the server, potentially leading to unauthorized disclosure of sensitive information.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/34006
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220017288c38316efe9ecaf7e3c142862f23518a6851bc51f924558f5ff05bb83b8022100d9302c9594c308c29f7f48b6429a999042c09667062927e170c4d7a35aa8e4f2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100b34c29fe1f1c74fdfb477df382907e0e678ec8d0edef26b57955499820762075022056655cc35c216a2779bbcc446a466020f32a142cd247877a81d90150317332a0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2036.yaml b/http/cves/2010/CVE-2010-2036.yaml
index b7cbb57e1b..d198971167 100644
--- a/http/cves/2010/CVE-2010-2036.yaml
+++ b/http/cves/2010/CVE-2010-2036.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ An attacker can access sensitive files on the server, potentially leading to unauthorized disclosure of sensitive information.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/34004
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b3d5e11463fea00fc8ea6c39d3ebb2b6faca82dbb003d2df97948afa39ce5fb5022040dfaa69076440e97c55326590c4101742e97363038e7f21817724e757cdeb8a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022018b41597188ecdf7078080c36fb2f00046dcf374f659900b130a457b29f0c7a80220146c0933b38da8fa58556f877044de2d95444dc063a86de47bb213ce4cfe97ed:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2037.yaml b/http/cves/2010/CVE-2010-2037.yaml
index 52bb29f154..2a84ad43d9 100644
--- a/http/cves/2010/CVE-2010-2037.yaml
+++ b/http/cves/2010/CVE-2010-2037.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Percha Downloads Attach (com_perchadownloadsattach) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ This vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information or allowing for further exploitation.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/34005
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e9b6d4cb087351f9bbfa5d26235e4a21cfff11d665337847ba26e846db810d6f022100e8c7811588708a14f05413dbe75fd5b89903259791d53c44b4441c912ed1db35:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c0dc47212898eb091df74236685b77998209ca78058c2dc670b09c01c9e4237a022054b30b0fda49971bf03c7fa66d263d93ce1612b83cd30200ca9fb66935f58441:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2045.yaml b/http/cves/2010/CVE-2010-2045.yaml
index 1a26fcd907..5905cb0977 100644
--- a/http/cves/2010/CVE-2010-2045.yaml
+++ b/http/cves/2010/CVE-2010-2045.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Dione Form Wizard (aka FDione or com_dioneformwizard) component 1.0.2 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12595
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402207373f7cb791f81eddbf0a1b8b668d512e0ed216817535ece1614c068dd0887bf02202503c2af2bfb408fad21ea17a0095eb751baa132159150a27fdeb7ae01d9c83d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402202204d189f12836aab573b907af0c77342ed476c85174a34b4d425e0907216d50022070202d7e8c7655fa80ed2098d9461ff3ae92107234d4877f0cf675eaa5f5d2b1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2050.yaml b/http/cves/2010/CVE-2010-2050.yaml
index 92afc9fe75..8f2d7df959 100644
--- a/http/cves/2010/CVE-2010-2050.yaml
+++ b/http/cves/2010/CVE-2010-2050.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Moron Solutions MS Comment (com_mscomment) component 0.8.0b for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potentially execute arbitrary code.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12611
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220601cb95f34571c666483781468e0ca54cc0dc4d3bf666a38e9c1335bc0b79f29022100c1d129fef04cd524fd16386596124cae16fae430893a6e39de2c000a1ed47224:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220539e9d6bb4b7d50a7f9a7b667d71f867c1269d30d845e61f29b8e88370f80d1e022100ac97c13da8a1971722dd205468217eaba67767118bd97cf63e9c933f099c8715:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2122.yaml b/http/cves/2010/CVE-2010-2122.yaml
index 6a1ba0df78..833fba3283 100644
--- a/http/cves/2010/CVE-2010-2122.yaml
+++ b/http/cves/2010/CVE-2010-2122.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the SimpleDownload (com_simpledownload) component before 0.9.6 for Joomla! allows remote attackers to retrieve arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ An attacker can retrieve arbitrary files from the server, potentially leading to unauthorized access or sensitive data exposure.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12623
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502204fb78de3af1c8012601e7112a972de40e6aa647c2bc10efaf6ceed29c14e5d1d022100a1733aace7f15c711f66ca7bbccc90bae9735a59482ec01f4d736807e8b55394:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100df58fff1f3c41f0bb2e7cffc588de1539e3e3836befa9de4e1f06a5d9f04c2b802210083af992f09518510d80aa9a38b8c07453e81628f93cbc5b0fd36fc2e1a883bae:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2128.yaml b/http/cves/2010/CVE-2010-2128.yaml
index 038e4f83ff..68a18af5de 100644
--- a/http/cves/2010/CVE-2010-2128.yaml
+++ b/http/cves/2010/CVE-2010-2128.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the JE Quotation Form (com_jequoteform) component 1.0b1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the view parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12607
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e1f15dbfd8fe39c94929c260722ba127e377764fe39a59d6c987f9ce54da4efb022100ef0493a54e236ea7edbb462b01d85272f079cdced35009ea0efb61e04168202c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c37d961964fbcd929dedc795e0f58c194527654157a2f86ca940108ed06c346a02203292c5ccaacb2231fa3525be77ab8b74a27cba4f28c35e587fdbac39b44c4da2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2259.yaml b/http/cves/2010/CVE-2010-2259.yaml
index c6d126d29b..e5efbbbe3f 100644
--- a/http/cves/2010/CVE-2010-2259.yaml
+++ b/http/cves/2010/CVE-2010-2259.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the BF Survey (com_bfsurvey) component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files and potential remote code execution.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/10946
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ac1505d814f9f4c9c9d46b86b9a41ab8ed267eee4c77dc8c99e055b2787f72b9022100d705ba7908b9e6c9a58251c109477545cd2fec28922b29fe23d940f5f2308603:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220731b630d781a49cbe5204a65cc925bf89702091e3a9e7aa70850fde793905752022100deb1699185259f6c8fe823f320455fdfcb2e7bb021f5809ad5e3e85ce3c54510:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2307.yaml b/http/cves/2010/CVE-2010-2307.yaml
index 6a549c25f2..636f1db8e8 100644
--- a/http/cves/2010/CVE-2010-2307.yaml
+++ b/http/cves/2010/CVE-2010-2307.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow remote attackers to read arbitrary files via (1) "//" (multiple leading slash), (2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request.
+ impact: |
+ An attacker can read, modify, or delete arbitrary files on the server, potentially leading to unauthorized access, data leakage, or system compromise.
remediation: Upgrade to a supported product version.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2010-2307
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ecda0d3507d14cfd1876d3d51d9d8e3219209e2e63c77e6f792912aa8360314d022100f5e2d29c5f2c9a8bc86893d04c365169012651f4f6a0f18b0e5c050ccaed4ddc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100d40ba8b9b481ae166888c551f72da68db055a11093fb78111e3b2c6b1d0b8d900221009e3b4258da5e1f03ffd3b1e4bdf63f4eb9985b20af64a31b8e0769ed840960ae:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2507.yaml b/http/cves/2010/CVE-2010-2507.yaml
index 128ebe3b9e..155ed6a142 100644
--- a/http/cves/2010/CVE-2010-2507.yaml
+++ b/http/cves/2010/CVE-2010-2507.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Picasa2Gallery (com_picasa2gallery) component 1.2.8 and earlier for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/13981
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022039f6110cabc617afd3e96b2fc42b914b3c9ad6e15797a38c066f2b7230ec9b92022100d6ed6291d2c1aa3ea282916d08d23459c4abdb22f7a2a23e5996b08311df80fa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100eec0a10467257dc4fe9e5b4bb4eaddfcea252a543161ea0d283d5a72bac72120022001467f6d2b1303150b144f8e62a51b12e036c7e89d9d225514b357f39c403000:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2682.yaml b/http/cves/2010/CVE-2010-2682.yaml
index 615f4ca0ad..fdc42c72a3 100644
--- a/http/cves/2010/CVE-2010-2682.yaml
+++ b/http/cves/2010/CVE-2010-2682.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Realtyna Translator (com_realtyna) component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the Joomla! website.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/14017
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bcd66f91f8905f8ee9afb4cc9c3b87bbbb97c29a7304afb8b1732dfd63db494f0221008d95c6d23d088a8391654b722965c64308378f94bd199e551781f7786fd678a1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022077113634884da4ef865ca94b2ee7df0fee6a54b02d65864d8d0914f3b6addbf002203a926595b9b2d25ef287c355308f11792796d904556fe01207c800a15d99645a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2857.yaml b/http/cves/2010/CVE-2010-2857.yaml
index 28b6bfab03..f5d389cf57 100644
--- a/http/cves/2010/CVE-2010-2857.yaml
+++ b/http/cves/2010/CVE-2010-2857.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Music Manager component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the cid parameter to album.html.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, sensitive data exposure, and remote code execution.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/14274
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a20dd9cc0bf9b879e7a93a855852d5e1ff0c4495105c1cb3386ccd491ae07574022100870d2b4947a1bdf4bc7acfe78be79aa68ad56fb7881ca6d0095860d69b56a6c8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100d5dd079a5e74c0a667d179123e54dcd75cb9f630efc5a27b28d4c19fa90806a3022100cef8eb3f80950d53aff9eac487482525a1cd731182acca02eee4b5b6087c23b2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2861.yaml b/http/cves/2010/CVE-2010-2861.yaml
index e0ec0fb834..9c8c59e8dc 100644
--- a/http/cves/2010/CVE-2010-2861.yaml
+++ b/http/cves/2010/CVE-2010-2861.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: high
description: Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm, (3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm, and (5) enter.cfm in CFIDE/administrator/.
+ impact: |
+ This vulnerability can lead to unauthorized access to sensitive information and potential compromise of the affected system.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100eea23236dfb2c8260879245cb52248481874bf8ea9a3218eaecdfc2f59fcd9b902204f286b1a52b1656aa66630f1bbe719f784974223f834fdf756b1613ca130d313:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221008fdd973723abb3ec0f3e399df369a16f587425edad3a51994b1888d60ed65bd9022022ac61a31821cc6a16fd4b12a5f8e402090c01bfc530b8662c11381d13c862c7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-2918.yaml b/http/cves/2010/CVE-2010-2918.yaml
index 8248ee9f4b..37c55cc45b 100644
--- a/http/cves/2010/CVE-2010-2918.yaml
+++ b/http/cves/2010/CVE-2010-2918.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A PHP remote file inclusion vulnerability in core/include/myMailer.class.php in the Visites (com_joomla-visites) component 1.1 RC2 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
+ impact: |
+ Remote file inclusion vulnerability in Joomla! Component Visites 1.1 allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/31708
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210096377401fd96f22359d82625f1928df2de7ae04492895cc1c477714ceebc56c8022010f6c8dc2c9bdfe56eb19aeff95eb8ff7f5a02eb7ebdeba6981b5af5b5268a69:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ed26b0bbeaaba277168e22d6c019818acb8019c5313cd05227b14a379490d391022100b173aea58b5b7b7343ec98009ef6d65eeb69e8de3364a5957050537d3b2673e7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-3203.yaml b/http/cves/2010/CVE-2010-3203.yaml
index 77e359433d..1f104bcb7c 100644
--- a/http/cves/2010/CVE-2010-3203.yaml
+++ b/http/cves/2010/CVE-2010-3203.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the PicSell (com_picsell) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dflink parameter in a prevsell dwnfree action to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to retrieve arbitrary files from the server.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/14845
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502206015ea2e49a49da3dae0795f8d72ca47ad97d00c810edb8909f86f8367a3dffb022100e1168138398e311b8e90dcdd953854629d94603f777c0b3fe29c59ed0e1ebf81:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022055282e097cada824716a1132835910ae549eda512b08b7d249ca747743d2699a022100aded409dcfe3fd85214075406aa8b20d6de14eebcb958fdd9966de08a109fc38:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-3426.yaml b/http/cves/2010/CVE-2010-3426.yaml
index 0cac866348..123ebd7f49 100644
--- a/http/cves/2010/CVE-2010-3426.yaml
+++ b/http/cves/2010/CVE-2010-3426.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in jphone.php in the JPhone (com_jphone) component 1.0 Alpha 3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/14964
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022071b2e39d247368321fe26a870c1863dfc4a967361f5f67cb9e693ed5ca5c7b690220735e83f2c4359bbe56779d43b01a77a8d5b9813d55bbcb17cd911478bef808ef:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402201b095b1d1d4407f08447f760c1185c842baaf9bc39358cd1a6d9c6d5c5456f0f022001934471878708a173e28ab337ae303cd8e64fb9c3e3e59df52cadc20fb6b58c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-4231.yaml b/http/cves/2010/CVE-2010-4231.yaml
index 8c80b27a70..540972ae41 100644
--- a/http/cves/2010/CVE-2010-4231.yaml
+++ b/http/cves/2010/CVE-2010-4231.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: The CMNC-200 IP Camera has a built-in web server that is vulnerable to directory transversal attacks, allowing access to any file on the camera file system.
+ impact: |
+ An attacker can exploit this vulnerability to access sensitive files and directories on the camera.
remediation: Upgrade to a supported product version.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2010-4231
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502202652fc98e97327ea39af4374a1bd7fdc2283c67b89c4088a8004384d181166ad022100de4f26d7e5d3d03e25674d1416d86859dda95aab12e47928de4fee82dd63f332:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206f95311eb9d11414e153cc82bf81e5ae3c46cbd6531189658fb6d14fc3fb82ae02210091aef93930a52079339893e4a31eb22528474821ec81b1cf2d97e8344fea0ff6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-4239.yaml b/http/cves/2010/CVE-2010-4239.yaml
index a33598d2e7..fafad30e1c 100644
--- a/http/cves/2010/CVE-2010-4239.yaml
+++ b/http/cves/2010/CVE-2010-4239.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_akoko
severity: critical
description: Tiki Wiki CMS Groupware 5.2 is susceptible to a local file inclusion vulnerability.
+ impact: |
+ The LFI vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information or allowing for further exploitation.
remediation: |
Upgrade Tiki Wiki CMS Groupware to a version that is not affected by the CVE-2010-4239 vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- "fonts"
- "extensions"
condition: and
-# digest: 4b0a00483046022100e32971dcd8a98425c8debf614fcd5d835d07bac4b62b0a569104508aac1c9d02022100cc91e91ad102119063c909d5590726ea69cec3947ce1b2f48416b00cecfc3b5a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210090c56e842aeb3570e427312f5aee63103c4b7521f430ae37bdf3307a3d3147c8022065ff372bacb5bda3d4f03c53a39317a8bb9fe0aaa14e20f4eebfd32acf972065:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-4282.yaml b/http/cves/2010/CVE-2010-4282.yaml
index 81a2697d9d..aba32eb286 100644
--- a/http/cves/2010/CVE-2010-4282.yaml
+++ b/http/cves/2010/CVE-2010-4282.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify, or delete arbitrary local files via (3) the layout parameter to operation/agentes/networkmap.php.
+ impact: |
+ An attacker can exploit this vulnerability to access sensitive files containing confidential information, such as configuration files or user credentials.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/15643
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502204a0689ae7e2b94e685165427ca5a1dbd1b254f8a1293c3189c1011856b84a392022100fd9c36b8cdb35f035b2d4caeef0d789dcc5655ab507ef1c156fc13b7ffc62979:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100cbf7398b57938fea537f5a30f8781a9a7094027c0aa7ffb5b94f2e75c71e722c02210090225f538796981048a678a70a32955fa592c09a8d9b86af85f2dca137f4d264:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-4617.yaml b/http/cves/2010/CVE-2010-4617.yaml
index bf32a4874f..ace71e97db 100644
--- a/http/cves/2010/CVE-2010-4617.yaml
+++ b/http/cves/2010/CVE-2010-4617.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JotLoader (com_jotloader) component 2.2.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/15791
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220751daf98adf2fc76934784b506a2c313a9dd325da74db77eae0a899a5604ffe4022100b96e21a4ede659a8c6da54c294a86ed5fa7dcf1f33dac72cac2ef36ed15ef7c0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402201e304c93872774375c9e2f40a3ea3a62a2e718f2373aa7d717296bea538a9d5602204a3b5200b63cb849e7d2f3dd9dfff012c07cdb6472472b0188f5c953fe181dfe:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-4719.yaml b/http/cves/2010/CVE-2010-4719.yaml
index 262ad8f1ba..4dbae68153 100644
--- a/http/cves/2010/CVE-2010-4719.yaml
+++ b/http/cves/2010/CVE-2010-4719.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to further compromise.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/15749
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022056706eff2101e1608f470f1ed1ab9fca43ca055c5e0736b57a12f9da101e52480220217cdd8750c4ba9af1b49959c7315b35401106349adc128cb24d039896392be4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e1f8a372c1bd7932dce981902ac35522c36e7998e6ebca24a9674c9a95dbb83e02206b50e0d0af2f400db04740e43eeb43f9d9ba537f771047dc85207c54326376ac:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-4769.yaml b/http/cves/2010/CVE-2010-4769.yaml
index ecc5ddf385..ed3e5618d0 100644
--- a/http/cves/2010/CVE-2010-4769.yaml
+++ b/http/cves/2010/CVE-2010-4769.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Jimtawl (com_jimtawl) component 1.0.2 Joomla! allows remote attackers to read arbitrary files and possibly unspecified other impacts via a .. (dot dot) in the task parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/15585
@@ -37,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e1a0c3416a934165ab086fd764ec201e91351d2d4e3a11a5744fed0196265ee702203dbdf6d49f76074c9ddaeb09f1952e3c691a4a8b64004d3d5caf5232b4ca3696:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100acb1d49a85e8148634326e4c540adb9cbae3fd6807926467774e19b92ba508a2022100ff8ae67f23946a9a48b56c85d74a003f211d02b379ed1d446234f3fb2f4ca887:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-4977.yaml b/http/cves/2010/CVE-2010-4977.yaml
index dddc1d3084..4a1c1bd897 100644
--- a/http/cves/2010/CVE-2010-4977.yaml
+++ b/http/cves/2010/CVE-2010-4977.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A SQL injection vulnerability in menu.php in the Canteen (com_canteen) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the mealid parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! installation.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/34250
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022026b8a76df6727bda4609be663e800e4cf7307d6348437e4c3e640cd3229b3cfe02204695e1e6810dc71e385251a2416a9ccd9f78d09e04b05e3fa277ab29b41278a4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502200a92230f9eac5cba3cbd4791acec5b8cf3cd4a0762c4b3bb3aaca79e5d4f5e61022100d187141dbf118e5c522c0b10a8e03d9339dfa8c86a02fb2ac445b9be7b74c57f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-5028.yaml b/http/cves/2010/CVE-2010-5028.yaml
index fdaad34b5b..4060c4e39c 100644
--- a/http/cves/2010/CVE-2010-5028.yaml
+++ b/http/cves/2010/CVE-2010-5028.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A SQL injection vulnerability in the JExtensions JE Job (com_jejob) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in an item action to index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12601
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220243c914cc636e6fe2ccaaa26bc1684ac9b0f4c2b7be8d6ba831b4b12e304a5380221008081d8aa6eb727d81a33d509c1ce0e14fcd3d10cc6784f445a42912b2cc6f865:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f9a4d2c0299973501883e58d5c3a97b018103699cb9b3631ec1cdabc4a8adfa602207c1c3c3aa91f435b358f0c3b805b814035f680e56429822d17f4fef3ed0451a8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-5278.yaml b/http/cves/2010/CVE-2010-5278.yaml
index 7ce094a5c5..abf68c25d8 100644
--- a/http/cves/2010/CVE-2010-5278.yaml
+++ b/http/cves/2010/CVE-2010-5278.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl and possibly earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter when magic_quotes_gpc is disabled.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server, potentially leading to unauthorized access or sensitive information disclosure.
remediation: |
Apply the latest patches and updates provided by MODx to fix the LFI vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100fe9f307e9f81a5335488b4fb4096ac2369154670a82fe8c177b53bcbdb45a1d2022048032106cb02da6d0a955729b170bd5fabf68fe23f3bfc9599e7810e36ca1af1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502200f081c8c91e4617e57f2d789627f44bbe9800bf9091202355b24fecf7ae94dd60221009e2b1786ca510e019b852ba7ab30f16dfa4ca4749bf2af388ff29fd8cb580b36:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2010/CVE-2010-5286.yaml b/http/cves/2010/CVE-2010-5286.yaml
index 9707be3693..05e054c6da 100644
--- a/http/cves/2010/CVE-2010-5286.yaml
+++ b/http/cves/2010/CVE-2010-5286.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: critical
description: A directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ Arbitrary file inclusion leading to remote code execution
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/34837
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ee2e79350670f365f41c530b1e8cc1e242a82ae70adc1152c366feabb9a5496a022100c2989851fa54f6b1b22a25489996483eeb82339fac23032402b077c9c3222c0d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022026c6160757337260f02182e7da5247cd3375279bda0cb4019649d4d424ad7f820221008b06dbaf2dab8b4048049c3bb9dff509b4835cb93b748812a506ce7da9f72922:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-0049.yaml b/http/cves/2011/CVE-2011-0049.yaml
index deb19ffc8b..61a9a50fb9 100644
--- a/http/cves/2011/CVE-2011-0049.yaml
+++ b/http/cves/2011/CVE-2011-0049.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: A directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface.
+ impact: |
+ This vulnerability can lead to unauthorized access to sensitive files and data on the server.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/16103
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402206ca422d66ad876e6107ea812d536d7235747bc439bfd0244b238b90ac0b6f3f3022001e1db5cb3bfc0822b08b51e4898753807b14750bd10030d7e041ae2c8e69cc0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210097d65a61847a71cf146303c48b07acbe6ee9573724d9b8a50d2bd5eb79462b780220062ff7750adae7407b954879fb76f5894ae9e28a09651cd9eb7cea7ddaada2d3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-1669.yaml b/http/cves/2011/CVE-2011-1669.yaml
index b6bb1f47b2..5528047a15 100644
--- a/http/cves/2011/CVE-2011-1669.yaml
+++ b/http/cves/2011/CVE-2011-1669.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in wp-download.php in the WP Custom Pages module 0.5.0.1 for WordPress allows remote attackers to read arbitrary files via ..%2F (encoded dot dot) sequences in the url parameter.
+ impact: |
+ An attacker can read arbitrary files on the server, potentially leading to unauthorized access to sensitive information.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1669
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022009da50f959ea77102bd6c708c7a73038671dfcc9c510ea3e4c680f0e99d3c1b70221009c2237750474a6f5c9c66ece823f4e1e717d377c2c4c3d7918fab2c0f408aa6e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221008b8f0bcba9fcb205a9e391e62ed56c7e34cdde7e59250198d678127ead4b9cef0220695a0b07debc640b341399be8b0ab088773c4e7e27cfb7b583f69432fb98935f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-2744.yaml b/http/cves/2011/CVE-2011-2744.yaml
index 428f52d932..512b1d1609 100644
--- a/http/cves/2011/CVE-2011-2744.yaml
+++ b/http/cves/2011/CVE-2011-2744.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in Chyrp 2.1 and earlier allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the action parameter to the default URI.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, remote code execution, or complete compromise of the affected system.
remediation: |
Upgrade Chyrp to the latest version or apply the necessary patches provided by the vendor.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a8e8920aba07fc0c1a26f58049ff9bc7238f8fab2c74e628b9d4240414007fdd02205bd18c7c250462d06b3e40d3f422ef7471c0aee0aae7ca5f8fd43ba938adc719:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e52378d2ad2631ef3866dc183c3d7e50e433fb239c2bf582d9743eb3ae8fbd430220419e2e3f855267e9a4cc1f49022609788d95e7e531a7ef02b34f9af4fdb62d45:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-2780.yaml b/http/cves/2011/CVE-2011-2780.yaml
index 2b94dcb98e..fc79abbd29 100644
--- a/http/cves/2011/CVE-2011-2780.yaml
+++ b/http/cves/2011/CVE-2011-2780.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in includes/lib/gz.php in Chyrp 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, a different vulnerability than CVE-2011-2744.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire system.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- http://www.justanotherhacker.com/advisories/JAHx113.txt
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ccaa1ad7fac3e62c06cb569dcf091a56ce50c9158117a5d34de10aa5b822e43d02203a5170833a6d68bb5bade8169b4478251afb3f5d17df27248bc92955766f92ee:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022071fd623131d7bc529448e9ee46830beafa89d7ecccaad9846b2acccf9d44bfc1022100ef9a8e16568a6124b47717f337eb7629405220ee1508d3f0e0a4caf535ac2233:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-3315.yaml b/http/cves/2011/CVE-2011-3315.yaml
index f74f8b5278..26d4d11230 100644
--- a/http/cves/2011/CVE-2011-3315.yaml
+++ b/http/cves/2011/CVE-2011-3315.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049.
+ impact: |
+ An attacker can exploit this vulnerability to access sensitive files and directories on the affected system.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/36256
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402201eb76aac1d05a02462dcbb4a0f570215da52235e4c2560555d7a7658d117cdca02204830579f89076aa827ef53abfb58ccea4f45383f3942f3b1c1ab7d145e1c60dc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009b7392964ef378762e6b1bce5a5b25eb2084c11984e0c3ec13108d09f465682d02204ed59732b3f70aa5bfdb73ce1a8d1cc11c64e1393bcd0095f5bfdb14d7d1fb23:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-4336.yaml b/http/cves/2011/CVE-2011-4336.yaml
index b4abf4d032..c74b6299d4 100644
--- a/http/cves/2011/CVE-2011-4336.yaml
+++ b/http/cves/2011/CVE-2011-4336.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: Tiki Wiki CMS Groupware 7.0 is vulnerable to cross-site scripting via the GET "ajax" parameter to snarf_ajax.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2011-4336
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022053451e5690eb2f84dee04aa35a1c0954bd34bb6672d046237a4c07b1891df34c022046768382d17a3bae86fc3b88ec236ceec03a179318a2d79ad105ec3c947f9626:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ead2f7a38136dd68994c79dbeb18cf01fd4d516595fc88f5973525e340511446022100d80027066d11610588ffd72fd24fcdd4c226839cca15cdc0b265a9b54bf7cb87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-4618.yaml b/http/cves/2011/CVE-2011-4618.yaml
index 6b96964292..6b03042dfc 100644
--- a/http/cves/2011/CVE-2011-4618.yaml
+++ b/http/cves/2011/CVE-2011-4618.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.
+ impact: |
+ Allows remote attackers to execute arbitrary script or HTML code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2011-4618
@@ -44,4 +46,4 @@ http:
- 'contains(body_2, "")'
- 'contains(body_1, "Advanced Text Widget")'
condition: and
-# digest: 4a0a00473045022100bab41b4e3cbdf9f91ef217eed2c475f2e55bbcc488d475bcd8554ffb5bfc2ed6022016a097a413083898aba272f37d3a0b34b295b6eb6c72bb77b3267b8d9e0a8d64:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206a77864d6263a6c9397ee40b285ee2af4533ac19ea960e55397ed2caa5316154022100bf56f186c8aa43739fdb6501b7b59969e146f9d69ecb772b6097d7b1fd87cb79:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-4624.yaml b/http/cves/2011/CVE-2011-4624.yaml
index ecd32ada0a..fa6ae0c2ba 100644
--- a/http/cves/2011/CVE-2011-4624.yaml
+++ b/http/cves/2011/CVE-2011-4624.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2011-4624
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009116632ffa126cd449fdc97ccbabe60966eeb951c1d0849d1d30e763e25fe56c022100b3e01c5535243fc7451c77cad005004d9ecd3a971cce97806ac805be23d0277e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e48c760facc10875f3b22aa4b2e7261cb9d94dbddc3bb83656766cfd3ae573d2022100cc1e13347644fd3ab565397b42e4b833231009c21c579f4ad5b936e3f8fa3f53:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-4804.yaml b/http/cves/2011/CVE-2011-4804.yaml
index 8cab1a7768..c9a04bd4f9 100644
--- a/http/cves/2011/CVE-2011-4804.yaml
+++ b/http/cves/2011/CVE-2011-4804.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the obSuggest (com_obsuggest) component before 1.8 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ impact: |
+ The vulnerability allows an attacker to include arbitrary local files, leading to unauthorized access to sensitive information or remote code execution.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/36598
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502203affeb8d99a811e151da8924f8d7a577009eb90054ca14eb056b7d633a15cb2f022100eff7fa8466dfc8e5c1c7aa6c0f4521116f0c397b159fe24011c59b242ee27613:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502201a828722c2b46d5775d2ec9bd905f56af4509edb26806bea57f8a6dc77bfebb50221009a2cfeda87892055cac84f182ea05c4f0f1e41e4835ab51b04bcb0281b4f7838:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml
index 6d1d3e9c65..81fc43e5a7 100644
--- a/http/cves/2011/CVE-2011-4926.yaml
+++ b/http/cves/2011/CVE-2011-4926.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in adminimize/adminimize_page.php in the Adminimize plugin before 1.7.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.
+ impact: |
+ Allows attackers to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Update to the latest version of Adminimize plugin (1.7.22) or apply the necessary patches to fix the XSS vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d56555e027f495343e0cc20949b907ac985a6b461074dd004330a02566ad1327022066a6a5d0d9314a5d36ea612835db8cef708fae9f287996ac86aaa1ff808e9f9e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502201e014fc72bf46cbcd1b06d11a0170ba550ca4984bf04f0d8c369f1cc4e4c1033022100fbf7e61f5dd4d08b3959553ada280e1d27b94faa5610e688201180230e2236e5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-5106.yaml b/http/cves/2011/CVE-2011-5106.yaml
index 02263abac8..60ef2a505c 100644
--- a/http/cves/2011/CVE-2011-5106.yaml
+++ b/http/cves/2011/CVE-2011-5106.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Update to the latest version of the plugin (version 0.1.8 or higher) which includes a fix for this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022042e55b9c813c44071ed574f3655a5ef53a8363ef952c58d1518b389e42f74f27022057f7ea384da619a03f3bf2a98b1d58eb8a89e84dc46a328b330810ddac4c8976:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022038c3fec75cb4b8bf587e6df77c5d753c982049ad15b8672bfcddac5612c9e97a022054d03eb720bbbbc7d5ab05c19117b0ffcd706c84d4c37d51eb5c1aa0d899621b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-5107.yaml b/http/cves/2011/CVE-2011-5107.yaml
index bdb61f296a..2a642d067e 100644
--- a/http/cves/2011/CVE-2011-5107.yaml
+++ b/http/cves/2011/CVE-2011-5107.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in post_alert.php in Alert Before Your Post plugin, possibly 0.1.1 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the name parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the Alert Before Your Post plugin (0.1.1) or remove the plugin if it is not necessary for the website's functionality.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022055ced5bfd33e4afd72d67425819811a91e7e5f0876ce4e9885001d0c271de8af02201e4080fdcb830bf7270ef17418962c4874d2759c2f679dc72dbba486711b04fc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402202a877db4fb15ee1e82c7f37a95b434e0cc663caa5035ff5f2064dc717b056b7c022023f26db461db668dd7d9b185eb2803f6056bc3bd0ffd47204c8b102f592a2d04:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-5179.yaml b/http/cves/2011/CVE-2011-5179.yaml
index 7b3ce1164c..062b625e3b 100644
--- a/http/cves/2011/CVE-2011-5179.yaml
+++ b/http/cves/2011/CVE-2011-5179.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in skysa-official/skysa.php in Skysa App Bar Integration plugin, possibly before 1.04, for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of Skysa App Bar or apply appropriate security controls to sanitize user input and prevent XSS attacks.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100aa234e86256ffc164333438fb7936a708815e293e76c9b28bd628c3e6224f65702203ff2f0e1d9b73ae425aac3c41cab67f26856c51d2f0d09f87468114a57ba76be:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022029dc11cace1e2333cfd9688a0051a1d57addb9ff4bd78726fa9e9e0f33c66c7e022073cf2693084088fff3a4a54c921729c04768bfb3e1be915ab2744bd639beb38b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-5181.yaml b/http/cves/2011/CVE-2011-5181.yaml
index 8d054c1eae..1c32f3d60a 100644
--- a/http/cves/2011/CVE-2011-5181.yaml
+++ b/http/cves/2011/CVE-2011-5181.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in clickdesk.php in ClickDesk Live Support - Live Chat plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cdwidgetid parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the ClickDesk Live Support Live Chat plugin to mitigate the XSS vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402202af7bcc9621069d6db720d21c7742057c20f4657f0645be03ab678f2a104698c022079c834040fc7771880fe6161f0cc2c19d96dabd477c8d9ee292ef8f8c28c515e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ba506809b9ad5aab64016ffb9e331ef401083b09c3d3c9519f7e84d44413a6ef02210086a8844b3cbf42d134258706821a568927e093ad19a1c03fc0c27166b1509468:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-5252.yaml b/http/cves/2011/CVE-2011-5252.yaml
index 723a5581e0..a47e02162c 100644
--- a/http/cves/2011/CVE-2011-5252.yaml
+++ b/http/cves/2011/CVE-2011-5252.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in Users/Account/LogOff in Orchard 1.0.x before 1.0.21, 1.1.x before 1.1.31, 1.2.x before 1.2.42, and 1.3.x before 1.3.10 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the ReturnUrl parameter.
+ impact: |
+ An attacker can craft a malicious URL to redirect users to a malicious website, leading to phishing attacks.
remediation: |
Validate and sanitize user input for the 'ReturnUrl' parameter to prevent open redirect vulnerabilities.
reference:
@@ -38,4 +40,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
-# digest: 4a0a00473045022100fd12e5a041aaae0a5130071fb6d9759118673193efd04dac265705836bcd458f0220112551af8b1e76af993ae7132cfd3191a310dd9bafb82ec45ef30cdbc813f68f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008422f3fc7d6aacfd8515a15ffef9144684a05df3de2d614412f0b4fc30e99d3c022100c0d5eccddc0e5a69cbb4ae993e1400aa262559e3dcf2d5c085df453d9880ca0e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2011/CVE-2011-5265.yaml b/http/cves/2011/CVE-2011-5265.yaml
index 2e0bc4ce9c..348c2ec18e 100644
--- a/http/cves/2011/CVE-2011-5265.yaml
+++ b/http/cves/2011/CVE-2011-5265.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in cached_image.php in the Featurific For WordPress plugin 1.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the snum parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the Featurific For WordPress plugin (1.6.2) or apply the vendor-supplied patch to fix the vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d310e6f52ce09f6cb66affe4c4277d3982ca0d24328f3714f57205df09c46885022100fbe9afa165399a09ef0b094f39e70ae664f3b368e35074460bb496d0b0b4b383:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206313bad87098f5965683f63da99d47a842af82dd612850eadc3943e6f1c4cd81022100ee53974c59c4a9d29ac7a810149c5e7ce9535b5bb808170cce6b91bc8150eb81:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-0392.yaml b/http/cves/2012/CVE-2012-0392.yaml
index c6f7ba2976..cbcaad14ed 100644
--- a/http/cves/2012/CVE-2012-0392.yaml
+++ b/http/cves/2012/CVE-2012-0392.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.
+ impact: |
+ Successful exploitation of this vulnerability can lead to remote code execution on the affected server.
remediation: Developers should immediately upgrade to at least Struts 2.3.18.
reference:
- https://cwiki.apache.org/confluence/display/WW/S2-008 https://blog.csdn.net/weixin_43416469/article/details/113850545
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b1137eae8a344fa580bcdf0fd96d13817bfebb8a4af031afca3a1b562eefa577022068aa9fd24ac7956a98b731113729ef99c2e79b3e4e2942629722e45f6ee107c9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022006282df56f2a901eecf94e9855d6db9df4946ed40b339abd3f6336b50969c41b02203b8999bd479093b096799e26a94f92a95d86ccd2f1eb2565bab5b8876cbe7e5e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-0394.yaml b/http/cves/2012/CVE-2012-0394.yaml
index ba2887e0a0..990069c471 100644
--- a/http/cves/2012/CVE-2012-0394.yaml
+++ b/http/cves/2012/CVE-2012-0394.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Apache Struts before 2.3.1.1 is susceptible to remote code execution. When developer mode is used in the DebuggingInterceptor component, a remote attacker can execute arbitrary OGNL commands via unspecified vectors, which can allow for execution of malware, obtaining sensitive information, modifying data, and/or gaining full control over a compromised system without entering necessary credentials.. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself."
+ impact: |
+ Successful exploitation of this vulnerability allows remote attackers to execute arbitrary code on the affected server.
remediation: |
Upgrade Apache Struts to a version higher than 2.3.1.1 or apply the necessary patches.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220214affb609f88f3bcefa9e96f9445a0c0b7dc150fc39e73903804932f73180840220614d57522a07fe917ca8530112b6cce116ea46fff598b28015ad0a9e71dbc88c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009683d0193918ff118b880d91083267c382f2691a3c9a956f08d27934ed4d25d5022025d99bbc4674f817bab05edcf843bc7763be217cb1c647100ee8207338e9055a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-0896.yaml b/http/cves/2012/CVE-2012-0896.yaml
index 64df9a572b..7e797d39ce 100644
--- a/http/cves/2012/CVE-2012-0896.yaml
+++ b/http/cves/2012/CVE-2012-0896.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: An absolute path traversal vulnerability in download.php in the Count Per Day module before 3.1.1 for WordPress allows remote attackers to read arbitrary files via the f parameter.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access, data leakage, or further compromise of the system.
remediation: |
Upgrade to a patched version of the Count Per Day plugin (version 3.2 or above) or apply the vendor-supplied patch to fix the path traversal vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022043270f6e9f2f9572e9191960de0be3a7fe5f4760eb1412907dc92dc5b792bb78022100c182afeef7ff9e408fa61647426441dee6e4ec42c69e1967b3e88e8e2de27746:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202937c32be7ffb92c9a11e845916e4b40d7f62f0a6ebcef1fb4707157f2b6f3040221008c5d345fb60fb88321f3a4f22b952d0e6f3396362ed4e66a5feff7a9bf57dcb4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-0901.yaml b/http/cves/2012/CVE-2012-0901.yaml
index f6eb6cc86a..45f5774a28 100644
--- a/http/cves/2012/CVE-2012-0901.yaml
+++ b/http/cves/2012/CVE-2012-0901.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in yousaytoo.php in YouSayToo auto-publishing plugin 1.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement.
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bf62b8ae0e9423b477c4176ec968c8fba0b4b524efcf38632b247311beab69d9022100c4bc8fdbb209d38145f17f2439446cef82d76e8e2e66739c224ce851d6873049:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022058105695f45aca7080f4d99b0b495691bedb9798487eb893b5fa06a342008b53022100974de668cb5c4db918db8736a206169c76a05004a331d51435ebfd1bed2e3e89:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-0981.yaml b/http/cves/2012/CVE-2012-0981.yaml
index 3ec8e4ecb2..cb6a21c41a 100644
--- a/http/cves/2012/CVE-2012-0981.yaml
+++ b/http/cves/2012/CVE-2012-0981.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in phpShowtime 2.0 allows remote attackers to list arbitrary directories and image files via a .. (dot dot) in the r parameter to index.php.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server, potentially leading to unauthorized access or sensitive information disclosure.
remediation: |
Upgrade to a patched version of phpShowtime or apply the necessary security patches to fix the directory traversal vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210096935d615f52f39f003fd899f9cb1d7be9b48c9c882ff733f686d82ba34ddae7022100f939341b22db34d1feb5098038d1eb5b1cef6b52ee242b97077c38b00e179dbc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210091503c32f6e760d5c3d3aa871a287093fcf5f148c0541566fca436a744cb258f0221009e995a8a3d34953722e404cec14297887b6609f433012e27c2371ecbdf2cf5e5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-0991.yaml b/http/cves/2012/CVE-2012-0991.yaml
index a1b15ee904..fe71b944ea 100644
--- a/http/cves/2012/CVE-2012-0991.yaml
+++ b/http/cves/2012/CVE-2012-0991.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: low
description: Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Apply the latest security patches or upgrade to a newer version of OpenEMR.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100da8448c9e26c17591bc554c10c81dda090ebf4c1a8d21c302f6d0879191390a20221009bf19c03b16e307a1de9fae3124ef6c59c32878d5acc8a289ca625251e5a1ab8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402206af9d5437a082136493eb50bae5a2cca921987ff736bc0aa1511fae3d10b352b02205c58f3fb4179c7c0cde24051152d8f79edb60483338dead09ad495395d428d87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-0996.yaml b/http/cves/2012/CVE-2012-0996.yaml
index dec76c85fe..c5e17f2295 100644
--- a/http/cves/2012/CVE-2012-0996.yaml
+++ b/http/cves/2012/CVE-2012-0996.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple directory traversal vulnerabilities in 11in1 1.2.1 stable 12-31-2011 allow remote attackers to read arbitrary files via a .. (dot dot) in the class parameter to (1) index.php or (2) admin/index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, remote code execution, and compromise of the affected system.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/36784
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f84dea5c9153264884fa26ce4059f842dd09fb352df513c493deab6e3ffc82c20221008039d570b0e4e7cb119aa41bdd2d25704873ea821204e87ea27d953c8f8e1243:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022031d3f94d24b3d0f70fdbac9bb5aa6ce3d64935726c0b22eb244045ee63bcd7ab022100a675ebeee4e80933737faac919151326ffe3bc30491219101218ee770e14ccaa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-1226.yaml b/http/cves/2012/CVE-2012-1226.yaml
index 41a91b7180..32bbc82087 100644
--- a/http/cves/2012/CVE-2012-1226.yaml
+++ b/http/cves/2012/CVE-2012-1226.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Multiple directory traversal vulnerabilities in Dolibarr CMS 3.2.0 Alpha allow remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the (1) file parameter to document.php or (2) backtopage parameter in a create action to comm/action/fiche.php.
+ impact: |
+ Successful exploitation of these vulnerabilities could allow an attacker to read arbitrary files from the server, potentially leading to unauthorized access or sensitive information disclosure.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/36873
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100922235435130580e69d43a791b7a6aea5dd2b8b9dd9178547dfd2ca308a43edf02202c57df51fc3da583fd8766dae576310d3fcdc98ca1d64d89ae0fb14cae6531c1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d903161db4a66f050d495aa8c3e984263f7ff37e884924f6bb8d94a3060748bd02206cfb74efe3b2162cf198831ba090fa1c4cdacec5beb5689f8166486e88c25c83:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-1823.yaml b/http/cves/2012/CVE-2012-1823.yaml
index df93200484..03f626eedf 100644
--- a/http/cves/2012/CVE-2012-1823.yaml
+++ b/http/cves/2012/CVE-2012-1823.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
+ impact: |
+ Remote code execution
remediation: |
Upgrade to a patched version of PHP or apply the necessary security patches.
reference:
@@ -47,5 +49,4 @@ http:
- type: status
status:
- 200
-
-# digest: 4a0a004730450221008066cdce18720214ac09d4d19671ec94b8843659b9ec85c84d36a7822f435e5502201ca5e1be58c49a2aff615040432936da67bb8453a9fe4bfe4a91c041fe0bef44:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100fa871bad697cfafab48725ec3acf1f122ff655983323458968c2fa6f74207a07022100dcd66b02aefd91501668a7752f8a4c4a77d32a10bbfe55efe4994d8d7fdc6088:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-1835.yaml b/http/cves/2012/CVE-2012-1835.yaml
index 5054be3846..b3e0bda55b 100644
--- a/http/cves/2012/CVE-2012-1835.yaml
+++ b/http/cves/2012/CVE-2012-1835.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple cross-site scripting vulnerabilities in the All-in-One Event Calendar plugin 1.4 and 1.5 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) title parameter to app/view/agenda-widget-form.php; (2) args, (3) title, (4) before_title, or (5) after_title parameter to app/view/agenda-widget.php; (6) button_value parameter to app/view/box_publish_button.php; or (7) msg parameter to /app/view/save_successful.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, leading to potential data theft, session hijacking, or defacement.
remediation: |
Update to the latest version of the All-in-One Event Calendar plugin to mitigate the XSS vulnerability.
reference:
@@ -51,4 +53,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205dd5a5bd2f0159b576e307d90b86b925ec45251b2212bb03655460e26db678e002201274d73ccf5e3fedd3d5f955fda1f90dc3f48bcfcd807208ecd51830ee65298d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100a60088dcada482af5029530d3b3d0e51b9af45aa4c0c305a241c89948cd3cc97022100f9cf4f0ca410a0b4479522c797020de7682ea6e26acbf65f9bdae70361ce1f4a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-2371.yaml b/http/cves/2012/CVE-2012-2371.yaml
index 5ae9918e62..a6268c69f2 100644
--- a/http/cves/2012/CVE-2012-2371.yaml
+++ b/http/cves/2012/CVE-2012-2371.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in index.php in the WP-FaceThumb plugin 0.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pagination_wp_facethumb parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential theft of sensitive information or unauthorized actions.
remediation: |
Update to the latest version of the WP-FaceThumb plugin (0.2 or higher) which includes proper input sanitization to mitigate the XSS vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022063cfe684e3680f38834aabb4ac32554f36bef83e45c12814aa5ade55a1272459022011d7b1c446e22aa799cb493ecb96aaecf4818e8e331da50d0fb797e006fe2277:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100a451cb95840a08bc92aa3efac38d881cee6f1a25ce47babc654cd59cf8f2a338022100a60670a33e8bd6a0f7155deb1dfd658da441f4dc06d86f733814fa246002afca:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-3153.yaml b/http/cves/2012/CVE-2012-3153.yaml
index 34e75c4b6d..ede1122189 100644
--- a/http/cves/2012/CVE-2012-3153.yaml
+++ b/http/cves/2012/CVE-2012-3153.yaml
@@ -8,6 +8,8 @@ info:
An unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4,
11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown
vectors related to Report Server Component.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized remote code execution.
remediation: |
Apply the necessary patches and updates provided by Oracle to mitigate this vulnerability.
reference:
@@ -62,4 +64,4 @@ http:
name: linux_working_path
regex:
- "/.*/showenv"
-# digest: 4a0a00473045022100b8455ac21b80a5260e1793e9cd76e78f23f7891f4024746380341e9f77786b7f02201e2ac88f61fa054ab3b8287ef4e92b6cd3aaa054160aa535ffbc2d8485c82dea:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206b20c1c55c81fef4dbaafa5d763e6e0080cf0589adcb5fd8ac1bb0d510083d8f022100a140c60aaa3a69d82b3f11e6534dfd0000323e2250e822e9bbe7080ce6e3836e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-4032.yaml b/http/cves/2012/CVE-2012-4032.yaml
index f89fda1509..47ed6cfce5 100644
--- a/http/cves/2012/CVE-2012-4032.yaml
+++ b/http/cves/2012/CVE-2012-4032.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in the login page in WebsitePanel before 1.2.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in ReturnUrl to Default.aspx
+ impact: |
+ An attacker can trick users into visiting a malicious website, leading to potential phishing attacks or further exploitation.
remediation: |
Upgrade to WebsitePanel v1.2.2.1 or later to fix the open redirect vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:http?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
-# digest: 4a0a00473045022100edca48fca1d5ab382b01db278a7d30d607a192c0c8a9dbdf103032ecf95f22c502205529150fb4d78cc7a24825f86b84353e0794cad6391d2d70138c160fa5d83bb4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402207602543f3bacfca903cf1afb4e30bb166b97caff3605c1cba10cfb3666d79e58022003987bc8f66668eed9e95e4de6bbc0e4ff9b51bb7e87d79d4c124dff966d1d93:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-4242.yaml b/http/cves/2012/CVE-2012-4242.yaml
index 21c38d55cc..61b4fd7c1e 100644
--- a/http/cves/2012/CVE-2012-4242.yaml
+++ b/http/cves/2012/CVE-2012-4242.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in the MF Gig Calendar plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the query string to the calendar page.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the WordPress Plugin MF Gig Calendar to mitigate this vulnerability.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022075906cf3f171030df9198bf0fb45042aa8467d3fc7734a3933db9dbaf2006b6e022100c75f42a3f048659ca7c3796f6d82dc4c26b97c8cdf61e65b3e35071de4cd7db0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d7aa854fa8a07369a25a7f77bdcda2a48c326d87c20b7de041758b4b78e8223d022071ce9f6abcf3c42eebfa1ebc2b4f4ab8d1a07c58afcbead343d3ead480a788f0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-4253.yaml b/http/cves/2012/CVE-2012-4253.yaml
index d8b2940019..2a497a6055 100644
--- a/http/cves/2012/CVE-2012-4253.yaml
+++ b/http/cves/2012/CVE-2012-4253.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php.
+ impact: |
+ An attacker can read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Upgrade to a patched version of MySQLDumper or apply the necessary security patches to fix the directory traversal vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502206c3037d540cff87adad1e2e7a04f9c875592d8f89b5410fe75fc56a5637af5930221009f476973797ebf91ad697c84cdf2a9cf0231aecf46ce97d00dc02fa6842231b6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100af14a5dea698b34ecef70e5a08fb8d0ae4606149ac6ef546f9d4048d328607c1022042569e46d6fc5bc6349128f8650d8422bb936d441378285d4421181a63911748:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-4273.yaml b/http/cves/2012/CVE-2012-4273.yaml
index fc6c5bb6c8..284cd0a85b 100644
--- a/http/cves/2012/CVE-2012-4273.yaml
+++ b/http/cves/2012/CVE-2012-4273.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in libs/xing.php in the 2 Click Social Media Buttons plugin before 0.34 for WordPress allows remote attackers to inject arbitrary web script or HTML via the xing-url parameter.
+ impact: |
+ Allows attackers to inject malicious scripts into web pages viewed by users, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the 2 Click Socialmedia Buttons plugin (0.34 or higher) to fix the XSS vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100f6ed68b186aa2b1a011a6a2dd63793a763d5699387fc7be306baa316b670d3d80220275179eb839f24558b6bc7dffa6cafde837f0198722d08eb23e263bc7a9d5d3d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402201f895979c53a8a44c41029e255e3e6cca5f42d448ffc075e1ba0c63c0e029a53022016f1b9899f89a74da727b77ab77517a86e107c48714b6eb5b5c531f8fa6d938c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-4547.yaml b/http/cves/2012/CVE-2012-4547.yaml
index e4884ff4ab..720cccde78 100644
--- a/http/cves/2012/CVE-2012-4547.yaml
+++ b/http/cves/2012/CVE-2012-4547.yaml
@@ -5,6 +5,8 @@ info:
author: dhiyaneshDk
severity: medium
description: AWStats is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.
+ impact: |
+ Allows remote attackers to inject arbitrary web script or HTML via the 'url' parameter.
reference:
- https://www.exploit-db.com/exploits/36164
- https://nvd.nist.gov/vuln/detail/CVE-2012-4547
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022041260fd2e8a49bd7918ca992439833bef1808d32c54a50a302dd26b9828138150221008d045f606bc52beb9fcba1961134340b355b3f0815f7b27872d73c0ed920d661:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402202a0794bed7e96c74b5c23e1a33771b5515251a4a11a3bdbf1bbef57faa66dc66022039605f685e93431029581e46a0793016be45d5f85c4c2d2e3a8df4ff8c2d1e4a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-4768.yaml b/http/cves/2012/CVE-2012-4768.yaml
index 169c94dd2e..b72890168b 100644
--- a/http/cves/2012/CVE-2012-4768.yaml
+++ b/http/cves/2012/CVE-2012-4768.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of Download Monitor (3.3.5.9 or higher) or apply the official patch provided by the plugin developer.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100af51ca112118b69ebacf7878456fe9838392b6b42ce845f319f3a6c4f7fa3717022100a9cddb89069ab0f11d196052337b34f39043edac9d9a3d6b7dc03853de70d6f3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ebbe7f5db516dfb9e8d1f9cd08375491e27f7e7a86770cc1fe7315b25d62c95a022100901ba23913216d153ef95886eca13be0f5f29b5d414b8cc55cc303149d624e81:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-4878.yaml b/http/cves/2012/CVE-2012-4878.yaml
index 2ca898b185..469e05ae91 100644
--- a/http/cves/2012/CVE-2012-4878.yaml
+++ b/http/cves/2012/CVE-2012-4878.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A path traversal vulnerability in controlcenter.php in FlatnuX CMS 2011 08.09.2 allows remote administrators to read arbitrary files via a full pathname in the dir parameter in a contents/Files action.
+ impact: |
+ An attacker can read or modify sensitive files on the server, potentially leading to unauthorized accessand data leakage.
remediation: |
Apply the latest security patches or updates provided by the vendor to fix the directory traversal vulnerability in FlatnuX CMS.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d6ab06348554d3e6c050a9e5256169b20d1c7ede5538404fdbfbd439984f57f60220188679716e64ea25f878d495940cbd4dd7b3098f7e747d533792a5e9ac515912:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ce5195819e7865cf1103c9bc43bfb499880a1ddc9fac36f8df36fe36f8f0f96602204c4af856a0ec4128e55a6da648ca13aafb5d73e0771e886e5a811745dd4a129e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-4889.yaml b/http/cves/2012/CVE-2012-4889.yaml
index f9ca85bfc3..739c473901 100644
--- a/http/cves/2012/CVE-2012-4889.yaml
+++ b/http/cves/2012/CVE-2012-4889.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple cross-site scripting vulnerabilities in ManageEngine Firewall Analyzer 7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) subTab or (2) tab parameter to createAnomaly.do; (3) url, (4) subTab, or (5) tab parameter to mindex.do; (6) tab parameter to index2.do; or (7) port parameter to syslogViewer.do.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected user's browser.
remediation: |
Apply the latest security patch or upgrade to a newer version of ManageEngine Firewall Analyzer.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502202c69534a578527559e10b44c7367e0d2757f5579dee33fa91a1b98986693f72d022100e9f694dc24caa3b01abdb83691acbc79caa01d3f2230fed54e139de676856957:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100c6c35145fdfc7038b7cf7d21ab7bd2c23207b7b050865d00c256ebd58edf58fa022100a82057de268fce4de55702b67c8f3f09a548ebd9dd9fd06dba78cdecc367f033:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml
index 15ce4fe468..86f4edfdf3 100644
--- a/http/cves/2012/CVE-2012-4940.yaml
+++ b/http/cves/2012/CVE-2012-4940.yaml
@@ -5,6 +5,8 @@ info:
author: dhiyaneshDk
severity: medium
description: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in an edit or delete action to the default URI.
+ impact: |
+ An attacker can read sensitive files, potentially leading to unauthorized access, data leakage, or further compromise of the server.
remediation: |
Apply the latest security patches or updates provided by the vendor to fix the directory traversal vulnerability in Axigen Mail Server.
reference:
@@ -40,4 +42,4 @@ http:
- "fonts"
- "extensions"
condition: and
-# digest: 4b0a00483046022100eec0f93ad04a73deecae7c993ae01e9d0a57efed806fc8ec1bc3f11499953a5c022100b5193a6e7eef2f7918ab4463bcdc76b1719ec271ebaffe0c69c159110ea51ecf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100bcb93a85e762a81c4ca7d98ce6b0fe3528962dce21efe81c1e1ee9ba9388b97302207f5783d3f27ff48af2191ffa4aa33643b3c3454f70003c551532af70f9344b2f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-4982.yaml b/http/cves/2012/CVE-2012-4982.yaml
index 49376f9938..a1cf16545b 100644
--- a/http/cves/2012/CVE-2012-4982.yaml
+++ b/http/cves/2012/CVE-2012-4982.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in assets/login on the Forescout CounterACT NAC device before 7.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the 'a' parameter.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the download of malware.
remediation: |
Apply the latest security patches or upgrade to a newer version of Forescout CounterACT to fix the open redirect vulnerability.
reference:
@@ -37,4 +39,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
-# digest: 4a0a00473045022100f019b8be4db54c3d3c58c66926a558b1ac0f2e2717bacd47a43c1844032730fc022063c579e3b48f7b2260a6aafb9a099562216185a74e99f86c0f3d136c39e4872f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009b89a5eb4db723062b612d59daf2a4427a34860705309b3a8ccef0462629664102200aa9e5ac13539f5546a57a93e60a5bfbfb603ecdd27231e5ee4761989aeb6e5c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-5321.yaml b/http/cves/2012/CVE-2012-5321.yaml
index de0a00b29a..e4cddf5f53 100644
--- a/http/cves/2012/CVE-2012-5321.yaml
+++ b/http/cves/2012/CVE-2012-5321.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
tiki-featured_link.php in TikiWiki CMS/Groupware 8.3 allows remote attackers to load arbitrary web site pages into frames and conduct phishing attacks via the url parameter, aka "frame injection
+ impact: |
+ Successful exploitation of this vulnerability could lead to phishing attacks and potential unauthorized access to sensitive information.
remediation: |
Apply the latest security patches or upgrade to a newer version of TikiWiki CMS Groupware to mitigate the risk of open redirect vulnerabilities.
reference:
@@ -38,4 +40,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
-# digest: 4a0a004730450220657fdf02e215924c85fc640d3e15d642d3c3bfc51694397204305a289fab9060022100c7be87d2209034849c0a71b7b246be89ad42ee252e85954efd3f4e334de0c8a0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220474532ff614e3a938698419dd51826c9c2d641e33b47fe7f5d14ba903b3ad2bd022100d8e84f66303b745268bb2bbb7a786f1dd37d0c5c8d44583efee33c3b777046a0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-5913.yaml b/http/cves/2012/CVE-2012-5913.yaml
index 421dee850e..2b9e972953 100644
--- a/http/cves/2012/CVE-2012-5913.yaml
+++ b/http/cves/2012/CVE-2012-5913.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in wp-integrator.php in the WordPress Integrator module 1.32 for WordPress allows remote attackers to inject arbitrary web script or HTML via the redirect_to parameter to wp-login.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Update the WordPress Integrator plugin to the latest version or apply the vendor-supplied patch to mitigate this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100adee9e7dcaf769a8748388a8c02e9f47552a1061276d49b5ad582bba335bca94022043ad9ba4ea16dbb58d3e9de9ed5295c802979cb598e387ec93880e41b6bf9f2d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402206d1ea36955018c9a5addf005b4ca00aa6fe284b5943dda5d903b7ab128656ded02205f865a67e35c405383882c9ed298b28f63c6252c4a9535e191dddd67a845d74e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2012/CVE-2012-6499.yaml b/http/cves/2012/CVE-2012-6499.yaml
index cee1dbee0b..b999245b8f 100644
--- a/http/cves/2012/CVE-2012-6499.yaml
+++ b/http/cves/2012/CVE-2012-6499.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in age-verification.php in the Age Verification plugin 0.4 and earlier for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_to parameter.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the installation of malware.
remediation: |
Update to the latest version of the WordPress Plugin Age Verification or remove the plugin if not needed.
reference:
@@ -39,4 +41,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
-# digest: 490a004630440220229780e9caa0b15586da171825a5a0fd25d3308d9a744012f1846ee7b29e9c8302203cf21db6e6ee250ad9e402e7349c9d4ab76ff3a3d72d3f04ce4703ed4c903d7d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100bd8af2517a97063f8f0ad4e7d78cd103cd7d8b32c38589a55980d7328bff66bb0221008316cb7f49de8d01ec1a35a1fd0f9614debd8d666390d579c45273af7cd348fd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-1965.yaml b/http/cves/2013/CVE-2013-1965.yaml
index f9e75572c2..0a0ffb53c8 100644
--- a/http/cves/2013/CVE-2013-1965.yaml
+++ b/http/cves/2013/CVE-2013-1965.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: critical
description: Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
+ impact: |
+ Successful exploitation of this vulnerability can lead to remote code execution on the affected server.
remediation: Developers should immediately upgrade to Struts 2.3.14.3 or later.
reference:
- http://struts.apache.org/development/2.x/docs/s2-012.html
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100db01b2a5e8b5b55577d1b2ea815494413fa46d15c8d57255721ffc4d3239f753022027caf465cc65eed27f746aae579f2f54c80c2d529b23d738d681f61588e1f30b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009903a3e1aa1de4796437c5ec22c7e9fe8f66b6933044675432f04de35069c0c80221009972ae5a17ade6f270b3a89a00754b6b4140d1a8680026e7214026f60f32a517:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-2248.yaml b/http/cves/2013/CVE-2013-2248.yaml
index e3c21f2f50..1727ea4635 100644
--- a/http/cves/2013/CVE-2013-2248.yaml
+++ b/http/cves/2013/CVE-2013-2248.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Apache Struts is prone to multiple open-redirection vulnerabilities because the application fails to properly sanitize user-supplied input.
+ impact: |
+ An attacker can exploit these vulnerabilities to redirect users to malicious websites, leading to phishing attacks or the download of malware.
remediation: Developers should immediately upgrade to Struts 2.3.15.1 or later.
reference:
- https://www.exploit-db.com/exploits/38666
@@ -36,4 +38,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
-# digest: 4a0a004730450221008cf08226ee47f66378563d2531bcf16d1b7d119faad35c013e7fdd53daf919c702205efd24c07542f82a551cdc3e15b5adcb96ecb558b97734366e5f719f08361707:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205f523eda587cec05282805970bcacd0b1d52ab21c3cd109fb57a9b1576a41139022100d62846038f26508c564256caecfc689384db9ca1b9a2c21706077dbed9480472:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-2251.yaml b/http/cves/2013/CVE-2013-2251.yaml
index 05c339e230..9e8277fe07 100644
--- a/http/cves/2013/CVE-2013-2251.yaml
+++ b/http/cves/2013/CVE-2013-2251.yaml
@@ -5,6 +5,8 @@ info:
author: exploitation,dwisiswant0,alex
severity: critical
description: In Struts 2 before 2.3.15.1 the information following "action:", "redirect:", or "redirectAction:" is not properly sanitized and will be evaluated as an OGNL expression against the value stack. This introduces the possibility to inject server side code.
+ impact: |
+ This vulnerability can lead to remote code execution, allowing attackers to take control of the affected system.
remediation: Developers should immediately upgrade to Struts 2.3.15.1 or later.
reference:
- http://struts.apache.org/release/2.3.x/docs/s2-016.html
@@ -59,4 +61,4 @@ http:
- 200
- 400
condition: or
-# digest: 490a0046304402206119e24ee3f7acb2f071a8e0ab4c041ae406be7c9fd6f915b458b55075e71fab02207006377f00a8f6db8838e954c0e8082334259076d6b1fb35b2d6204b9de43dcd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205601fb089b44d0324d4e78d34a355a1a218e71359e2b5cccfec09dc0dac2a830022100b3ba8a79988f901347cb27d7c2fad60577fb0d5d51daa8e7900c2b108584ca81:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-2287.yaml b/http/cves/2013/CVE-2013-2287.yaml
index cd6b420187..ef4a8e06bc 100644
--- a/http/cves/2013/CVE-2013-2287.yaml
+++ b/http/cves/2013/CVE-2013-2287.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple cross-site scripting vulnerabilities in views/notify.php in the Uploader plugin 1.0.4 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) notify or (2) blog parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected website, leading to potential data theft, session hijacking, or defacement.
remediation: |
Update to the latest version of the WordPress Plugin Uploader or apply a patch provided by the vendor to fix the XSS vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c8c5559368df444abe62727c1b90f86dd61fc41a85a3649cd579fb795fb172160221008d258e921ba29a6ed61ab268d0ef5889e4635040d37eb6f4bc9f2f5cf2260214:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100df23b384d625e0c6b32964a3d6e3dd96f8a526e7423cfabb76e505554d75e8570221008663e84f3f5b73473b8bd3ec89c06b3b405ddeb7de0acc8e93238ccc461d9203:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-2621.yaml b/http/cves/2013/CVE-2013-2621.yaml
index e01b95c4e0..cd0a6e533f 100644
--- a/http/cves/2013/CVE-2013-2621.yaml
+++ b/http/cves/2013/CVE-2013-2621.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open Redirection Vulnerability in the redir.php script in Telaen before 1.3.1 allows remote attackers to redirect victims to arbitrary websites via a crafted URL.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the installation of malware.
remediation: |
Upgrade to the latest version of Telaen to fix the open redirect vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
-# digest: 4a0a004730450220771c3c445edc036b096c72ceb4c3f7ab76e2e3f7179f89c16d3dae9172e55299022100a4671f0a22cda7c3b5e1443a76f3495f12d0798c17c996485db4971135a9b2b0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402203356ff6dea12e2b33f72c0ce48ee00c534cd6e83cbe63d8174f9a71aec181166022007bf562e5422db455f87eeedfafd70e8516728a53184efff1ce66c5c8da0abab:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-3526.yaml b/http/cves/2013/CVE-2013-3526.yaml
index 00405aae0d..b755c01603 100644
--- a/http/cves/2013/CVE-2013-3526.yaml
+++ b/http/cves/2013/CVE-2013-3526.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in js/ta_loaded.js.php in the Traffic Analyzer plugin, possibly 3.3.2 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the aoid parameter."
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential theft of sensitive information or unauthorized actions.
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221008d38745a716f14fcf8be4901d004c88e804dacec165db16ba953d21eaed28a9b0220324b395aa0fafbde5e2926c95fbcffc6c46a35339ceb0bd8f84478d05e97dc0c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206a15e3183061f1b6d48531d10690ab71d1bee82e4634f305ef652f7c1519e9bd022100d0a37a0600fffa5c115e587879a2add388e0aea59727297f4b8f2c8e6e0f48cb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-4117.yaml b/http/cves/2013/CVE-2013-4117.yaml
index 842d119d41..53ebaa578c 100644
--- a/http/cves/2013/CVE-2013-4117.yaml
+++ b/http/cves/2013/CVE-2013-4117.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in includes/CatGridPost.php in the Category Grid View Gallery plugin 2.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ID parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the WordPress Plugin Category Grid View Gallery or apply the provided patch to fix the XSS vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022068800cf5afc60f6f0e1164c51e41eda0bb73e4971bf1af1d2784b7037836ae6f022100e7db26c03f4a1f3b610d0c4702a75ef1e06c4886b069bd80e0e94a15243d31e3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100d4b3fcbb4906b19001cf72d4aad9add7b544041dd97c0ccf35838cff913a8a6e022100e24d898f72a403c58117f0da9ad80377007fd8687238e628cc2cd9cd792380e7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-4625.yaml b/http/cves/2013/CVE-2013-4625.yaml
index 3fca69a6a3..dc3fb151c8 100644
--- a/http/cves/2013/CVE-2013-4625.yaml
+++ b/http/cves/2013/CVE-2013-4625.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in files/installer.cleanup.php in the Duplicator plugin before 0.4.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the package parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the target website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: Upgrade to Duplicator 0.4.5 or later.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2013-4625
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022009fbb02a9a71ecffbb55ff0944e4a4ff387b2f303ce2ee21f6f8b9f98d374bb4022100c0b21c5c731a94ae9a9d71f6944e2d6fd25af70898f217ea5ca0cf43f13c83d8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205afc0558c0a5c6f4e156350413787049ba55798abafb3a473caf199566a9d3f1022100dc757c0322a69f872070597ce88eee1b95028c408b4666a3df83e0b817802a6c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-5528.yaml b/http/cves/2013/CVE-2013-5528.yaml
index 695d7d305b..d60c8c4129 100644
--- a/http/cves/2013/CVE-2013-5528.yaml
+++ b/http/cves/2013/CVE-2013-5528.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to access sensitive files and directories on the affected system.
remediation: |
Apply the necessary security patches or updates provided by Cisco to mitigate this vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d8b211bbf2d055c923e844409e533f28eace705338e0568d7366a8f2e9c8edf9022100ffcf103a8fd7651cce24bfb0dad2fac7146dc0a1be8ab48a0af6184f3c5a57a4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221008e02f05197668a2896c4ce3329cfaa33626f88728c4b26081575c062dfa2793b02202da67d420e04a0893e7789fa280484696fae3e87c216e5c8035aa45364e2f2b7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-5979.yaml b/http/cves/2013/CVE-2013-5979.yaml
index 911bd4082f..707d599fc7 100644
--- a/http/cves/2013/CVE-2013-5979.yaml
+++ b/http/cves/2013/CVE-2013-5979.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in Spring Signage Xibo 1.2.x before 1.2.3 and 1.4.x before 1.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the p parameter to index.php.
+ impact: |
+ An attacker can read arbitrary files on the server.
remediation: |
Upgrade to a patched version of Xibo.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402200c58d020adab1b1dfd869b74002807b5e9a9ca787592efc85a821b51b6e1ca7002200f60351e13c43af53469514345318f4821ebddbfcb867645099ee962dcb86c7e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100866349d738228669609abe425094cd153a1465586d479ca9fec10db9a7c55c6b022100bb0fae43b502e3c8e6ef60a28d6c47c46d9144a35373d5a29573f694cafb7cb1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml
index 1868b18c60..1a97f266f0 100644
--- a/http/cves/2013/CVE-2013-6281.yaml
+++ b/http/cves/2013/CVE-2013-6281.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress Spreadsheet plugin contains a reflected cross-site scripting vulnerability in /dhtmlxspreadsheet/codebase/spreadsheet.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected WordPress site, leading to potential data theft, session hijacking, or defacement.
remediation: |
Update the WordPress Spreadsheet plugin to the latest version, which includes proper input sanitization to mitigate the XSS vulnerability.
reference:
@@ -53,4 +55,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402206dbbab28b5db438ede1d0ef39a4413883c23469116fec3a4dd469bf0aea9b6f902203d15d44466fa6aef6ff238b0c5506ddfd2913ce1bb78c9c4fa16a04e427d0a5e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100cb01e00698300e21d7fd11d10a0bf78683b0c5f5f328e786164354303b69274b022100935646da48b55b5db44efc49b96a770beb700b40087946eb988e934c9fd4cf2e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-7091.yaml b/http/cves/2013/CVE-2013-7091.yaml
index 46259a3fcd..f2bc6a6480 100644
--- a/http/cves/2013/CVE-2013-7091.yaml
+++ b/http/cves/2013/CVE-2013-7091.yaml
@@ -5,6 +5,8 @@ info:
author: rubina119
severity: medium
description: A directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz in Zimbra 7.2.2 and 8.0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the skin parameter. This can be leveraged to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Apply the latest security patches or upgrade to a newer version of Zimbra Collaboration Server to mitigate the LFI vulnerability.
reference:
@@ -51,4 +53,4 @@ http:
- type: regex
regex:
- "root=.*:0:0"
-# digest: 4a0a004730450220291a98fd27d95cd20ab4c8ccc8b963594c4b98191fffaba69aea60935b679d4f022100997a0fe4ab10f1ce3290561c6493b20090995a89804aa48f6a64f09704570d7b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100af34e7a9486944cdae869b27f5e277ef9ac9ccf9f3694aa8dbbc6231d81abc8602204e21dbc6719c5177611e0f4136f31ff3b46026159d00b25924d61f1f058214b9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-7240.yaml b/http/cves/2013/CVE-2013-7240.yaml
index 869b6713d8..56e3304741 100644
--- a/http/cves/2013/CVE-2013-7240.yaml
+++ b/http/cves/2013/CVE-2013-7240.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter.
+ impact: |
+ An attacker can exploit this vulnerability to access sensitive files, potentially leading to unauthorized disclosure of sensitive information.
remediation: |
Update to the latest version of the Advanced Dewplayer plugin or remove it if it is not actively used.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502203cfc2f397e914759fa35d7f3b88d6589dec3bede98abc314ffa17397519907c602210092a7cc7211769e7091ae5cd20ffad9d80fff14bc9a8faf7812e4ac27ac42e7e1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100df40bf2354f82b69e8a76d390759c896a2c448d1d2b1cb84bd760147b05a307b022100b74dfb8e99555fef5e06aff38e619f27e81e3dc434c317680b93351c1957cfdf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2013/CVE-2013-7285.yaml b/http/cves/2013/CVE-2013-7285.yaml
index 99b592b3a6..808e595179 100644
--- a/http/cves/2013/CVE-2013-7285.yaml
+++ b/http/cves/2013/CVE-2013-7285.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
Xstream API before 1.4.6 and 1.4.10 is susceptible to remote code execution. If the security framework has not been initialized, an attacker can run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. This can allow an attacker to obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
remediation: |
Upgrade XStream to version 1.4.10 or later to mitigate this vulnerability.
reference:
@@ -62,4 +64,4 @@ http:
part: interactsh_request
words:
- "User-Agent: curl"
-# digest: 4a0a00473045022032280c7a9d42721f188dec089c1ee99f5f68127ea5786903a21fbb207480e4ae022100e51e99eb751be529e78b5d77abf38f5461b361cae7ffb4be5feb19b11aca4ae5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100bea72ccdcaf18fa5328ff124392c4b1d40521fa73d440d3e27d7d0cf1884f00c022040c286187a757d6197352db014b2918f506fa65d89d6fc40e0e226be12e31d8c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-10037.yaml b/http/cves/2014/CVE-2014-10037.yaml
index 035b5d24d4..788156ebc0 100644
--- a/http/cves/2014/CVE-2014-10037.yaml
+++ b/http/cves/2014/CVE-2014-10037.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impacts via a .. (dot dot) in the url parameter to photoalbum/index.php.
+ impact: |
+ An attacker can read, modify, or delete sensitive files on the server, potentially leading to unauthorized access or data leakage.
remediation: |
Upgrade to a patched version of DomPHP or apply the necessary security patches to fix the directory traversal vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221008b4a57b06aa557e7ea9ed17d4a7d15826d391fc2c21a83960acba0b05eae2955022100bf0c1d19aad3074a9b63fcaf3de8804a8dadc904d1cde41fdf6ccde3f8cb7ad4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022045409433be7fe4dffc9d3bfcdade34b30b7d644fbb543aa4ced8a3b0e9075a94022100b697303a0592ced1eb79a26f42db2290e48c6f95bde12e36dfd1154a9c3507a4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-1203.yaml b/http/cves/2014/CVE-2014-1203.yaml
index 7d9f6a32d5..3cf15beb09 100644
--- a/http/cves/2014/CVE-2014-1203.yaml
+++ b/http/cves/2014/CVE-2014-1203.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: critical
description: Eyou Mail System before 3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the domain parameter to admin/domain/ip_login_set/d_ip_login_get.php via the get_login_ip_config_file function.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Upgrade to a patched version of Eyou E-Mail <3.6 or apply the necessary security patches.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402203b38c1f86652e3b47da1ff30382ff904a109850e88c3879f86338a3b02ef30de022042d77da62bf1e636a5399c26416f7b3b883be8e780a07e86c75cff77b455c5e7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ec1ac8dd4ecf97532dc7d81827b73f01099fd3e1f104abcf31d5e1460d1f50d4022100b97d60ac30948ae48df5afdbba9358802b1be0d6ad69e6e497386080453a1da4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-2321.yaml b/http/cves/2014/CVE-2014-2321.yaml
index f0fad9ba91..ef02d73f39 100644
--- a/http/cves/2014/CVE-2014-2321.yaml
+++ b/http/cves/2014/CVE-2014-2321.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
ZTE F460 and F660 cable modems allows remote attackers to obtain administrative access via sendcmd requests to web_shell_cmd.gch, as demonstrated by using "set TelnetCfg" commands to enable a TELNET service with specified credentials.
+ impact: |
+ Remote code execution
remediation: |
Apply the latest firmware update provided by ZTE to fix the vulnerability
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ba6eab655a6a72dc0f5e22d7614c07e57763637c61bd9077a44045f2b9549e30022072305cbf914a878b878d37da93d1e59127e44bb4843dac9142c2cd86b165e799:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100a56607c8d1ec7cfd4719d48d9c7fa91e25869e904e929295fb180cd1ba872160022100c914c6b4fcd31ed17d817e7db1d5e08b6fddf7843b00c3275d66e27f480e4a37:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-2323.yaml b/http/cves/2014/CVE-2014-2323.yaml
index ff9a8d86b2..1caa0c73a1 100644
--- a/http/cves/2014/CVE-2014-2323.yaml
+++ b/http/cves/2014/CVE-2014-2323.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: critical
description: A SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name (related to request_check_hostname).
+ impact: |
+ Successful exploitation of these vulnerabilities could lead to unauthorized access to sensitive data and remote code execution
remediation: |
Upgrade to a patched version of Lighttpd or apply the necessary security patches
reference:
@@ -38,4 +40,4 @@ http:
- type: regex
regex:
- "root:[x*]:0:0:"
-# digest: 4a0a00473045022100890bbb222dab6e6077d699ba000931239a2a22675c5458d681ecff738f9cf6cd022003e1995604726148f1ad10ae858fe5f2f9cdf321e8d51b4cd21998663f7b0165:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e0c790e1cbbd16a33270523f27a14fcfe82c2f99b9cb6d04774121f8f44cccad022100b328c3e67f5f85bd158b7701623a9ec68f2aed71f07a280422f15db73aaad1c5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-2383.yaml b/http/cves/2014/CVE-2014-2383.yaml
index b968bc2120..4cb056a41d 100644
--- a/http/cves/2014/CVE-2014-2383.yaml
+++ b/http/cves/2014/CVE-2014-2383.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
A vulnerability in dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
+ impact: |
+ The vulnerability can lead to unauthorized access to sensitive files, remote code execution, and compromise of the affected system.
remediation: |
Upgrade Dompdf to a version higher than v0.6.0 to mitigate the vulnerability.
reference:
@@ -62,4 +64,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100b1d97f4e572f4991277c3398217adc384a1c64bc9f2ee889c753ccde728996920221009cca24095bebb03123bcadfa95187ec3477a9e594914639ab93c860d7d30221f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502203921743780724eb52c7bb0eb87f3d059097d2031b14f0ff098024e481f46880d022100a81e349caaee574d24461d7caf9a93dd9689fa550db17f0cb90b75c1d8e579ae:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-2908.yaml b/http/cves/2014/CVE-2014-2908.yaml
index eb286355f3..b0bf85d474 100644
--- a/http/cves/2014/CVE-2014-2908.yaml
+++ b/http/cves/2014/CVE-2014-2908.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected user's browser.
remediation: Upgrade to v4.0 or later.
reference:
- https://www.exploit-db.com/exploits/44687
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207ba0e73bc0ce934fe9ebb08cde6954c20a59e182fca6de51908fa368c743ae14022100d6dbc979178d3969162cafc3670a26a7bb6484f8b39bbc733c9a3b4413e2e107:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402202c73948411560103b8f5c49014a2d1fff0ed14ddb5d4496f5cf0386ed7257d0e02206eefceed30f5e37d37d7999b4b123ecdfd39fb3cdf636ce94634a393478d6e25:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-2962.yaml b/http/cves/2014/CVE-2014-2962.yaml
index 7856db4961..4a8fd9bfc1 100644
--- a/http/cves/2014/CVE-2014-2962.yaml
+++ b/http/cves/2014/CVE-2014-2962.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A path traversal vulnerability in the webproc cgi module on the Belkin N150 F9K1009 v1 router with firmware before 1.00.08 allows remote attackers to read arbitrary files via a full pathname in the getpage parameter.
+ impact: |
+ An attacker can exploit this vulnerability to view sensitive files, potentially leading to unauthorized access, data leakage, or further compromise of the system.
remediation: Ensure that appropriate firewall rules are in place to restrict access to port 80/tcp from external untrusted sources.
reference:
- https://www.kb.cert.org/vuls/id/774788
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100f2be013d1c42d4b50c06f2ed2da750c036e90d5c3727dc1de8c75032583ad05002207046f1a8a584c0535846644c9b97011c4a6123688982b6a7d3f34bba1048ff66:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022026d2b631fa942f9ee77f39d73bfdb3d19e300d528de9d66baa325b64e2577de0022023564b7c13017538b414f940c6f7292a043ec7a7398b7a13991edaca60bd9daa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml
index 8ae057065f..192fc321cd 100644
--- a/http/cves/2014/CVE-2014-3120.yaml
+++ b/http/cves/2014/CVE-2014-3120.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. Be aware this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
+ impact: |
+ Allows remote attackers to execute arbitrary code on the affected system
remediation: |
Upgrade to a patched version of ElasticSearch
reference:
@@ -69,4 +71,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f577b5b343297961f96e7ae627c542a022d80387bb925978a1416e6c91c37ccf022100d1070f10c65ebfc0801549f3e8b5bdec8f4ba85867d562841cfc38ef67c655d5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100b8ca32574dd1fadd9b74d9637ead80fe58001ea1f88c106c2bfdd3f56500029a022051065022f16e3bc022eb441be88bfcd018ff0fd07f36d969a9d67853867fc978:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml
index 8118fcc965..8aba1bbc10 100644
--- a/http/cves/2014/CVE-2014-3206.yaml
+++ b/http/cves/2014/CVE-2014-3206.yaml
@@ -5,6 +5,8 @@ info:
author: gy741
severity: critical
description: Seagate BlackArmor NAS allows remote attackers to execute arbitrary code via the session parameter to localhost/backupmgt/localJob.php or the auth_name parameter to localhost/backupmgmt/pre_connect_check.php.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands with the privileges of the affected device, potentially leading to unauthorized access, data loss, or further compromise of the network.
remediation: |
Apply the latest firmware update provided by Seagate to patch the command injection vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
part: interactsh_protocol
words:
- "http"
-# digest: 4a0a00473045022100a666968c172582af935ab58097b0f389fe79771540a9c615f7e6eeaaa77081020220408d8f4d58dc6972cbb5714f79778cfe0c8e567ce616ed5a53bd8ad3a75dec1b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204b3de4b1566a99da648abc07da3b94ebb1860817b84793793d316480d01c7603022100a510f7edb5ed03f87310a9adebb01d4093ee3c3ce11da529ebe95d058998c325:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-3704.yaml b/http/cves/2014/CVE-2014-3704.yaml
index 3410bb45a9..30ed9237db 100644
--- a/http/cves/2014/CVE-2014-3704.yaml
+++ b/http/cves/2014/CVE-2014-3704.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: high
description: The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing specially crafted keys.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and potential compromise of the Drupal application and its underlying database.
remediation: Upgrade to Drupal core 7.32 or later.
reference:
- https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2014-10-15/sa-core-2014-005-drupal-core-sql
@@ -50,5 +52,4 @@ http:
- type: status
status:
- 500
-
-# digest: 4b0a00483046022100b094a161539cda73a1fa7ffc6ad92c2a3d2c2aac71febb2e23b31add297e6ad7022100f18cac029bb2350c7c535eb3f6916a58404a976369d02a2508a7f55c5ef55728:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022019ad60102b0034cd9c4d9e39c2d9c0c3c811fc44980d37c077d538b6994da157022100ed831a5b94e4b5149514216eb9d04f4830ebd68ad61fde769efb3d379b4b80f3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-3744.yaml b/http/cves/2014/CVE-2014-3744.yaml
index d60117e642..56201c5447 100644
--- a/http/cves/2014/CVE-2014-3744.yaml
+++ b/http/cves/2014/CVE-2014-3744.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: high
description: A directory traversal vulnerability in the st module before 0.2.5 for Node.js allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in an unspecified path.
+ impact: |
+ An attacker can read sensitive files on the server, potentially leading to unauthorized access or exposure of sensitive information.
remediation: |
Upgrade to a patched version of the st module or use an alternative module that is not vulnerable to directory traversal.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c9c6f41ce1209254da302f99b3fd50eb51788681bb3ab134023f69191d1949c0022100b38f77e8e0b59aafa34c99254c974a867229356c7246ec576b3ef2902f3edf87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ad1ca8124c95e2703cbb3cba50f3915085260371306caf5a373714b7a86f7b7c02200c1bc9db87baee85222934f05a0ec6eed0bdc9ae6370d1f5052eaa16ea09f85c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4210.yaml b/http/cves/2014/CVE-2014-4210.yaml
index b860fa12a1..240a63cf48 100644
--- a/http/cves/2014/CVE-2014-4210.yaml
+++ b/http/cves/2014/CVE-2014-4210.yaml
@@ -4,9 +4,11 @@ info:
name: Oracle Weblogic - Server-Side Request Forgery
author: princechaddha
severity: medium
- description: |
- An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.
- remediation: Apply the latest patches and updates provided by Oracle to fix the SSRF vulnerability
+ description: An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to bypass network restrictions and access internal resources.
+ remediation: |
+ Apply the latest patches and updates provided by Oracle to fix the SSRF vulnerability
reference:
- https://www.oracle.com/security-alerts/cpujul2014.html
- https://nvd.nist.gov/vuln/detail/CVE-2014-4210
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402207016a1bb2c1292cfa19e80b800f0be023d04307cc0d2726810278e4216525fc6022024a26e7bf609dceb719dc4d68120367c53d3a306d98bd58a83e7223619ffaf23:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402203a40b5fed795b018d009f79227d028b7ed18bab2a342bd3510ecb3f147227e1e02205fefdc746fb4b81255fe35e0b17becc7d8b5d01c9e8798116d55c26056552a67:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4513.yaml b/http/cves/2014/CVE-2014-4513.yaml
index 917f532fcf..1c1320c4c3 100644
--- a/http/cves/2014/CVE-2014-4513.yaml
+++ b/http/cves/2014/CVE-2014-4513.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple cross-site scripting vulnerabilities in server/offline.php in the ActiveHelper LiveHelp Live Chat plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) MESSAGE, (2) EMAIL, or (3) NAME parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Upgrade to a patched version of ActiveHelper LiveHelp Server or apply the necessary security patches to mitigate the XSS vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100859481bdd9b5a30d7f3a6927e35509ffd3a9764216237304ecfdac87ab930d2102200fece8b5c38a5c66599ac04458f0a084035444b052dd143b136ea59a79ba52c4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202f239af02dc3d7a82f42336509f9bfa2152d16e586f60ef223df03ac864cb3f5022100a83dd297b3d178a07579b11715ac2b258ef079b469c99a5399a23c3513c26eb2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml
index f2be024427..07f581a9c9 100644
--- a/http/cves/2014/CVE-2014-4535.yaml
+++ b/http/cves/2014/CVE-2014-4535.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in the Import Legacy Media plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php.
+ impact: |
+ Successful exploitation of this vulnerability could lead to the execution of arbitrary script code in the context of the affected website, potentially allowing an attacker to steal sensitive information or perform unauthorized actions.
remediation: |
Update to the latest version of the Import Legacy Media plugin (0.1 or higher) to mitigate this vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220213930c6a99b15ee189b56653c24ec5b066d507da0a9ee1952163d188741bd8f02200d6ddfda7e9d6effac0543ee2048630e46e11a66c015b9b9a83d63c48e8cd834:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100b748ec3f080c43508a6e4b86ccae498e26c3614f2f06acc017d568fb99cdfb8402206569d13cb86a37da3dfa4744e75680fe26e2dd70d3391c8bf1488d20bd54022d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4536.yaml b/http/cves/2014/CVE-2014-4536.yaml
index 3790a9b1c0..ea96f726a5 100644
--- a/http/cves/2014/CVE-2014-4536.yaml
+++ b/http/cves/2014/CVE-2014-4536.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple cross-site scripting vulnerabilities in tests/notAuto_test_ContactService_pauseCampaign.php in the Infusionsoft Gravity Forms plugin before 1.5.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) go, (2) contactId, or (3) campaignId parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement.
remediation: |
Upgrade Infusionsoft Gravity Forms Add-on to version 1.5.7 or later to mitigate this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022007a52ee36df3f6f3c98eea6040d4c81debbdafbae1081122b4721140de2fd7f8022100bd3be8ac12f0cc19795e8d3b5fae95495665bbc39cdf744ca1e7837f9d6cb974:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220580487d990fbf72c8ad3e2af7c2ae2b1d78dd55f71719677cc110f2130109a6c0221008209a0edafca0fb9da9ecb63df77fb96399a3c7328cc83cb7169a6ac62fc13c6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4539.yaml b/http/cves/2014/CVE-2014-4539.yaml
index 68010d805a..bb26d88096 100644
--- a/http/cves/2014/CVE-2014-4539.yaml
+++ b/http/cves/2014/CVE-2014-4539.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in the Movies plugin 0.6 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of the Movies plugin (version 0.7 or above) that addresses the XSS vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207832dde72d78ed46425bdca6d18335c62ac522b898166c9b650e7a6081bfca29022100a1caa21f95817d22ca68c129e60545dde0909e3522eb39882238810efa0ea2d8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210094c57de15f97fca4490843b947b7b690e1aa66fd6313ae1fc8efb8d3dda0e38102210099a8ad854656ce1b02f2890a1a3817915ef09aa5545cd42c952391d7304c75ef:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4544.yaml b/http/cves/2014/CVE-2014-4544.yaml
index 51e86b129c..7e927c78d9 100644
--- a/http/cves/2014/CVE-2014-4544.yaml
+++ b/http/cves/2014/CVE-2014-4544.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: The Podcast Channels WordPress plugin was affected by an unauthenticated reflected cross-site scripting security vulnerability.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the Podcast Channels plugin (0.28 or higher) to fix this vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502201b0a6aadbdc372ebcbbd9239208d333ffcbb2244f1786a283f73103f9f0b50be0221009b621f690dadbafd005804582c3cc07f89362fe1afce06fbf8897826d9b84c06:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220078759a06ea361276eb0cfd93bdd686cc6a0d4efa87b282c90531a3f9ac199e402204e90184620d595a421ed934c84affd49e89d27945d56eeb33bdd981da2c147fc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4550.yaml b/http/cves/2014/CVE-2014-4550.yaml
index 5923c1b605..facf173194 100644
--- a/http/cves/2014/CVE-2014-4550.yaml
+++ b/http/cves/2014/CVE-2014-4550.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in preview-shortcode-external.php in the Shortcode Ninja plugin 1.4 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the shortcode parameter.
+ impact: |
+ Allows remote attackers to inject arbitrary web script or HTML via crafted shortcode parameters, leading to potential session hijacking, defacement of web pages, or theft of sensitive information.
remediation: |
Update to the latest version of the Shortcode Ninja plugin (1.4 or higher) to fix the XSS vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220551c720843bca8770909340fa644703ad667a0131e46325c82ba14bf35b68a6f022100868bb25c84d2cb621c014928d51572f693937d19cf43cad832dc6b5d4296b9c8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220674dc3985feafe800dab520f51e8b6a033ee9f73f3b00c39b64ad2e95577664b022022ff4f244837aa3f3778ec97181d38f45697688f3f763adf29b40ae0aa412080:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4558.yaml b/http/cves/2014/CVE-2014-4558.yaml
index fa84a45c2b..1f24b30292 100644
--- a/http/cves/2014/CVE-2014-4558.yaml
+++ b/http/cves/2014/CVE-2014-4558.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in test-plugin.php in the Swipe Checkout for WooCommerce plugin 2.7.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to WooCommerce Swipe plugin version 2.7.2 or later to mitigate this vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022078964445dd9a6a3593869597ea089036752028ee3f3d159f6d5566151056430a022100eb6052dc6ccc6970789459d0c55d2a3ccf9a7c879e676419804fd192b92e85ec:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022011cf10d2dca5ad1bfbafb9189c4e9e94a4ff5251092564acfc7eb9be066a59a402201ba84244ed93964ca7562d9622b1199d64197ec0e2ca3e9f2718588a8e0c2bdc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4561.yaml b/http/cves/2014/CVE-2014-4561.yaml
index d32ddbc9a7..bfb094135e 100644
--- a/http/cves/2014/CVE-2014-4561.yaml
+++ b/http/cves/2014/CVE-2014-4561.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: The ultimate-weather plugin 1.0 for WordPress contains a cross-site scripting vulnerability.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the plugin's output, potentially leading to the execution of arbitrary code or stealing sensitive information.
remediation: |
Upgrade to a patched version of the Ultimate Weather Plugin that addresses the XSS vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220656a765b3d6ea9c77a27fadcea6d6216fd497dacfd67351d47115a77ba006d9c0221009ec8e8d5551f5b5b6b69f6fcde213631625824278da4302b6ac93ca11174632d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022042aa2ddd1022544d8185c099e43d84553656bb11fbaeb242bd651b484c72205202203f36ad98e74813720a2296cbd40314a62cbd6bf9a035af5f72212da73f512846:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4940.yaml b/http/cves/2014/CVE-2014-4940.yaml
index b9e1c9161b..5cf2ff65ff 100644
--- a/http/cves/2014/CVE-2014-4940.yaml
+++ b/http/cves/2014/CVE-2014-4940.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple local file inclusion vulnerabilities in Tera Charts (tera-charts) plugin 0.1 for WordPress allow remote attackers to read arbitrary files via a .. (dot dot) in the fn parameter to (1) charts/treemap.php or (2) charts/zoomabletreemap.php.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server.
remediation: |
Update to the latest version of the Tera Charts plugin to fix the local file inclusion vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a3c87ebe1997f2f85335f10f396664725af3109be9afdacdc1b9ba3461ee1e5c022100e57651aff4bf12a6a253995e1953db6404726660434b67e9fcbf4fbb6eec850c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100939d2492f177511e28f9ca4f04b091c26b2840e2752c100c18e5f7607e0e99690220291f5aeece7127eb31b4fe976f62f4f111784d098337e2a3199815b06d4bfb76:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-4942.yaml b/http/cves/2014/CVE-2014-4942.yaml
index f03d407cc6..a2a410c66a 100644
--- a/http/cves/2014/CVE-2014-4942.yaml
+++ b/http/cves/2014/CVE-2014-4942.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress EasyCart plugin before 2.0.6 contains an information disclosure vulnerability. An attacker can obtain configuration information via a direct request to inc/admin/phpinfo.php, which calls the phpinfo function.
+ impact: |
+ An attacker can gain sensitive information from the target system.
remediation: |
Upgrade to WordPress EasyCart version 2.0.6 or later.
reference:
@@ -53,4 +55,4 @@ http:
group: 1
regex:
- '>PHP Version <\/td>
([0-9.]+)'
-# digest: 4a0a004730450221009c44f64ce735145446058ea2e9a0ad9dcf1236fcf379a1854ef5bfa5c542ee1a02200e220f53b5cf52e8ffff5330507ab9fadf8a4b1e87279616ffae5e3b4ba6fa19:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e2e3a29c5c8bc10e79128f4312f2bab1aaf968ad6df5cec5e083f699ffc7db2c022100d40f450a35bc1660b8834509073001ab8669c8f3fc898ef47a37729c3209c692:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-5111.yaml b/http/cves/2014/CVE-2014-5111.yaml
index 28a3b613a9..20a3c68cea 100644
--- a/http/cves/2014/CVE-2014-5111.yaml
+++ b/http/cves/2014/CVE-2014-5111.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple local file inclusion vulnerabilities in Fonality trixbox allow remote attackers to read arbitrary files via a .. (dot dot) in the lang parameter to (1) home/index.php, (2) asterisk_info/asterisk_info.php, (3) repo/repo.php, or (4) endpointcfg/endpointcfg.php in maint/modules/.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files, execute arbitrary code, or launch further attacks.
remediation: |
Apply the latest patches and updates provided by the vendor to fix the local file inclusion vulnerability in Fonality trixbox.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502205385ba7d82d34f74bed76b5b2cd51e8acd6868fe05073c4bed7b42660ff00d57022100f35ebb33e8c097d1d81121484b8f9f8365e5ff2335d36892b66172925e637f5c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402205e081b249fdecf9eb227be78bafd317b0423a0967e6b7024fead0d8b94d477140220527f9511cf4a42bd722a8541b9eb53b7a6b0f6adc53e1581588e5f137d3e9964:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-5258.yaml b/http/cves/2014/CVE-2014-5258.yaml
index 92464f0ad3..392924b8c1 100644
--- a/http/cves/2014/CVE-2014-5258.yaml
+++ b/http/cves/2014/CVE-2014-5258.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in showTempFile.php in webEdition CMS before 6.3.9.0 Beta allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter.
+ impact: |
+ An attacker can read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Upgrade to a patched version of webEdition or apply the necessary security patches to fix the directory traversal vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100f4dcc343898ef33caa2e53b4d40c858c61d2d525116289118c822967c927358d0220799c54f4f95dc50945f8caf610a4de0be060b9488ebd46adb4b851787865ba2a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100c76d479ef7be8d7cb3a49a980c9380d6f85db4eef26ba91d6e8e206f4025c7d9022100ba26dd2e98682b2131b4a893b2e62a027dc2bd72e461ab2794d5ad82fd515657:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-5368.yaml b/http/cves/2014/CVE-2014-5368.yaml
index f39d3eaa58..34942a093e 100644
--- a/http/cves/2014/CVE-2014-5368.yaml
+++ b/http/cves/2014/CVE-2014-5368.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the file_get_contents function in downloadfiles/download.php in the WP Content Source Control (wp-source-control) plugin 3.0.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter.
+ impact: |
+ An attacker can read sensitive files on the server, potentially leading to unauthorized access or exposure of sensitive information.
remediation: |
Update to the latest version of the WP Content Source Control plugin to fix the directory traversal vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402204b864e59db21fb15164e360d8ce6f177a31a5cf283087274bba542e246706e3d02205094860acd15428f2ebe354cdff5fed3d8e11a5267717b4d27ae6f95b0c0cc11:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100bcf488a5ee22f771e6cde4fc5c288d534d32f4d6d9bb07584cff635451995606022100b9644182411ee85745c3a47c7e52cc85e8e4af74fa57d03901bfa8a48e8ac8d1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-6271.yaml b/http/cves/2014/CVE-2014-6271.yaml
index 6a0e85b072..1a0a403296 100644
--- a/http/cves/2014/CVE-2014-6271.yaml
+++ b/http/cves/2014/CVE-2014-6271.yaml
@@ -5,6 +5,8 @@ info:
author: pentest_swissky,0xelkomy
severity: critical
description: GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka ShellShock.
+ impact: |
+ Remote code execution can lead to unauthorized access, data theft, and system compromise.
remediation: |
Apply the necessary patches and updates provided by the vendor to fix the vulnerability.
reference:
@@ -56,4 +58,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205e2e5ce760f7d7720fd5577d167a9c53914cfd1f703bec11d04c39c7d63506a5022077fa374756b072c53fda8edb7cb3ecaab1b834152550c89c97a2fefd9d9f592b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100fcbe4e3ef3ec2a5a7f542b1a0bed02aafcec6b1be0beb375e3fb515ba4da61dd02203ca9d29dc41fe4bf7b94e7b64513f8413134c3def97e9c53c71780186dfb2bc1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-6287.yaml b/http/cves/2014/CVE-2014-6287.yaml
index bc3d1dfa17..1eaffcd068 100644
--- a/http/cves/2014/CVE-2014-6287.yaml
+++ b/http/cves/2014/CVE-2014-6287.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
HTTP File Server before 2.3c is susceptible to remote command execution. The findMacroMarker function in parserLib.pas allows an attacker to execute arbitrary programs via a %00 sequence in a search action. Therefore, an attacker can obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
+ impact: |
+ Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the target system.
remediation: |
Upgrade to the latest version of HTTP File Server (>=2.3c) to mitigate this vulnerability.
reference:
@@ -55,4 +57,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022004360e573af6fd119dc9c4ad50529da651d4e31594775cb99ae330bc64a41ca40220560a12723b42c17e6c3034206e6d40925ba9258537dd8eabe95386d989b16013:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009347b996d3b96812928efff46fc86e2f49cadcd9ea27ca22fbf7acf421551025022100845b99770e2a0a23ab42bd7d8eec7ae2704b0a92652746e206d0d73c889ea61c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-6308.yaml b/http/cves/2014/CVE-2014-6308.yaml
index 91f32e16f5..7c5e4528d2 100644
--- a/http/cves/2014/CVE-2014-6308.yaml
+++ b/http/cves/2014/CVE-2014-6308.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in OSClass before 3.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter in a render action to oc-admin/index.php.
+ impact: |
+ An attacker can read sensitive files on the server, potentially leading to unauthorized access, data leakage, or further exploitation.
remediation: |
Upgrade to a patched version of Osclass (3.4.2 or later) to mitigate the vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022050c5c6a5cd572f5a59c4b8335fe9aac95a19c24cd96d66981cdd8d7431c7daf0022100a8851b528e9c8399a2f5893f710ce06295a1f1449e175c6efaaeadf6c0c6348e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402207ba5d391f4bc4249d227d1eab814430eeac95aaabb62b0df76e35601de8d053b02202dd809b088914d79c49e26bed81ad3831b925e9d2760750d768b91a0cd548979:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-8676.yaml b/http/cves/2014/CVE-2014-8676.yaml
index 089c2979d4..097d139294 100644
--- a/http/cves/2014/CVE-2014-8676.yaml
+++ b/http/cves/2014/CVE-2014-8676.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
SOPlanning <1.32 contain a directory traversal in the file_get_contents function via a .. (dot dot) in the fichier parameter.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server.
remediation: |
Upgrade Simple Online Planning Tool to version 1.3.2 or higher to fix the Local File Inclusion vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402200545752eb1ad95a8b88f3799f01598bc6bba8046946c4bf17776ff3a9a2d384b02203c32e1f614c65d71b366a3a160aba6a0e8e4f08d38bfa9c70f956a7937754698:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205980eb0331cb2cbaa25a754343fd227926af2349658a6bd3e31e9e5dd63266f4022100976d91d5ef4ffb839cf575e6c8060b935352dbaec7e85339fc179b984311b0e8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-8682.yaml b/http/cves/2014/CVE-2014-8682.yaml
index f2238e53db..b796dc21a7 100644
--- a/http/cves/2014/CVE-2014-8682.yaml
+++ b/http/cves/2014/CVE-2014-8682.yaml
@@ -5,6 +5,8 @@ info:
author: dhiyaneshDK,daffainfo
severity: high
description: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
+ impact: |
+ Successful exploitation of this vulnerability could lead to unauthorized access, data leakage, and potential compromise of the entire system.
remediation: |
Apply the latest security patches and updates provided by the Gogs project to mitigate the SQL Injection vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402201655c02c331faab4f12e7bac5ef9a6b88fbcadfebfbcb1a647638f1461166b96022024a6533fcb4f3508f13eec4c0cf09806fa824c77068c45924bf29ace7320b600:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100cee757ee0d7654311ad8ab53b1c6efc3e794cc3d407b696f987bd0ac6e4217100221008943b9d8ec3e3312f09d975cd64ca4c6ca5ad220b6feb604206990429aefcefa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-8799.yaml b/http/cves/2014/CVE-2014-8799.yaml
index 8a0539d5ce..2bd03dd962 100644
--- a/http/cves/2014/CVE-2014-8799.yaml
+++ b/http/cves/2014/CVE-2014-8799.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the dp_img_resize function in php/dp-functions.php in the DukaPress plugin before 2.5.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the src parameter to lib/dp_image.php.
+ impact: |
+ An attacker can exploit this vulnerability to gain unauthorized access to sensitive files, potentially leading to further compromise of the server.
remediation: |
Update to the latest version of DukaPress plugin (2.5.3 or higher) which contains a fix for this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210093dfb36a67ecfb00be5bda2bf4c43d7251039254bb25c0364e6c5be42045b0ab022100b25b851739d367e0ab7abfa23ef9e2d66886dae5cfcb9bad895e4e489b154dfe:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100be312073dc375dc52c51803c15957fa59ab561a94ae230469761fba8c62658a0022031b68c07810286d1fc7982a1432cd733266d96e79cbefd78ecfe7efda1a537da:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9094.yaml b/http/cves/2014/CVE-2014-9094.yaml
index 1a36af1c54..8228f76137 100644
--- a/http/cves/2014/CVE-2014-9094.yaml
+++ b/http/cves/2014/CVE-2014-9094.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple cross-site scripting vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the WordPress DZS-VideoGallery Plugin, which includes a fix for this vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022020c46b058baab97ce2656443dacd9df604ae07061d76113f03b83b0fce967e4f022074a68feb799f64aa2abce263b80a22a446ee0f7244384a37a7ead9c868289e70:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f084b104246235303018810d8792e5824f630fe35d47333a776aa806420a6c0c022062d18f14655f54971c7b74c76d67da39eab2a28c3cda0cc3299aa71eb27e4377:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9119.yaml b/http/cves/2014/CVE-2014-9119.yaml
index 2f3635d663..4d8ec043d4 100644
--- a/http/cves/2014/CVE-2014-9119.yaml
+++ b/http/cves/2014/CVE-2014-9119.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress Plugin DB Backup 4.5 and possibly prior versions are prone to a local file inclusion vulnerability because they fail to sufficiently sanitize user-supplied input. Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks.
+ impact: |
+ Allows an attacker to read arbitrary files on the server.
remediation: |
Update WordPress DB Backup plugin to version 4.6 or higher.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220354af28db910454c7fbf68b9afafd7e89f6d663f459473a59119e4d18b83af810220082ae874d8196bf5e88526f6134b4c358552f129900b63e5c5c6e0f376fbe443:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100c64929f18a5e5a9f52a1e9f98cd8b6fd54e28629ed8a90951c20fb3d92ebbabc022100f78ad31e5bed3c7f887f144e59a93df2262514c88a51c84587aa2b92bba8c949:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9444.yaml b/http/cves/2014/CVE-2014-9444.yaml
index 894b287114..85b035104f 100644
--- a/http/cves/2014/CVE-2014-9444.yaml
+++ b/http/cves/2014/CVE-2014-9444.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: The Frontend Uploader WordPress plugin prior to v.0.9.2 was affected by an unauthenticated Cross-Site Scripting security vulnerability.
+ impact: |
+ Allows remote attackers to inject arbitrary web script or HTML via a crafted file name, leading to potential session hijacking, defacement, or data theft.
remediation: |
Update to the latest version of the Frontend Uploader plugin (0.9.2) or apply the vendor-supplied patch to fix the vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220133923f2c7e594402e0d5b91e6c360fc4ebc048bc279db6b78d5934dd9dcc7cb02205d80f050fe9083ff7754a12e5882844035a49ffaa454090520fa5af3749ae0b5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100bd9eb9a380f1fbf2726b31147593ca7e895c82ec04ff2accc04d4f055b7a3abf02203dcb6e5cfea4af4ce138824fbba863dc75aae8c7c651dd7e4f01291b17e8c36f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9606.yaml b/http/cves/2014/CVE-2014-9606.yaml
index 21449ca88a..cb463199e7 100644
--- a/http/cves/2014/CVE-2014-9606.yaml
+++ b/http/cves/2014/CVE-2014-9606.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Multiple cross-site scripting vulnerabilities in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) server parameter to remotereporter/load_logfiles.php, (2) customctid parameter to webadmin/policy/category_table_ajax.php, (3) urllist parameter to webadmin/alert/alert.php, (4) QUERY_STRING to webadmin/ajaxfilemanager/ajax_get_file_listing.php, or (5) PATH_INFO to webadmin/policy/policy_table_ajax.php/.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221009ae189cd5af5aa43d27047febc47eaa6ea32940bdfd7979d57fe8698db3da1e00220759465b94febbbbc13eb934cb3e2625f4c1b9b5ce67fd22534891d0535a70345:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022056dcc0390d45153fa955d06630597ce895fffc7b0422c2f41513c6340ab3b891022100ae24a085d4d6f78661be66936879fb7d22fe3986a7235c90bbe94a4b1e1fb99d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9607.yaml b/http/cves/2014/CVE-2014-9607.yaml
index 055e110c72..6b2e3c8af0 100644
--- a/http/cves/2014/CVE-2014-9607.yaml
+++ b/http/cves/2014/CVE-2014-9607.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in remotereporter/load_logfiles.php in Netsweeper 4.0.3 and 4.0.4 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bca20b944344499409014a35af1b06f0ad1a59b02cc6081a328924f1a219384a022100bc3d33276e65bdc9dfef321758adefcac6e4f5a12429a32a4a77751e0cf0c48a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220122b6dcfe5f4522732188a18dc70d5948ed467ff9ddb9baf9016178978dad972022100e54b1f0c076e3d1a27891fe239997f11a438c12257ef95b5aeb16dd380322c53:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9608.yaml b/http/cves/2014/CVE-2014-9608.yaml
index 8cebec4697..4cdf4b7ca7 100644
--- a/http/cves/2014/CVE-2014-9608.yaml
+++ b/http/cves/2014/CVE-2014-9608.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
A cross-site scripting vulnerability in webadmin/policy/group_table_ajax.php/ in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability.
reference:
@@ -53,4 +55,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022055526a65116b7e4712ec3d55bd6b0a7070c4c664ba7b54b4d29a760b4b659cf5022100964713a6663f8706e4f5ed8105bfb43c934bf0fcda75baa546f27ccec13d8655:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402204ff648e6238e67cdb5fc307d65f684556ccfaccab142ffbad15d6195b675192902204d8a2dc6b14a71a9e0cd2f96d657bbf4f6047e0debe0bd8cb83452e994b23ff8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9609.yaml b/http/cves/2014/CVE-2014-9609.yaml
index a93f1518e9..a255366ae5 100644
--- a/http/cves/2014/CVE-2014-9609.yaml
+++ b/http/cves/2014/CVE-2014-9609.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in webadmin/reporter/view_server_log.php in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to list directory contents via a .. (dot dot) in the log parameter in a stats action.
+ impact: |
+ An attacker can read, modify, or delete arbitrary files on the server, potentially leading to unauthorized access, data leakage, or system compromise.
remediation: |
Upgrade to a patched version of Netsweeper or apply the necessary security patches to fix the directory traversal vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502201af493fde516f9094af1681c6689949afbcfa3cebde2de9017511818e58d3a55022100b3d29a75add22604b61f03ac327895c02f2a8d5a8d11cc3fc6d617c0b571084e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f70c3aa6317938267f7df4b25f5ef6c9c78bc137aad2691873d6ec24424a201b022100cb7ff2bf016f58396ddb7c976eceb4c2c310c98f03b888098a9107220dda82ee:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9614.yaml b/http/cves/2014/CVE-2014-9614.yaml
index c92300e2ee..45d2332e61 100644
--- a/http/cves/2014/CVE-2014-9614.yaml
+++ b/http/cves/2014/CVE-2014-9614.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: critical
description: The Web Panel in Netsweeper before 4.0.5 has a default password of 'branding' for the branding account, which makes it easier for remote attackers to obtain access via a request to webadmin/.
+ impact: |
+ An attacker can gain unauthorized access to the Netsweeper 4.0.5 system using the default weak account.
remediation: |
Change the default credentials to strong and unique ones.
reference:
@@ -52,4 +54,4 @@ http:
- type: status
status:
- 302
-# digest: 4b0a0048304602210092892862226ac7371f1ca72750544b0136d9c89215fbc496f965455ff8f0b01f022100b96a767027a7923d95b7ac68ea4c1995acd1c789ee59e8c95c2bfd5e3bc6c65c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220634f26c8fa6d2ec9d449a59b9286d363caeb2f415a4ff5b8a1939ae4378edf20022100c2e721fe5682e209ef6ed66bd754070d8eb6ca353d9f2239503847a1ff73630f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9615.yaml b/http/cves/2014/CVE-2014-9615.yaml
index a4eefe21ff..c891e01855 100644
--- a/http/cves/2014/CVE-2014-9615.yaml
+++ b/http/cves/2014/CVE-2014-9615.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in Netsweeper 4.0.4 allows remote attackers to inject arbitrary web script or HTML via the url parameter to webadmin/deny/index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220488a16c374aeb45bab5c827ad120d9c13084dfad06426dd9bba3bab2405b46ff022100b2fd0785b8c24fae166a765419cd877459478e943ecd2f00aac465a6c0f73ff9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402201a76cdd473461e509a8c694cd5fc5f1331a157991083e118aa0f8ad790c33f4f022023ddd15dcd8e872fd2dfa54b109481b94ccf553e63001fee7e65d1650c98d231:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9617.yaml b/http/cves/2014/CVE-2014-9617.yaml
index 8282a02a56..8b13e03998 100644
--- a/http/cves/2014/CVE-2014-9617.yaml
+++ b/http/cves/2014/CVE-2014-9617.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: An open redirect vulnerability in remotereporter/load_logfiles.php in Netsweeper before 4.0.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to potential phishing attacks or the download of malware.
remediation: |
Apply the latest security patches or updates provided by the vendor to fix the open redirection vulnerability.
reference:
@@ -35,4 +37,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
-# digest: 4a0a0047304502205f2e9107e85a5270339649b0af912cfe7d8a52067a645b2e6ca1f6e38aaf6276022100f8c58d5a33ef35a9e240d901f2956915c0bbb7c3ed62970bf52ff9e64f8157ca:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022017b30983b8c743e91bcf35aa59a0373279479cb97829ab74c934b545b5d2382f022100f1640cf0fcd3ec60747214ab6b910ac01ef92f7dd10b7902844c422c1abf8337:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2014/CVE-2014-9618.yaml b/http/cves/2014/CVE-2014-9618.yaml
index dd0e9307f8..a95fd3fa6a 100644
--- a/http/cves/2014/CVE-2014-9618.yaml
+++ b/http/cves/2014/CVE-2014-9618.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
The Client Filter Admin portal in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and subsequently create arbitrary profiles via a showdeny action to the default URL.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information and potential compromise of the system.
remediation: |
Apply the latest security patches or updates provided by the vendor to fix the authentication bypass vulnerability in Netsweeper.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a78ac37aae81c40a0197e6971546ca001549708488859c2bd10071dfa49950b5022100dbb2d3671ce3c3e0df4afb924fd5be9f7205234cc2dc12aa27e1367855267a46:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210085c810aa7820426b4ceef16028597acca8da44f021fd8ec683fe8e119bdc2b3502205235942e4b4021456f06c3ad2fc1aa25cb894521372d46fab753b883e3d30a94:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-0554.yaml b/http/cves/2015/CVE-2015-0554.yaml
index 41aa91b6ab..40e9571c47 100644
--- a/http/cves/2015/CVE-2015-0554.yaml
+++ b/http/cves/2015/CVE-2015-0554.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: critical
description: ADB (formerly Pirelli Broadband Solutions) P.DGA4001N router with firmware PDG_TEF_SP_4.06L.6 does not properly restrict access to the web interface, which allows remote attackers to obtain sensitive information or cause a denial of service (device restart) as demonstrated by a direct request to (1) wlsecurity.html or (2) resetrouter.html.
+ impact: |
+ An attacker can exploit this vulnerability to gain sensitive information from the router.
remediation: |
Apply the latest firmware update provided by the vendor to fix the information disclosure vulnerability.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ff2c6e3e2fda3a5cd47809d841d8d1d9d2984161d313621f84a2a3880b3c5a4202207e3a919fd238d10dba9bca36e745600b990ab270356e4b1dfe5cb77c569aaddc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100b1a27abebb2eae51634e7a91f11cb3711eae32924f5d273d9edfa803cb8ed04f022100a011c773c5fa1b25453891177e5e62bc343d0a16836db2e2733adb89e4bd9e95:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-1000005.yaml b/http/cves/2015/CVE-2015-1000005.yaml
index 2921485571..ed924e1d46 100644
--- a/http/cves/2015/CVE-2015-1000005.yaml
+++ b/http/cves/2015/CVE-2015-1000005.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
WordPress Candidate Application Form <= 1.3 is susceptible to arbitrary file downloads because the code in downloadpdffile.php does not do any sanity checks.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server.
remediation: |
Update to the latest version of the plugin.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b298f97f92e10754192aaf2c1917f2aa5a8e5c5345d6d58266e81e5cbbcc92c8022022a3c070f02a0b6e3390eca8db86d363d3668b96e27d951cf7e524fbedd6c876:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022046ca4a1f3180802280ba339f44fc52f3e4365a1e4d287e55c58402e382b22da2022100e3259ddb7029f93ad7e2f091dcfdb4bed79cd95543043ec65ea523eb1644c3be:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-1000010.yaml b/http/cves/2015/CVE-2015-1000010.yaml
index 517b0c983c..379b30606c 100644
--- a/http/cves/2015/CVE-2015-1000010.yaml
+++ b/http/cves/2015/CVE-2015-1000010.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
WordPress Simple Image Manipulator 1.0 is vulnerable to local file inclusion in ./simple-image-manipulator/controller/download.php because no checks are made to authenticate users or sanitize input when determining file location.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server.
remediation: |
Update to the latest version of the WordPress Simple Image Manipulator plugin.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502203993229beec1f7695b0e4f1cffd7bc80cf9e956feab988e99ab8ab5635b9bdb3022100c6a72f6bf61ed5f9d3ec8f475b55a56ec81e2ff02d8319ebbaaf7a49314101f0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402202549d83eabfce63917a376c0fcb0b442a9c32468df225270a14f80c7f7e2bc7602201cd07be85b2da7e697826f196a567384dabda36d6d2ff6e7ace29538494d504e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-1000012.yaml b/http/cves/2015/CVE-2015-1000012.yaml
index 5f32bef737..7bb0f2724e 100644
--- a/http/cves/2015/CVE-2015-1000012.yaml
+++ b/http/cves/2015/CVE-2015-1000012.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: WordPress MyPixs 0.3 and prior contains a local file inclusion vulnerability.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files, execute arbitrary code, or gain unauthorized access to the server.
remediation: |
Update to the latest version of the MyPixs plugin (>=0.4) or apply the vendor-provided patch to fix the LFI vulnerability.
reference:
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d4c354c1f9a50bc30447ffbf50dcee312d26257c5fc73517cd29ed268c6dfb2f02203f01555fc878b26d3f50874391dbb07c62999ab2909e8ede423038c9c08cbc33:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100dc820f1cc4d333d47e830dbf6be78240f2337113217ead7b6eb84e5cc919740202202ac8c875884b9bf8975d52d2e50a790ab90f8579ebd301930eebc60802b858b3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-1427.yaml b/http/cves/2015/CVE-2015-1427.yaml
index 25b0f5c969..ad69e1dce4 100644
--- a/http/cves/2015/CVE-2015-1427.yaml
+++ b/http/cves/2015/CVE-2015-1427.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: high
description: ElasticSearch before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands via a crafted script to the Groovy scripting engine.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Apply the latest security patches and updates provided by ElasticSearch to fix the deserialization vulnerability.
reference:
@@ -62,4 +64,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210093e2da05528c9a4fafd6a1ed1392853fa6f6875de04fe91d079a6da6225db28f022018f337b647a4b0c8965f6e91b33f2e9f83548f9457a946384866c4e9aea5351a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022040272f4f73c81bc79bc2d61668da04e69f10ea7be6b3c2b0dafd4f969e0a0e09022100ed604e0dbf6c545d62974b22c016108152f583e5f7d29b378dde0927cb7a80ed:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-1503.yaml b/http/cves/2015/CVE-2015-1503.yaml
index de388594b5..4d92c3fe50 100644
--- a/http/cves/2015/CVE-2015-1503.yaml
+++ b/http/cves/2015/CVE-2015-1503.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: high
description: IceWarp Mail Server versions prior to 11.1.1 suffer from a directory traversal vulnerability.
+ impact: |
+ An attacker can access sensitive files on the server, potentially leading to unauthorized access, data leakage, or further exploitation.
remediation: |
Upgrade IceWarp Mail Server to version 11.1.1 or above to mitigate the directory traversal vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100dfac8e782a5e97020357ac7b41f34657d7013c37373a957d1fd87e8644a8fd70022057da08e320904635130f717b7d73de3c2a0cd37cd4681f7f2a1b4f421fde0830:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100875b5497eb3adbce2c3f606fd17d363e6ea418f870fea75120ca19e89a857a610221009cfb2345bbd891da8aab5ee1f5031a2aef3ae10c271ccbe46706cc994de7eff5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-1579.yaml b/http/cves/2015/CVE-2015-1579.yaml
index fd25fdd130..e0a4128139 100644
--- a/http/cves/2015/CVE-2015-1579.yaml
+++ b/http/cves/2015/CVE-2015-1579.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Directory traversal vulnerability in the Elegant Themes Divi theme for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php. NOTE: this vulnerability may be a duplicate of CVE-2014-9734.
+ impact: |
+ An attacker can read arbitrary files on the server, potentially exposing sensitive information.
remediation: |
Update the WordPress Slider Revolution plugin to the latest version to fix the vulnerability.
reference:
@@ -51,4 +53,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210092ff76edbbc2efb77680a8e6c8f22a526cd13cab037b1b2536987549254a07f502204f4200b2e29e0e1f769b025c831666a45a105b15733125b6da657175a8dfc9ad:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f352842c7a3cd215aae483270498605cdbda68e467a8be660ca710ad4934758802201612aca609617c4e58259bbee9e6dacd254abd5fffd41148364a865fe71e2fdb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-1880.yaml b/http/cves/2015/CVE-2015-1880.yaml
index a933aa4f42..c466aac4d6 100644
--- a/http/cves/2015/CVE-2015-1880.yaml
+++ b/http/cves/2015/CVE-2015-1880.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: Fortinet FortiOS 5.2.x before 5.2.3 contains a cross-site scripting vulnerability in the SSL VPN login page which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade Fortinet FortiOS to a version higher than 5.2.3 to mitigate this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402201a01ffbf0346b2002aff666896e97ba836bee1816d78bad5340adf7ebc0aacee022048fa05e1020fe16d8938b501e240256ff2700cb98ed14f9f7fdfa316f9ba75fd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100a8f1b536bbc0034081dc6470fc912055f6a4ba87d655cfff8340f1c73d52ffda022100b490dca5de2ecd3c8f5e5c1ceea38d54db1cf0ec018a27fca4a09200c7e40fd1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-2067.yaml b/http/cves/2015/CVE-2015-2067.yaml
index eb10bf6da3..8949bbf278 100644
--- a/http/cves/2015/CVE-2015-2067.yaml
+++ b/http/cves/2015/CVE-2015-2067.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Magento Server MAGMI (aka Magento Mass Importer) contains a directory traversal vulnerability in web/ajax_pluginconf.php. that allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server.
remediation: |
Apply the latest security patches and updates provided by Magento.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502202797036fe9b48e9a099e90daf5584af453b174dd7235ab9c6617d840a2137bbd022100a357a9ee800bd4a263d5a1e5954e9cb25511ba46bcb07bbf6b68f4560a1af392:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100a09010f5b9f4018e4fc0c383188174604fd390338eba8999b15cddc572fb3aef022100879ae7ef25dfb610b1d2c23646b71404ce647cadd8a6f66212a51815f9847542:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-2068.yaml b/http/cves/2015/CVE-2015-2068.yaml
index c7a037a47b..d7e391a72c 100644
--- a/http/cves/2015/CVE-2015-2068.yaml
+++ b/http/cves/2015/CVE-2015-2068.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Magento Server Mass Importer plugin contains multiple cross-site scripting vulnerabilities which allow remote attackers to inject arbitrary web script or HTML via the (1) profile parameter to web/magmi.php or (2) QUERY_STRING to web/magmi_import_run.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected Magento server.
remediation: |
Apply the latest security patches provided by Magento to fix the XSS vulnerability in the Server Mass Importer module.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ddeefc9ff01c4b9b168885e2d426c362cf2a7246658e3198b4e2ea60b20359b0022004062dbc38a55101765d8337c2c8eb1a8dc3917bb3ed992d2a68bc8f3c6a743d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210088f200b0e4e5251452929ffe746143a17733fef1673f2d5e507b73163a40da32022058daf619169fae1454b37d82b9eb25d92d39df2081ee24dd0b288d597566d58e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-2166.yaml b/http/cves/2015/CVE-2015-2166.yaml
index 23d17e8b46..5b19002618 100644
--- a/http/cves/2015/CVE-2015-2166.yaml
+++ b/http/cves/2015/CVE-2015-2166.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Ericsson Drutt Mobile Service Delivery Platform (MSDP) 4, 5, and 6 allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the default URI in the Instance Monitor.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Apply the latest security patches or updates provided by the vendor to fix the LFI vulnerability in the Ericsson Drutt MSDP application.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ecdc8c1cf6ee2df90852ed2a58f5f9911b2639daca90b2f2a73313a1e19d2a36022100d01dc7cc3bf63079f1c6c83147e159ad221bcf55b04eff087399a6d80f1b8aeb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100dcc1878b9e96a07a63c2e7f707765d75859d430217f6da0c8df5ef5a81e908ee02203f95e514f816093a524a369721a6d66127b324453797366058f5fe8fa831c6a1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-2196.yaml b/http/cves/2015/CVE-2015-2196.yaml
index 6678c4c242..40d2f4671d 100644
--- a/http/cves/2015/CVE-2015-2196.yaml
+++ b/http/cves/2015/CVE-2015-2196.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
WordPress Spider Calendar plugin through 1.4.9 is susceptible to SQL injection. An attacker can execute arbitrary SQL commands via the cat_id parameter in a spiderbigcalendar_month action to wp-admin/admin-ajax.php, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or complete compromise of the WordPress site.
remediation: Fixed in version 1.4.14.
reference:
- https://wpscan.com/vulnerability/8d436356-37f8-455e-99b3-effe8d0e3cad
@@ -42,4 +44,4 @@ http:
- 'status_code == 200'
- 'contains(body, "{\"status\":true,\"data\"")'
condition: and
-# digest: 4a0a00473045022100b631f3a0da2cd2cd984f22c6a14db604ee8e9be6cd826fd16d2710cc716e57e402202c0110d83e9c8530cd1de900371d5f2840bc2ed649a8ca5cd8c65081aa6373e4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ca88241cb70b786eebd10dadef7fc3c2a36f394c9fb81a63d45dcc5c0424be5b02205c88b91297a57c8adc0ae833c3cdf85452d48eab99516a27cf9f7e608ec60fe7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-2755.yaml b/http/cves/2015/CVE-2015-2755.yaml
index 764fc047d5..dcd3cf0360 100644
--- a/http/cves/2015/CVE-2015-2755.yaml
+++ b/http/cves/2015/CVE-2015-2755.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress AB Google Map Travel plugin through 3.4 contains multiple stored cross-site scripting vulnerabilities. The plugin allows an attacker to hijack the administrator authentication for requests via the (1) lat (Latitude), (2) long (Longitude), (3) map_width, (4) map_height, or (5) zoom (Map Zoom) parameters in the ab_map_options page to wp-admin/admin.php.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to inject malicious scripts into the website, potentially leading to unauthorized access, data theft, or defacement.
remediation: |
Update to the latest version of the AB Google Map Travel plugin (>=3.5) or apply the vendor-supplied patch to mitigate this vulnerability.
reference:
@@ -54,4 +56,4 @@ http:
- 'contains(body_2, "")'
- 'contains(body_2, "ab-google-map-travel")'
condition: and
-# digest: 490a00463044022056dff0143b404385394c04a02b748622b19c91c5bcc7e475b2b7ea7d07eab66f022017f6dc12069c7fadb8e9d7736a967b8b77eed9e34da2afbe201c0ee8b75dbefd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204b237870e6c6db8b6116c32384c5508d3d240e024b1e043a790c2c7eec2f6abe022100aa806c4f701a9211b8d7d8fcb26567a9f0745735b2dabf6c98404b4a699c9af6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-2794.yaml b/http/cves/2015/CVE-2015-2794.yaml
new file mode 100644
index 0000000000..fe3ac288a1
--- /dev/null
+++ b/http/cves/2015/CVE-2015-2794.yaml
@@ -0,0 +1,45 @@
+id: CVE-2015-2794
+
+info:
+ name: DotNetNuke 07.04.00 - Administration Authentication Bypass
+ author: 1337kro
+ severity: critical
+ description: |
+ The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.
+ reference:
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-2794
+ - https://www.exploit-db.com/exploits/39777
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cve-id: CVE-2015-2794
+ cwe-id: CWE-264
+ epss-score: 0.9711
+ epss-percentile: 0.99736
+ cpe: cpe:2.3:a:dotnetnuke:dotnetnuke:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: dotnetnuke
+ product: dotnetnuke
+ verified: true
+ fofo-query: app="DotNetNuke"
+ tags: cve,cve2015,dotnetnuke,auth-bypass,install
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/Install/InstallWizard.aspx?__VIEWSTATE"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "Administrative Information"
+ - "Database Information"
+ condition: and
+
+ - type: status
+ status:
+ - 200
+# digest: 490a0046304402201158c001259e4db42e4a00041d56cb95363728da7170e407c3c0d99701f0f426022078549a7f4b8f1aca49f2e0c6dd0849c52df6812d9e901daa10b925a59aea47c3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-2807.yaml b/http/cves/2015/CVE-2015-2807.yaml
index 15be2fab13..416ca5e50a 100644
--- a/http/cves/2015/CVE-2015-2807.yaml
+++ b/http/cves/2015/CVE-2015-2807.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Navis DocumentCloud plugin before 0.1.1 for WordPress contains a reflected cross-site scripting vulnerability in js/window.php which allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Upgrade to a version higher than 0.1.1 that includes proper input sanitization to mitigate the XSS vulnerability.
reference:
@@ -49,4 +51,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220434d479161194367ef5bdeabc99ecce224e5eb386018022d7b36bb9cd86f4a80022100db8406f329f3110158d52bdf8474df76e91cc5cbe2833dae44fb1845ceb69a28:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100da1a4b2faf843d0cd2958b81a243820ddf23198236e08945af7ee4d11fdfb1eb02201af82b252a624c7cfb3f00add99f97d655ab196de12585486f921fdbe24621d4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-2996.yaml b/http/cves/2015/CVE-2015-2996.yaml
index b73386f34d..1f1fb1103b 100644
--- a/http/cves/2015/CVE-2015-2996.yaml
+++ b/http/cves/2015/CVE-2015-2996.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
SysAid Help Desk before 15.2 contains multiple local file inclusion vulnerabilities which can allow remote attackers to read arbitrary files via .. (dot dot) in the fileName parameter of getGfiUpgradeFile or cause a denial of service (CPU and memory consumption) via .. (dot dot) in the fileName parameter of calculateRdsFileChecksum.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server.
remediation: |
Upgrade SysAid Help Desk to version 15.2 or later to mitigate the vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022027127218968c4ebc4883ae626fc6b033bf9d08b7bae8ff80f8c88b3953b5afb8022100e68941654c2dd867b74c212e8b4278eada3a1bc68d78c3f35946ebcd2168c82b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f404996a650f849f8acdc78913fc8ce52c3c0200abb5cf05a75bccfeefa98c850221009be38a6ea4eb6788d5a4093af9303d1ea1fcf9dbe3a19ef4684ace7e1b97c6dd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-3035.yaml b/http/cves/2015/CVE-2015-3035.yaml
index 1dac09e642..acf69a11a0 100644
--- a/http/cves/2015/CVE-2015-3035.yaml
+++ b/http/cves/2015/CVE-2015-3035.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
TP-LINK is susceptible to local file inclusion in these products: Archer C5 (1.2) with firmware before 150317, Archer C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310. Because of insufficient input validation, arbitrary local files can be disclosed. Files that include passwords and other sensitive information can be accessed.
+ impact: |
+ An attacker can read sensitive files on the TP-LINK router, potentially leading to unauthorized access or disclosure of sensitive information.
remediation: |
Apply the latest firmware update provided by TP-LINK to fix the local file inclusion vulnerability.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402203d3544e30d96c50a58a03786b3d3737f3f030f987548b5ee2aa1cdc6c397c8f60220185cb4781be5bfdf3fac43b7aef4f1275cb1a576e2245c63ed113daf8bb27579:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f259341e5029ff24213042a775167d601b3f80f665399afb0b34b2db9fe65e14022100ee72ac5c20cd66f9efe68223934edaf14df250c33b3ef09386df79bf260973bc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-3224.yaml b/http/cves/2015/CVE-2015-3224.yaml
index eec6e6f5a6..7f2a2eb4fe 100644
--- a/http/cves/2015/CVE-2015-3224.yaml
+++ b/http/cves/2015/CVE-2015-3224.yaml
@@ -5,6 +5,8 @@ info:
author: pdteam
severity: medium
description: Ruby on Rails Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request to request.rb.
+ impact: |
+ Remote code execution can lead to unauthorized access, data breaches, and complete compromise of the affected system.
remediation: |
Upgrade to a patched version of Ruby on Rails or disable the Web Console feature.
reference:
@@ -52,4 +54,4 @@ http:
- data-session-id=
case-insensitive: true
condition: or
-# digest: 490a00463044022030a9ec56a2053de400962821958e302bb581346ec23f4082fba0967b5e565a97022009fbd7e3d58fd326dc0203d68f647fa17a4378e67fe662943682b0f2d2aecad2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402201197524d3133f59d30bf768865a3eb2e19500360f5ea87c9b8644f9b7166409d02203d2594302673a834215f81f3177a4cc40c415282c3471af3b589f3391c7ef914:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-3337.yaml b/http/cves/2015/CVE-2015-3337.yaml
index f9b0dcafe5..ad4e273dfd 100644
--- a/http/cves/2015/CVE-2015-3337.yaml
+++ b/http/cves/2015/CVE-2015-3337.yaml
@@ -5,6 +5,8 @@ info:
author: pdteam
severity: medium
description: Elasticsearch before 1.4.5 and 1.5.x before 1.5.2 allows remote attackers to read arbitrary files via unspecified vectors when a site plugin is enabled.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server.
remediation: |
Upgrade to a patched version of Elasticsearch or apply the necessary security patches.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022074b988b6fbd498ff2da02c1600190011417c4937d77140ce896332d80bc19d830220029c2c4b46ea60a3dbda4eafc0b97c0cf31bc538b7a9b42648e160aa915d3fa5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c8ff66900de1efea5253bacb2bb6fc1e0ab52658637cd386a8f93e5b7f271700022066972a5ef010ff7ad2fe76934a64745cc1fa3efd7d250b36f784756b571e7a6b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-3648.yaml b/http/cves/2015/CVE-2015-3648.yaml
index 83c8d686a2..fbbe025d59 100644
--- a/http/cves/2015/CVE-2015-3648.yaml
+++ b/http/cves/2015/CVE-2015-3648.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: high
description: ResourceSpace is prone to a local file-inclusion vulnerability because it fails to sufficiently sanitize user-supplied input.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files, execute arbitrary code, or launch further attacks.
remediation: |
Upgrade to the latest version of ResourceSpace to fix the local file inclusion vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205f8dae2fb3f2803224f58509a3e2b537f6058c6fd041beadd840d7880556f7b4022067528b3f292106857e5f77ee36afb0732e674d785f1c1a8084867a0201466706:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008bca698072e26a4fe5f7beb120720e28e335fd91dff894145386aad1d64cfa0d022100bd52fa1fdd4389bcb557b7debfc868e2b562498529ed1916c0588d8eeb52bdd7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-3897.yaml b/http/cves/2015/CVE-2015-3897.yaml
index 73e1d3ebd7..caf7533128 100644
--- a/http/cves/2015/CVE-2015-3897.yaml
+++ b/http/cves/2015/CVE-2015-3897.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Bonita BPM Portal before 6.5.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the theme parameter and a file path in the location parameter to bonita/portal/themeResource.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Upgrade Bonita BPM Portal to version 6.5.3 or later to mitigate the vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: regex
regex:
- "root:[x*]:0:0:"
-# digest: 490a0046304402203dab59205a8173c09c89962b1e82cc1ad4c357c490c44d0e35e18cabc9bc38aa022006b218c3af08dca68679bc9652df85f76329e16b2fd90e83689ffe6854ba9a9a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f166f87894929871da0a249591949d551feb8a59e23b35b7c0348aa0e149818e02203dc6bbbb1d0ec6cc49b5cfa60e0be43c5c529ef74e2954bb042cbf362d64dd01:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-4050.yaml b/http/cves/2015/CVE-2015-4050.yaml
index 79f0d8513f..be416ec975 100644
--- a/http/cves/2015/CVE-2015-4050.yaml
+++ b/http/cves/2015/CVE-2015-4050.yaml
@@ -5,6 +5,8 @@ info:
author: ELSFA7110,meme-lord
severity: medium
description: Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the _controller attribute is set, which allows remote attackers to bypass URL signing and security rules by including (1) no hash or (2) an invalid hash in a request to /_fragment in the HttpKernel component.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to bypass authentication and gain unauthorized access to the affected system.
remediation: |
Apply the latest security patches or upgrade to a non-vulnerable version of Symfony.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100b178813fb89e08ea1a5c056dfd21cc294d359be292bb45f639562950bfa726fb022100a91750200d42e21a6625b231071f86859d555158d74883e6dd13c2a4e3d851f6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402202c3ac48b45c8e7daf4c90f2a38d14a1e831a3bad62c4e3a35ba316a12e1449dc02203568e6541ba334ec9d0fd2b1fa07e30acfee5590d83fbf3070a16bef8611556a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-4062.yaml b/http/cves/2015/CVE-2015-4062.yaml
index 5986d033e2..c7161a01c7 100644
--- a/http/cves/2015/CVE-2015-4062.yaml
+++ b/http/cves/2015/CVE-2015-4062.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress NewStatPress 0.9.8 plugin contains a SQL injection vulnerability in includes/nsp_search.php. A remote authenticated user can execute arbitrary SQL commands via the where1 parameter in the nsp_search page to wp-admin/admin.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data manipulation, or data leakage.
remediation: |
Update to plugin version 0.9.9 or latest.
reference:
@@ -49,4 +51,4 @@ http:
- 'status_code == 200'
- 'contains(body_2, "newstatpress_page_nsp_search")'
condition: and
-# digest: 4b0a00483046022100c803d84d22072f599a7ab62cf1932bdd06e8a7bcd4ca7b62d49329551de1047e0221009ffab8f7cc3f4c8d97d3cba0ea9b88c49f6bb4ec7e58ab16731b26dff3e31802:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022030aece01455698628c0529a3d758174e67fde6f23fc1fb695e84146493ec67f302200fc808dc3035d718dd2aa3b7c708133d50b93317432dce4d9a822066a41c8f22:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-4063.yaml b/http/cves/2015/CVE-2015-4063.yaml
index 18768e0497..fa067736ff 100644
--- a/http/cves/2015/CVE-2015-4063.yaml
+++ b/http/cves/2015/CVE-2015-4063.yaml
@@ -6,6 +6,8 @@ info:
severity: low
description: |
WordPress NewStatPress plugin before 0.9.9 contains a cross-site scripting vulnerability in includes/nsp_search.php. The plugin allows remote authenticated users to inject arbitrary web script or HTML via the where1 parameter in the nsp_search page to wp-admin/admin.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement.
remediation: Update to plugin version 0.9.9 or latest.
reference:
- https://packetstormsecurity.com/files/132038/
@@ -47,4 +49,4 @@ http:
- 'status_code_2 == 200'
- "contains(body_2, '') && contains(body_2, 'newstatpress')"
condition: and
-# digest: 490a0046304402200cd8a5b27cfc9fc530ff95131cad8be72216fa8b382eef61da6deabd162a0aa0022031ffe84b0ba3260144c0d00ac105fec6aeb628221f50c5434765fa57e0ab9290:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ff2a2fd9d67da069d7ff609b34b18085e9d7711902eb1840fdbe11e1f993c5e802204050c4a0e2e0f187bf80b25980a9b9802856f47e72a347b4f3ad65a87b075d45:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-4074.yaml b/http/cves/2015/CVE-2015-4074.yaml
index fb35d3b066..32ba0bee7f 100644
--- a/http/cves/2015/CVE-2015-4074.yaml
+++ b/http/cves/2015/CVE-2015-4074.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: high
description: Directory traversal vulnerability in the Helpdesk Pro plugin before 1.4.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter in a ticket.download_attachment task.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server.
remediation: |
Upgrade to Joomla! Helpdesk Pro plugin version 1.4.0 or later to fix the local file inclusion vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009a9ccdf0b2006adf2528677a6039b670c0bf75031f8f0fe8f4659f6f38286024022100c8050d4bb0c8efbbfa9fc11744b34ebd8b703211bfcd90a23baa1152c60dbced:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220718e414ee98ec0a9588e6a33b625a43162976e64a7892d251b00f85ecd00fd9d022100c95d8b825c95aa25dbc8bc5c406ba494cacd398a7d7725532f1f6a57d169fc6e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-4127.yaml b/http/cves/2015/CVE-2015-4127.yaml
index a083b7612b..0a060051c8 100644
--- a/http/cves/2015/CVE-2015-4127.yaml
+++ b/http/cves/2015/CVE-2015-4127.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress Church Admin plugin before 0.810 allows remote attackers to inject arbitrary web script or HTML via the address parameter via index.php/2015/05/21/church_admin-registration-form/.
+ impact: |
+ Allows attackers to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Update to the latest version of the WordPress Church Admin plugin (0.810 or higher) to mitigate this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220118198b50dafe48aff7ca0fa12e94a5e81c22c422d7898381e1c665a1549d230022051bdf7aa7846c39e6a52b371dc846ccb6a3eab0efc8da79713b951540cc3abd6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e76da8e16adc870ba7a317f10137034d3e92b26f856f11d5d2ca8679540fea93022100c610d4e5b9010a07031da6a78df9268f6e357f90fe4e09d7bb89a53111286aac:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-4414.yaml b/http/cves/2015/CVE-2015-4414.yaml
index aa2281322e..b9bedd10b8 100644
--- a/http/cves/2015/CVE-2015-4414.yaml
+++ b/http/cves/2015/CVE-2015-4414.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress SE HTML5 Album Audio Player 1.1.0 contains a directory traversal vulnerability in download_audio.php that allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
+ impact: |
+ An attacker can exploit this vulnerability to access sensitive files on the server, potentially leading to unauthorized disclosure of sensitive information.
remediation: |
Update to the latest version of WordPress SE HTML5 Album Audio Player or apply the vendor-supplied patch to fix the directory traversal vulnerability.
reference:
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a95be776bc0abfebaf567c515b5eab8dc056f08d00a4ef6473d565ed99b9db83022061e470cd22a98ef70ce7f82db90d58a0dbc31eef9195ac3e1910ac160e08e1c6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502207ea47bc298c64d6068fa1d65374be7af86c917cae6a7cacfcdd0c23bf43f2c9f022100f615f6ae0030d1da2cff94117ceaa294906bd4088e88e6bc84bb1808e4eaba7e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-4632.yaml b/http/cves/2015/CVE-2015-4632.yaml
index 3cb26cb008..4cb0a7f5b0 100644
--- a/http/cves/2015/CVE-2015-4632.yaml
+++ b/http/cves/2015/CVE-2015-4632.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search.
+ impact: |
+ An attacker can read or modify sensitive files, potentially leading to unauthorized access, data leakage, or system compromise.
remediation: |
Upgrade to a patched version of Koha or apply the necessary security patches to fix the directory traversal vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402203803488596f0e38a1b42b978cdf5859b9f41da8c23b84dd5dc452d642797ccc7022003306ec615a765804e5bd426eda6c732e55321bef480aa09bad9447b2f7aeefa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206dec9027ee012d64ef15cf26caa770cc234fdcc795e13ff260ad66132172d101022100a1b9062125c40151b151fe12a44dd54587ea7a5da3b9121a6c70133865a5f45d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-4666.yaml b/http/cves/2015/CVE-2015-4666.yaml
index d2ba024a35..dc4d739857 100644
--- a/http/cves/2015/CVE-2015-4666.yaml
+++ b/http/cves/2015/CVE-2015-4666.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Xceedium Xsuite 2.4.4.5 and earlier is vulnerable to local file inclusion via opm/read_sessionlog.php that allows remote attackers to read arbitrary files in the logFile parameter.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, disclosure of sensitive information, and potential remote code execution.
remediation: |
Upgrade Xceedium Xsuite to a version higher than 2.4.4.5 or apply the necessary patches provided by the vendor.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022077f099c430da53834c46bab966e74f5f4b641b3833ed73a4d67b459d353aedff02204df5821066ed398e81016f457ce8f8b15f207c5b2b316f4279871b3c146b96d4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100db47aa7c0a08b75b1e5550104d8d2c14f6e55d320c2c0f5a73f8420d27f756ae022043e23f5ba31ea828201b80d2aa25bb665a3cb3ed11df29da6bd0a071835f4e70:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-4668.yaml b/http/cves/2015/CVE-2015-4668.yaml
index 2ebaed95f8..c65d9fe3bd 100644
--- a/http/cves/2015/CVE-2015-4668.yaml
+++ b/http/cves/2015/CVE-2015-4668.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Xsuite 2.4.4.5 and prior contains an open redirect vulnerability, which can allow a remote attacker to redirect users to arbitrary web sites and conduct phishing attacks via a malicious URL in the redirurl parameter.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the installation of malware.
remediation: |
Upgrade Xsuite to a version higher than 2.4.4.5 to mitigate the open redirect vulnerability.
reference:
@@ -38,4 +40,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-# digest: 4a0a00473045022100f1b9d00a4be07a74101519b283dc12416a44e2ae1d1a71a8acd5fe97132794d302204ab207c2a45c3df8a612792ee64189d7bc37d10c6a58aa22fe0fea1213524359:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402207d1ee06cb9a5b378c33cf828f2c2db24459191e7e96c95102dbc0b73a0f12d4b022058c7c74fd4b9eb32e9e3eb0c898ad084b509108bf796dfbb566d5db9a40e60af:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-4694.yaml b/http/cves/2015/CVE-2015-4694.yaml
index 8975798c8b..2520deca2c 100644
--- a/http/cves/2015/CVE-2015-4694.yaml
+++ b/http/cves/2015/CVE-2015-4694.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: high
description: WordPress zip-attachments plugin allows arbitrary file retrieval as it does not check the download path of the requested file.
+ impact: |
+ Arbitrary file retrieval
remediation: |
Update to the latest version of the WordPress Zip Attachments plugin (1.1.4) or remove the plugin if not needed.
reference:
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022032eb70bab4b8f6c13c2f80d146e09471bd96afe12fee8279aba13ce196ef71c2022028a7843877be8d0cf7118685fe9aa7e0f22d35bcc6fddd4bf7acaf4e74ffae81:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502201d3d5bb491de267e1c69d3486287471ff98ba98a6750ce8afa8d9e6c5fd8200e022100f503e943c4ccd85e5f04fea322f9b8c5f6fc54c559f3cebc98654dbfd0b19a89:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-5354.yaml b/http/cves/2015/CVE-2015-5354.yaml
index 1b0437ad3a..7268acf731 100644
--- a/http/cves/2015/CVE-2015-5354.yaml
+++ b/http/cves/2015/CVE-2015-5354.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Novius OS 5.0.1 (Elche) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to admin/nos/login.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the download of malware.
remediation: |
Apply the latest security patches or upgrade to a newer version of Novius OS.
reference:
@@ -37,4 +39,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-# digest: 4a0a00473045022100a508ade39c52d52433dfac77921b04b36030340c2e1563cceb17d39aadb561ef0220523d5172d424276e86d0ccc8a984d31b1723b44b332afb2ed3c778290899c64e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022021c481eb46801462efe96839803d56ee55d3ed5e455993266e6a1532ad861cdd022100e3db44111b055226cbec3e71789aeccf42d280ca3c56b4ec56a0f6102a165fd3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-5461.yaml b/http/cves/2015/CVE-2015-5461.yaml
index f1b6572b17..57a0d918a8 100644
--- a/http/cves/2015/CVE-2015-5461.yaml
+++ b/http/cves/2015/CVE-2015-5461.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: WordPress StageShow plugin before 5.0.9 contains an open redirect vulnerability in the Redirect function in stageshow_redirect.php. A remote attacker can redirect users to arbitrary web sites and conduct phishing attacks via a malicious URL in the url parameter.
+ impact: |
+ An attacker can trick users into visiting a malicious website, leading to potential phishing attacks.
remediation: |
Update to the latest version of the WordPress StageShow plugin (5.0.9 or higher) to fix the open redirect vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
-# digest: 4b0a00483046022100886a5b7cf02365dafeeacdd4a7be6de23408f06fee9b988558be7611b7c7db9c022100d98e12870eb9875370c9425530e630069d1f80dbd00b8ec38f3683c806c11e1b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022070f4bf5a4419a82acfda59930ff4e88eeced50aa7823f1581174d9a1803f0f55022100d7b307f0a45ad64d1a5b23b47a061774f694f29643c98688a6b811c59ecb1111:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-5469.yaml b/http/cves/2015/CVE-2015-5469.yaml
index ba8a71cb6a..2529d4786f 100644
--- a/http/cves/2015/CVE-2015-5469.yaml
+++ b/http/cves/2015/CVE-2015-5469.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: high
description: WordPress MDC YouTube Downloader 2.1.0 plugin is susceptible to local file inclusion. A remote attacker can read arbitrary files via a full pathname in the file parameter to includes/download.php.
+ impact: |
+ The vulnerability can lead to unauthorized access to sensitive files, execution of arbitrary code, and potential compromise of the entire WordPress installation.
remediation: |
Update to the latest version of WordPress MDC YouTube Downloader plugin or apply the patch provided by the vendor.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402203277453c3d327bac930dd86a68c67e93f63debd5f6276897ca07e6ba55c36f8c02203b97f3380d3b01db3ee4bf26a675dda650354143c8e293f59407e1ea5b37fe2b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502201b4c1f0713a6eed61983763feeb5802515eea5f075e23df6dfa975cf7c0ad3a10221008629f02ca4972a98232537c73de10d5be41ccc5a8dbd45c3d21fbe7885c2af00:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-5471.yaml b/http/cves/2015/CVE-2015-5471.yaml
index 7309d34158..42cabb8cc6 100644
--- a/http/cves/2015/CVE-2015-5471.yaml
+++ b/http/cves/2015/CVE-2015-5471.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: The program /wp-swimteam/include/user/download.php allows unauthenticated attackers to retrieve arbitrary files from the system.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive information from the server, such as database credentials, and potentially execute arbitrary code.
remediation: Upgrade to Swim Team version 1.45 or newer.
reference:
- https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d21dcf785d19a7db340dd078c309f5ea161a7d30e4b24642063a9b27585c25ef02203a55c13416868ec4264835fc9dfde5d6daa5be50d1c00c616562b4b7dbc566b3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022054adf595d4598d8079a43f04c54f567368148d6b369b91fb4dee06f3cd556691022100d43e726f5f270781a7a30857a8efb61e2683dc21642e2621602483eff03d4d0a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-5531.yaml b/http/cves/2015/CVE-2015-5531.yaml
index 4d8d475b55..1814bc9326 100644
--- a/http/cves/2015/CVE-2015-5531.yaml
+++ b/http/cves/2015/CVE-2015-5531.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: medium
description: ElasticSearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server, potentially leading to unauthorized access or sensitive information disclosure.
remediation: |
Upgrade ElasticSearch to version 1.6.1 or later to mitigate the vulnerability.
reference:
@@ -66,4 +68,4 @@ http:
- type: status
status:
- 400
-# digest: 4a0a00473045022009c54327b9210cbe3dc3ffdc43ae724f1915eb369cc29aadc6d2a951481dda200221009244e99cf71726edf10436597b76d5d84d7be6f8a83dd5e07a49516fdd2f8721:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022025dee33a28c40d6842a04f69f902866035d37b3dd71a515dc33e628a82216a31022041a3fea0ccfddf4bde198559f245fcab6faa0239b902c1233a0b3de59ee08543:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-5688.yaml b/http/cves/2015/CVE-2015-5688.yaml
index e2fe626dfe..0c94435848 100644
--- a/http/cves/2015/CVE-2015-5688.yaml
+++ b/http/cves/2015/CVE-2015-5688.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: Geddy prior to version 13.0.8 contains a directory traversal vulnerability in lib/app/index.js that allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.
+ impact: |
+ The vulnerability can be exploited to read sensitive files, execute arbitrary code, or gain unauthorized access to the system.
remediation: |
Upgrade Geddy to version 13.0.8 or later to mitigate the vulnerability.
reference:
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e4539e08c64e929c2fc1b67aa8eaf6359b8ee3881518dba019685135532ae789022100e996b46b2641199fc1e9fc8ef38c10efd6cbae81da613ca59746dbf6040c61ac:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205f6b6213a77637d232ed1e79782429484c6ec07861326a705ddbc57fd46e9356022100cc18e37ab04097c72550e0b40d3c694e44529a377144f3b3c611cbf071f3c505:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-6477.yaml b/http/cves/2015/CVE-2015-6477.yaml
index 9e793e0ec9..64952bb66a 100644
--- a/http/cves/2015/CVE-2015-6477.yaml
+++ b/http/cves/2015/CVE-2015-6477.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: Nordex NC2 contains a cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
part: body
words:
- ""
-# digest: 4a0a00473045022043530c0184abc2792e3af8fc479539f017ca978eebdbe5a1bf858693e6f14dbe02210099c5c6756391b1324369d55ba437370cbb4b803b9a85b36915a6397f67c83cc2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022044eba42cf442a5583667dc633afc18523d523e9bc838b8ec07de78b9af8157c30221009a7c8b3a0d3b9b7e74be4bd27efff6532d13bb79e5d517143d2950d6e42445b8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-6544.yaml b/http/cves/2015/CVE-2015-6544.yaml
index d5681ede8e..7bf5e10d20 100644
--- a/http/cves/2015/CVE-2015-6544.yaml
+++ b/http/cves/2015/CVE-2015-6544.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Combodo iTop before 2.2.0-2459 contains a cross-site scripting vulnerability in application/dashboard.class.inc.php which allows remote attackers to inject arbitrary web script or HTML via a dashboard title.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a version of Combodo iTop that is equal to or greater than 2.2.0-2459 to mitigate this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bc8de41899e22fb4529e5f8036e0f9a45be5bfda585d871ebe6966cf01576f89022100ff10621d331f8425b8d221ed5ed66a95f5bec4e93fc3afa374588c1c707079ca:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220310c1c3dfb4685981d2b8c0570a3f51205d1351f4525cfd108b5ff0748ce19be02204ffe64131139eccc3836198c27ddd7893e36df632591eecf10449664efd31e5d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-7245.yaml b/http/cves/2015/CVE-2015-7245.yaml
index b5204dc734..146702ec93 100644
--- a/http/cves/2015/CVE-2015-7245.yaml
+++ b/http/cves/2015/CVE-2015-7245.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
D-Link DVG-N5402SP is susceptible to local file inclusion in products with firmware W1000CN-00, W1000CN-03, or W2000EN-00. A remote attacker can read sensitive information via a .. (dot dot) in the errorpage parameter.
+ impact: |
+ An attacker can read sensitive files on the system, potentially leading to unauthorized access or disclosure of sensitive information.
remediation: |
Update the router firmware to the latest version, which includes a fix for the local file inclusion vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
part: body
regex:
- "root:.*:0:0:"
-# digest: 4a0a00473045022100ca5a964ea92b5133af89df4f5f346221863a9ac3c003cf5dece99f434557379a02203e9392edd5f8366ef41816ad1e5a43ecab6d0e8a4abd0f4fd197faca43f2772c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402203abeb57842f305284c476cd3bfb05e352077b601b6e9e4f5a9eb23dc3c398a9502207caf3104651203f61f563fca8c2cadf99730190441457b4af63a1de2d4718f33:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-7297.yaml b/http/cves/2015/CVE-2015-7297.yaml
index aac8c6f54d..0344b55a05 100644
--- a/http/cves/2015/CVE-2015-7297.yaml
+++ b/http/cves/2015/CVE-2015-7297.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: high
description: A SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and potential compromise of the Joomla! CMS.
remediation: |
Apply the latest security patches and updates provided by Joomla! to mitigate the SQL Injection vulnerability.
reference:
@@ -39,5 +41,4 @@ http:
part: body
words:
- '{{md5({{num}})}}'
-
-# digest: 490a0046304402207559b85ceccbea1fe5b6daceae4e5a92557d4633810feb726625a5b886a65f02022069bdfd3c858ad721a570c03085f038c7e7d3bcff7ffc28725f22d3beac6634c4:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402204bc8735ec8f8afb7429176b142c6a80118e7d9d94f5aeedbf56c3c06761a7d7e0220747662ec9a9a70c4f9a152965d1e50b530c582095b03199fbb2f6203a490f0cd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-7377.yaml b/http/cves/2015/CVE-2015-7377.yaml
index d250b6a986..771ee13d37 100644
--- a/http/cves/2015/CVE-2015-7377.yaml
+++ b/http/cves/2015/CVE-2015-7377.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress Pie Register before 2.0.19 contains a reflected cross-site scripting vulnerability in pie-register/pie-register.php which allows remote attackers to inject arbitrary web script or HTML via the invitaion_code parameter in a pie-register page to the default URL.
+ impact: |
+ Successful exploitation of this vulnerability could lead to the execution of arbitrary script code in the context of the affected website, potentially allowing an attacker to steal sensitive information or perform unauthorized actions.
remediation: |
Update to the latest version of the WordPress Pie-Register plugin (2.0.19 or higher) to mitigate this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100deaed4c302a0f2dbb2c1002ab16a4d19abed5bf2b5498076e487f09d442f1aa90221009c6e5e7a2bea16706c8fe80fc4953b8c41ba71a439584421f740f40dcb0d54e0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210081857604c1c23099850e1b7fa5861629a4f39915a4937ec058b69f45c97c36a40220045b828831fa6658df8f2fb9d2ea668a85595319c861368f5edef8b3813c2e2a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-7450.yaml b/http/cves/2015/CVE-2015-7450.yaml
index 9f1d853224..1cb19dce20 100644
--- a/http/cves/2015/CVE-2015-7450.yaml
+++ b/http/cves/2015/CVE-2015-7450.yaml
@@ -5,6 +5,8 @@ info:
author: wdahlenb
severity: critical
description: IBM Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default).
+ impact: |
+ Successful exploitation of this vulnerability can lead to remote code execution, allowing an attacker to execute arbitrary code on the affected system.
remediation: |
Apply the latest security patches provided by IBM to mitigate this vulnerability.
reference:
@@ -66,4 +68,4 @@ http:
- type: status
status:
- 500
-# digest: 4a0a00473045022068c38cca57a3b099c3c2650747e11cc02ea8a32b4bef8b3c1107cc3673d74ae4022100a2e6b20a156826cef3f1629c28619f37163a34c630e9eaabef9621ffdc700255:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502203dddf0bafc4daa4c2ac834309b39790c5dcb190efc315b734735e8e33cbc7a46022100e8601b832ddecb341582c7f50441a5a9d2f6431a0961563e8b8a26cdd06096a9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-7780.yaml b/http/cves/2015/CVE-2015-7780.yaml
index b4011cd014..da2916da95 100644
--- a/http/cves/2015/CVE-2015-7780.yaml
+++ b/http/cves/2015/CVE-2015-7780.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: ManageEngine Firewall Analyzer before 8.0 is vulnerable to local file inclusion.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the target system, potentially leading to unauthorized access or information disclosure.
remediation: |
Upgrade to a version of ManageEngine Firewall Analyzer that is equal to or greater than 8.0 to mitigate this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220555781e07f970daadcced951247ac399438d40da4bd3a346f2db1d49889d564c022100f50acf83d34cecd1dfe04461ce384c9cf4b84d28e6409905b991c68ab1138d5f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100fe814cfbdea5dd48bb42e2916cc5baef7da4bdf5e09ba2ae4aec2d64f810bf3b02206c07736bfd5e351b96f0349cbb22c014ffbe9162ed348e4e870f21ef115c3440:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-7823.yaml b/http/cves/2015/CVE-2015-7823.yaml
index f6795a8dd4..35513fc5fe 100644
--- a/http/cves/2015/CVE-2015-7823.yaml
+++ b/http/cves/2015/CVE-2015-7823.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Kentico CMS 8.2 contains an open redirect vulnerability via GetDocLink.ashx with link variable. An attacker can construct a URL within the application that causes a redirection to an arbitrary external domain.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the installation of malware.
remediation: |
Apply the latest security patches or upgrade to a newer version of Kentico CMS.
reference:
@@ -35,4 +37,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
-# digest: 4a0a00473045022100db5777794e9cca266ff56c560d0dc85b120621d3fd9d010b90952ebcff00d0f4022039a5b85b02725e298df42dfae8d92e2ebcd7c782b0726a622beea288a97ce891:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402203936d5c04ccb084917aa0e7732778dd55d5b782335998b15f96a978bba1d027b022057d23d7f269f703081b3594cca15810556c0bd1861f20f113211c56cb6019eda:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-8349.yaml b/http/cves/2015/CVE-2015-8349.yaml
index 54b80ebbda..0a55d8cd36 100644
--- a/http/cves/2015/CVE-2015-8349.yaml
+++ b/http/cves/2015/CVE-2015-8349.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: SourceBans before 2.0 contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via the advSearch parameter to index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a version of SourceBans that is 2.0 or above, which includes a fix for this vulnerability.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022061874dc0e815a33d631d7209c6fcf76328d7f5ed53541b56230fb149770bb80b022100a19e536561a918832285df3e55075fd6f54a5a157eca5094efc0ebe7de24f638:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022026a6c55a1c3ebeb2ab255f6b5b005c4fe12d2bf1e489ae7b2d7035a2acec98fb02206fa88dfe1cc100390aaff97cb554e3b4cd8f6fac1ae7e8ef68b6aa1e91eb8ba3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-8399.yaml b/http/cves/2015/CVE-2015-8399.yaml
index f4f1ff66d7..66975ca9e6 100644
--- a/http/cves/2015/CVE-2015-8399.yaml
+++ b/http/cves/2015/CVE-2015-8399.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: medium
description: Atlassian Confluence before 5.8.17 contains an information disclsoure vulnerability. A remote authenticated user can read configuration files via the decoratorName parameter to (1) spaces/viewdefaultdecorator.action or (2) admin/viewdefaultdecorator.action.
+ impact: |
+ An attacker can exploit this vulnerability to gain access to sensitive information.
remediation: |
Upgrade to a version higher than 5.8.17 to mitigate the vulnerability.
reference:
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ac9a4f3e70c868866671e851df0b9fc3bf4492f1aadfac4a904600e976812ebe022100a7307ba3c92d9659c61ff4ebde1140aadd30cfafc8b4d717da60d663afa15e3f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221008ea8314c2d2cfc813305b31af831f56fdab3971ec12350cbbd7dc158862e6d9b02202a754b1017d82f6c512bee0b31c7e2198a141e38147a4b5eba9341544d824a89:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-8813.yaml b/http/cves/2015/CVE-2015-8813.yaml
index c455f41547..f31ce86d95 100644
--- a/http/cves/2015/CVE-2015-8813.yaml
+++ b/http/cves/2015/CVE-2015-8813.yaml
@@ -5,6 +5,8 @@ info:
author: emadshanab
severity: high
description: Umbraco before version 7.4.0 contains a server-side request forgery vulnerability in feedproxy.aspx that allows attackers to send arbitrary HTTP GET requests via http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:80/index.
+ impact: |
+ The vulnerability can result in unauthorized access to sensitive information or systems, leading to potential data breaches or further exploitation.
remediation: |
Upgrade Umbraco to version 7.4.0 or above to mitigate the vulnerability and apply any necessary patches or security updates.
reference:
@@ -37,4 +39,4 @@ http:
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"
-# digest: 4a0a0047304502204b6fcb6a771fd3b7b96a1538f683f81e0e7b25b821053881642d48e7b9d37958022100f8be5a511110ca7df0a2f7f32001a3544bc3f34c3d7a1b326ecbd5f84315d138:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100d6c0f97e8ec2b3d306799b9c831fbd7e715d7bb71cafde7ed2a944c60bba1547022100d0bf5406fd6d80cacdf520983912aafba198b629392fe64d7ea723e40997d3e1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-9312.yaml b/http/cves/2015/CVE-2015-9312.yaml
index dca645a642..87d5493831 100644
--- a/http/cves/2015/CVE-2015-9312.yaml
+++ b/http/cves/2015/CVE-2015-9312.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress NewStatPress plugin through 1.0.4 contains a cross-site scripting vulnerability. The plugin utilizes, on lines 28 and 31 of the file "includes/nsp_search.php", several variables from the $_GET scope without sanitation. While WordPress automatically escapes quotes on this scope, the outputs on these lines are outside of quotes, and as such can be utilized to initiate a cross-site scripting attack.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: Fixed in version 1.0.6
reference:
- https://wpscan.com/vulnerability/46bf6c69-b612-4aee-965d-91f53f642054
@@ -47,4 +49,4 @@ http:
- 'contains(body_2, "=15.8.2) which includes a fix for this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ed3a28e5d66276da789f99d8ca9b619f5ce94b14fdc55c680e75ec6768b884770220253d900494d9dfdd178a4a569645ab718f34afd497909a342be705b28d49459b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022063ac8e68321f0e59b6c100c24937f8b6d9917f59ad32a62aeb85628a938a35d1022100febf34a80956f896e92a34a6621d0864d007f57f563cf8d29d36fab8bf26eefa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-9480.yaml b/http/cves/2015/CVE-2015-9480.yaml
index 6547281c59..c0797ed689 100644
--- a/http/cves/2015/CVE-2015-9480.yaml
+++ b/http/cves/2015/CVE-2015-9480.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: The RobotCPA plugin 5 for WordPress has directory traversal via the f.php l parameter.
+ impact: |
+ An attacker can access sensitive files on the server, potentially leading to unauthorized access, data leakage, or further exploitation.
remediation: |
Update to the latest version of the WordPress RobotCPA 5 plugin to fix the directory traversal vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100aa181dcf292d27b35328015346bc88bfd840fb7df3fb9abee95f6f9dd9c98f05022100b3fbed3118362f5a547600472d9ba3e45f3c3ffa5c0fb9f7a3c0c430344d2090:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205a874d0e455f00e2607b17addc35d151c68d78a8f1e374cfb6ccafe6deaf341b022100ea6b0959efe3a2c6abc9fe27bcc3f76b54c4309d9ca84e698a47c2e30219edcf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-0957.yaml b/http/cves/2016/CVE-2016-0957.yaml
index 29c19cc718..ef1928e067 100644
--- a/http/cves/2016/CVE-2016-0957.yaml
+++ b/http/cves/2016/CVE-2016-0957.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: high
description: Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors.
+ impact: |
+ The vulnerability allows attackers to bypass security rules and potentially gain unauthorized access to sensitive information or perform malicious actions.
remediation: |
Upgrade to Adobe AEM Dispatcher version 4.15 or higher to fix the vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022002d920ff6f08e0f17252e3a988907269caa75878d2fc2be1c69854dd2c27f920022068e782b1558b398fbadac0cf36ed888391e0a03b412daf029f4fb398ae6a3484:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022077556d3daf7be24aed5c059d57a9f9a8a7c56fc624bcd8843d49851236eeeb4802210082038feeeaca95b060232fae3f97608dc0d16a75de22429a02dcbe44556d11b5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000126.yaml b/http/cves/2016/CVE-2016-1000126.yaml
index 7b70a1db9c..68d9de176d 100644
--- a/http/cves/2016/CVE-2016-1000126.yaml
+++ b/http/cves/2016/CVE-2016-1000126.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress Admin Font Editor 1.8 and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ This vulnerability allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the WordPress Admin Font Editor plugin (1.8 or higher) to fix this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100dc5982de87916754cffd53a28bf0cd0aaeabe19f26be4f32b75da2238455f99a0221009fe74fca64b9608b20ba87bb2011884a5a8c0aafd033b809f301d60f3784dad1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202c66731b5f9f2d6e188f0477f7c2b51f24e3acec8a07d6d5d004bbe4d5c2eca50221008ba04978d14a05686641052aceb766494413d1058343554156118ef309ca0fb1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000127.yaml b/http/cves/2016/CVE-2016-1000127.yaml
index 8a84cc9fa4..893efd080d 100644
--- a/http/cves/2016/CVE-2016-1000127.yaml
+++ b/http/cves/2016/CVE-2016-1000127.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress AJAX Random Post 2.00 is vulnerable to reflected cross-site scripting.
+ impact: |
+ This vulnerability allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the WordPress AJAX Random Post plugin (2.00 or higher) to fix this issue.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210094ae3f7ce1f4aad567382cdc6f3f62952f86e336e7f0da1db305b2bc62cb7a5102204b1f96fdfb57f9e17aec329ec72acb333c1c71fa4b991ead58286b01c4d63452:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210081771e4363603f58a328b1a6bacde242da4c5e3271025be6c7c987935d3b2f8f0221009bab57ab2790b4596b9def71ae18a5e91ce2ff4f751c495781179b1b22c6ee49:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000129.yaml b/http/cves/2016/CVE-2016-1000129.yaml
index dad36daacd..30271e72e5 100644
--- a/http/cves/2016/CVE-2016-1000129.yaml
+++ b/http/cves/2016/CVE-2016-1000129.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress defa-online-image-protector 3.3 and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the WordPress defa-online-image-protector plugin (version 3.3 or higher) to mitigate this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502201f425b2687c1d86ba6e2c4a4a0a2db98563703cd47a62ff79615c2cc9f344778022100a1231eb16bcf608c502af4b99c6eb5fb23c6ccb318f4f4d44ac70c24e017120e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100b69848f928f3b5acb72d8906a014a75d284b4dbc0a104129bf55f461059f6273022100dc0138ac2c42489e8daf4a59615eee32f5fab18694177535c56572991cdf0314:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000130.yaml b/http/cves/2016/CVE-2016-1000130.yaml
index 4d9162cf40..698bd404f1 100644
--- a/http/cves/2016/CVE-2016-1000130.yaml
+++ b/http/cves/2016/CVE-2016-1000130.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Wordpress plugin e-search 1.0 and before contains a cross-site scripting vulnerability via date_select.php which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Update to the latest version of the WordPress e-search plugin to mitigate this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022073541e0a6c76f9af169a47d28858837a0e51ac07acfbb890faa2b2893f2adcbf02205b66d4d20c26828be7b99d23f206856dffa8d0975d5d248ebaf073f6d9be3801:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100b3f3052db89c469ebb7e5bf863db68d5e8e7fe80d90fc1c0f8dc3cc715336c3b022100bef97bf4611b9e08cd2f0a28a1a86f102823928ec996f87e46570887b838f5c3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000131.yaml b/http/cves/2016/CVE-2016-1000131.yaml
index 1040f8041c..b49765daf5 100644
--- a/http/cves/2016/CVE-2016-1000131.yaml
+++ b/http/cves/2016/CVE-2016-1000131.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress e-search 1.0 and before contains a reflected cross-site scripting vulnerability via title_az.php which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement.
remediation: |
Update to the latest version of the WordPress e-search plugin to mitigate this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a54604ad1849342732032772e2466eb797c0236806da4d25bb6bf46020c16dcc022100b0dd7ad3bf9f8afe92ccc684c0a85b238cef807a53469c3668d7eedae0b6a2bd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220241a63c9c5e797de6b9bcc7368de88c3fbc3b985e604f8760756b49756f9898602206c2549634b8db91009b856937616f849ad8ac2303e9a5c751a142ee6f8bf3381:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000132.yaml b/http/cves/2016/CVE-2016-1000132.yaml
index 652831c4c4..d3580c2873 100644
--- a/http/cves/2016/CVE-2016-1000132.yaml
+++ b/http/cves/2016/CVE-2016-1000132.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress enhanced-tooltipglossary 3.2.8 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement.
remediation: |
Update to the latest version of WordPress enhanced-tooltipglossary plugin (3.2.9 or higher) which includes a fix for this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022000c0e22769e84c65dfa64145d9175b7ded785b7466f62b66110e9461b39ef8bc022100be40690186849ce2ea1185a7ee3b9e3f893005501f1141bad6fda92722aef054:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c43fae980722bc0ef85637f20f428fd05c6c010f8b8ca0404fc2de751cf9eedf02207a21d277e19e661c0eeb806c43e4226619738ac106e3e897521e3ef75a50cca4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000133.yaml b/http/cves/2016/CVE-2016-1000133.yaml
index 887de20937..f68ea329e6 100644
--- a/http/cves/2016/CVE-2016-1000133.yaml
+++ b/http/cves/2016/CVE-2016-1000133.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Wordpress plugin forget-about-shortcode-buttons 1.1.1 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Allows attackers to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Update to the latest version of the WordPress forget-about-shortcode-buttons plugin (1.1.1) or apply the necessary patches.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100859d2309e5dd2d5ed0c00598865cb87c8747e23c2e722ccebddb4c00b2d50817022100be827f4a75d3bc20f95149f54e2861489fece6fad9376fb8b6f369557dfb06a8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100d998fcf68f70eb1a02ab204ad6e87866e5ca8a0f41d504d26e130b9d9074a8ee022100b7cc11f7fd5573ac5d93473e635ef2c6bc994cef63574ca3c3347abe7f9f50e1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000134.yaml b/http/cves/2016/CVE-2016-1000134.yaml
index a6788e3efd..3eebe36650 100644
--- a/http/cves/2016/CVE-2016-1000134.yaml
+++ b/http/cves/2016/CVE-2016-1000134.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress HDW Video Gallery 1.2 and before contains a cross-site scripting vulnerability via playlist.php which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential theft of sensitive information or unauthorized actions.
remediation: |
Update to the latest version of the WordPress HDW Video Gallery plugin (>=1.3) which includes a fix for this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402204020a1b35f5a3dca449f1a17c92be0ebfc96dc4d0f2c8f2b0bae056f07b91fb802207e9edbc04320994c9dbed77d5b02f0f6ee3f911eb0a9acee0a41bd52d51a97e2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202042cf1d42fc45d601b334ddd9be2c4ad81cbad0ae21b7dbe37fb8544563569d022100ae6f9bb206b14f9447da6ab5f14c1d7cb44faac9024450697a65988ae18abe9a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000135.yaml b/http/cves/2016/CVE-2016-1000135.yaml
index 41d8cb8886..f227aee8d0 100644
--- a/http/cves/2016/CVE-2016-1000135.yaml
+++ b/http/cves/2016/CVE-2016-1000135.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress HDW Video Gallery 1.2 and before contains a cross-site scripting vulnerability via mychannel.php which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the WordPress HDW Video Gallery plugin (>=1.3) which includes a fix for this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402203ca753b9fcc01aba855555f22d3f0ee87875774bbdbdce7783fb363d4bce4f3102201210ae6e4f262daf0ce13310afce95669f1a26b06091321f3fac20cc09583045:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402202ae7e69715174775754687933be15753322876a7d53fc939fc91dbdf3be3ebf402206787796d6e14595575b64d2d299d4fba4c37323cf878221c599966ab9df54d79:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000137.yaml b/http/cves/2016/CVE-2016-1000137.yaml
index 2bfcda78a8..dcf54480c2 100644
--- a/http/cves/2016/CVE-2016-1000137.yaml
+++ b/http/cves/2016/CVE-2016-1000137.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress Hero Maps Pro 2.1.0 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of WordPress Hero Maps Pro plugin (2.1.1 or higher) which includes a fix for this vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022028333bf5c2cca82e775be610851e57c7a58a40e4b351b064e08b49fd6732afb4022018ac991ce7ae978842da66bf3dab278151bce8fcdfeb0a7de3ff56fbf37c34a8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d13872bb9ed9b91e775d32a2561efb705b7f1ece4cca3dceeb14e46e652b1aaa02200a9b001ae5dd3180201319afe2a34597961731411ecf7cc760e62c6c827bb57f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000138.yaml b/http/cves/2016/CVE-2016-1000138.yaml
index 2fcad56a54..661bceb72a 100644
--- a/http/cves/2016/CVE-2016-1000138.yaml
+++ b/http/cves/2016/CVE-2016-1000138.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress Admin Font Editor plugin indexisto 1.8 and before contains a cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ This vulnerability allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the WordPress Admin Font Editor plugin (1.8 or higher) to fix this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c5c472ac2a24310107f7ca14d8ef72a7804eeb484efe1abc014b63dedf311e0902210088d9e09a6ed8af95117f3176df1c071d3d6944c12a89e303222372ff75824169:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022044d03e11c211379984dfe27ce61b07211d7a29b1b973fa042700157a63bca57a022075014e7967f8dac0eb7fd71d58bc39cec5f435e57ada53b02b17f03c571b00fe:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000139.yaml b/http/cves/2016/CVE-2016-1000139.yaml
index 616aa80bae..74960b68de 100644
--- a/http/cves/2016/CVE-2016-1000139.yaml
+++ b/http/cves/2016/CVE-2016-1000139.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress plugin Infusionsoft 1.5.11 and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Update to the latest version of the Infusionsoft Gravity Forms plugin (>=1.5.12) which includes a fix for this vulnerability.
reference:
@@ -50,4 +52,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100b4eae642fcdb8a32023d84641c529a9ededa159c1544cd7c47f97d07cac2f64b022100c07ae728e621a3c9815e34e8ed636988825be98370e8412727ce70e3be85d5fb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022038c2f775b42393f728de7baef85661a358e82cfb3263505309fc649a5fe396f902210089a598413f6401c8913deae9e3e26e8789c9404133fe77da7144e261b0f51990:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000140.yaml b/http/cves/2016/CVE-2016-1000140.yaml
index 996eb2b4fd..3cf05a91dd 100644
--- a/http/cves/2016/CVE-2016-1000140.yaml
+++ b/http/cves/2016/CVE-2016-1000140.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress New Year Firework 1.1.9 and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could lead to cross-site scripting (XSS) attacks, allowing an attacker to execute malicious scripts on the victim's browser.
remediation: |
Update to the latest version of the WordPress New Year Firework plugin (1.1.9) to mitigate this vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022071b7c59cdaf3c3070095682b4b43d40f56f21965061a48228744134596fdcb3e022100b4451244edcbef836ba4132ec86e8e22e2cb589a2f63c0c279e18d07075a6f76:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402200ce83fde2ff1834fb1016fd6142a629a94645117f68c3a24a6c75211b4ef127802201e05e7620b3183f21b55d47f1657af3364591be7da940f55f6ccc61a6c4350e3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000141.yaml b/http/cves/2016/CVE-2016-1000141.yaml
index e39badc1a8..a7d01fbb9e 100644
--- a/http/cves/2016/CVE-2016-1000141.yaml
+++ b/http/cves/2016/CVE-2016-1000141.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress plugin Page-layout-builder v1.9.3 contains a cross-site scripting vulnerability.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: Upgrade to version 2.0 or higher.
reference:
- http://www.vapidlabs.com/wp/wp_advisory.php?v=358
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022073cdf398588f8f8ed97d8750a345f5738ff542be67974624baaceead24851b8d022100bde408c18e9ac2a0bfd28b3db8e54f8f9026c00e1bea2729a215b7c88ceaafe3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210094b3fb8569588c41ce9418dbef98a6bf1d6ff444785510b3626e133e1c1d58f7022100f76dfb013079bff68286f9aeed929b4f67d98052767d13ef6e5bf9e7156e64dd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000142.yaml b/http/cves/2016/CVE-2016-1000142.yaml
index 0297d0d5bd..df7400be6b 100644
--- a/http/cves/2016/CVE-2016-1000142.yaml
+++ b/http/cves/2016/CVE-2016-1000142.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress MW Font Changer plugin 4.2.5 and before contains a cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Allows remote attackers to execute arbitrary script or HTML code in the context of the affected site, potentially leading to session hijacking, defacement, or data theft.
remediation: |
Update to the latest version of the WordPress MW Font Changer plugin (4.2.5) or remove the plugin if it is not necessary.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022100e4807f9595ece7c738aee8017503dea3c891f7669f99304dbed8323eeece2d97021f1a4433c09ea577dd68babbe6e515f34f1d2efca75934520b2e8bcdeb6b77ad:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ae3f3453570b62f688d9635413dcb03aec3c7a99f1274b0891b341dff7ce4d9d022100f62692b07aeaca96280089866d8a3f70d31ccddbbdebec6d6890faf10f7458c3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000143.yaml b/http/cves/2016/CVE-2016-1000143.yaml
index 48d8b91a24..5bbb52edee 100644
--- a/http/cves/2016/CVE-2016-1000143.yaml
+++ b/http/cves/2016/CVE-2016-1000143.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress Photoxhibit 2.1.8 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in a victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of WordPress Photoxhibit or apply the official patch provided by the vendor.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009b80f81c2daee2c87a798d7425931ae4cd1bcf038c7307458818b7e92846bf8b022100cef0ebedfe1cf9a496e55408fb3e82b950bfca038795d75817711352577c722b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009cfd669a113df17bcb40d2d666622e3bee811d2bf7e666fbf613efae9a57f9a5022100eeda200e3565787dfa6178cc39a8a81daa2c207435ffa482c4acee9adbc434e6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000146.yaml b/http/cves/2016/CVE-2016-1000146.yaml
index 30db053bf4..c69080d170 100644
--- a/http/cves/2016/CVE-2016-1000146.yaml
+++ b/http/cves/2016/CVE-2016-1000146.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress Pondol Form to Mail 1.1 and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Update to the latest version of the Pondol Form to Mail plugin (>=1.2) or apply a patch provided by the vendor to fix the XSS vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100df67aa27d7c4b8bc16af09945fdfa8564c4124b217a1d725e947d8c8ec36f0460221008517b8dad15a5c016afa31ea3ce4d573746edeb4ba4ba81973a87808d91cf7e0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ebd9c80bb626d681fb8b404cc79810cc7a961b13fc1922cec330676beb7d0a3c022100e2f37aa92643d7d9c40748233939cf5877d2dc888eae41972c4061dec7945349:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000148.yaml b/http/cves/2016/CVE-2016-1000148.yaml
index a957bbbe11..82b856ada7 100644
--- a/http/cves/2016/CVE-2016-1000148.yaml
+++ b/http/cves/2016/CVE-2016-1000148.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress S3 Video and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft or unauthorized actions.
remediation: |
Update to the latest version of WordPress S3 Video plugin (>=0.984) to mitigate this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c22656b9018685866e3895d651f6c495d7a892213e6308bc84acb078b13168420220236afdceb11ee3e5d92d979496774e59c7751f4911464e4b69cb1ad4b2e63624:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e65645af92854af7b274d0fdb6344ca4fa6195d26ac6c3a5ab6c55670bf7cc5202202d8ee62a887d9a8cddebd5451e1b31c32713c634b950cee7e19ae8de652a7844:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000149.yaml b/http/cves/2016/CVE-2016-1000149.yaml
index 577610523b..7c442a5430 100644
--- a/http/cves/2016/CVE-2016-1000149.yaml
+++ b/http/cves/2016/CVE-2016-1000149.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress plugin Simpel Reserveren 3.5.2 and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Upgrade to the latest version of the WordPress Simpel Reserveren plugin (>=3.5.3) or apply a patch provided by the vendor to fix the XSS vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220579a36af30d2c0df77b1a87333faa79c55a54da67b5d0da811b9d6b82341f31602206ca9d4effeb21d3ec18f3fc45b4521f85c3858c053e82b2018634e8378bca29b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022027d53e22d832b3880c76d06a0e6af69830072d99cbf8b1035b0421c4a54d5a22022100f8a4566b8ef3f7095c31722208e0f6437fcceb12c90c0b9432678cffa39621e8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000152.yaml b/http/cves/2016/CVE-2016-1000152.yaml
index d2d909568b..ac10c66468 100644
--- a/http/cves/2016/CVE-2016-1000152.yaml
+++ b/http/cves/2016/CVE-2016-1000152.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress tidio-form1.0 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, leading to potential data theft, session hijacking, or defacement.
remediation: |
Update to the latest version of the Tidio-form plugin (version >1.0) to mitigate the XSS vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100cf0c6816dc7ed072cdcb63497b562c2275e754b4b786907c8885988952f25f9102205f626ac77d8a28e4bbfb11a5e8b32e3124f25f3083a60b2fc1d836a9aebbf931:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202320d71412920e9d5bb1317b2c70d3e0708dbfb6242d91301fd10b31ad22162c02210090da3452e494e75aa9ad342f65882dee43e3d2b2fab580c8eade70c0d9ea42ec:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000153.yaml b/http/cves/2016/CVE-2016-1000153.yaml
index 9380b5cb63..a812814656 100644
--- a/http/cves/2016/CVE-2016-1000153.yaml
+++ b/http/cves/2016/CVE-2016-1000153.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress plugin tidio-gallery v1.1 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the WordPress Tidio Gallery plugin (1.1 or higher) to mitigate this vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221009d659b42461b6c97deb65c6471b827e86b4f56ded7913cc84c7f9a73dbc8b6d9022053504d1ce21adc001c826b17feb3406c726686a57a36a79fd396f216158d409c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f552e23c4102569d6493360038782082f6a830b6e2b760e8e7c431dcf84bcf65022100c183c991d5ae7782bb06b88f5d25624ac861f6e6a79817528f5c23e8b47ab523:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1000154.yaml b/http/cves/2016/CVE-2016-1000154.yaml
index 2b2ea98f07..5292f839a3 100644
--- a/http/cves/2016/CVE-2016-1000154.yaml
+++ b/http/cves/2016/CVE-2016-1000154.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress plugin WHIZZ 1.07 and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Update WordPress WHIZZ plugin to the latest version (>=1.0.8) which includes a fix for the XSS vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210087db94300ef55efc31126909e5822b83c9e9004de55cce12edadfe176f612b10022030883e40efb02dd28860cea7b72eb83747975b9deed69c17dc05302a1a563e95:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c9ecb8d4340a25f3f7d2573227b20d3f7a4e6ef59f3c382d46cc9c53f85730c202206d16f899146ad3747a33306658f7e09d9a5f42f0428834479ca36b8f27cf4050:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10033.yaml b/http/cves/2016/CVE-2016-10033.yaml
index b4d1782198..251d9e949a 100644
--- a/http/cves/2016/CVE-2016-10033.yaml
+++ b/http/cves/2016/CVE-2016-10033.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: critical
description: WordPress PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a " (backslash double quote) in a crafted Sender property in isMail transport.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized remote code execution on the affected WordPress website.
remediation: |
Upgrade PHPMailer to version 5.2.18 or higher to mitigate this vulnerability.
reference:
@@ -63,4 +65,4 @@ http:
- 'Author:(?:[A-Za-z0-9 -\_="]+)?([A-Za-z0-9]+)<\/span>'
internal: true
part: body
-# digest: 490a0046304402207f3231093276f853a1728d5e91ef132567e99cf538f9fb4a5e9816280588e061022058ba45c9c1c77aafdb81f26cc2377cadfb18e31d678756218cb56ac7ab243edf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022059cdbccba12baad07ccef44d1527a3fff3edf6fbe2c982026487c98aa4541d71022064670d4c347cb92cc7115b5b6135502742f281ac0af059d0ac9090ee800de466:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10108.yaml b/http/cves/2016/CVE-2016-10108.yaml
index 54b5e9cece..cdc749070f 100644
--- a/http/cves/2016/CVE-2016-10108.yaml
+++ b/http/cves/2016/CVE-2016-10108.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
Unauthenticated Remote Command injection as root occurs in the Western Digital MyCloud NAS 2.11.142 /web/google_analytics.php URL via a modified arg parameter in the POST data.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, data loss, and potential compromise of the entire network.
remediation: |
Apply the latest firmware update provided by Western Digital to patch the vulnerability and ensure the device is not accessible from the internet.
reference:
@@ -42,4 +44,4 @@ http:
- contains(interactsh_protocol, "dns")
- status_code == 200
condition: and
-# digest: 490a0046304402202a9aba9a22b8cea2aff40d319c80f78f3dae06a1d43ae5b48571c59f8d97c5060220694a4f51b21d5fa3ed6f517f38a03da8b4ae36e4efb07ded59d79ec560671633:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100dbaee698e438bb5ea57042639ff8c9cbcfb0f6e84dd6c329190b34561f45855c022029c504dc2b5ec6477451bb68096c7031a634878f22bc09e71a3c02150f620dc8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10134.yaml b/http/cves/2016/CVE-2016-10134.yaml
index 059dc5ac68..f336d8c25b 100644
--- a/http/cves/2016/CVE-2016-10134.yaml
+++ b/http/cves/2016/CVE-2016-10134.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: critical
description: Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php and perform SQL injection attacks.
+ impact: |
+ Successful exploitation of this vulnerability could lead to unauthorized access, data leakage, and potential compromise of the Zabbix application and underlying systems.
remediation: |
Apply the latest security patches or upgrade to a patched version of Zabbix to mitigate the SQL Injection vulnerability (CVE-2016-10134).
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502203fca6b69808c641d863e945f0c9731775097a3c445c6dc396362e6ddbcbc0fa3022100af3ffe23d77be0d49f6bd61ce78861c4f74054b5b38360ea181111b89d39b1ca:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f961836dd9c8138c996587b4274a1507a43bb914a8115c9b14ebfd61e82d7bc8022022599dbc6ce051c65a9fed1ff8126734d008bc982058429df84ecae4476e7adb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10367.yaml b/http/cves/2016/CVE-2016-10367.yaml
index c58e17e3d2..a247e7ddf1 100644
--- a/http/cves/2016/CVE-2016-10367.yaml
+++ b/http/cves/2016/CVE-2016-10367.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_akoko
severity: high
description: Opsview Monitor Pro prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch is vulnerable to unauthenticated local file inclusion and can be exploited by issuing a specially crafted HTTP GET request utilizing a simple bypass.
+ impact: |
+ An attacker can read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Upgrade to the latest version of Opsview Monitor Pro to fix the local file inclusion vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 404
-# digest: 4a0a0047304502203e2b83033030f8a6171621b67e3bc2c32723488b73ff2bcd4bf9c74f17dd40c7022100ffa48effdcfa403f16f93f9a3b4bb3707b0234105d6e0c00e5b99d8db4cd1e57:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100b384f35bea8369c8043e5008d6034d51fb454683d16807f8672e1b9e745a57fb022100b08cef498081b7daaae50164fbf1f9a90fc0606621467fc85d9bfd2deaf6f017:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10368.yaml b/http/cves/2016/CVE-2016-10368.yaml
index 8cc368fa6d..ff01790df3 100644
--- a/http/cves/2016/CVE-2016-10368.yaml
+++ b/http/cves/2016/CVE-2016-10368.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Opsview Monitor Pro before 5.1.0.162300841, before 5.0.2.27475, before 4.6.4.162391051, and 4.5.x without a certain 2016 security patch contains an open redirect vulnerability. An attacker can redirect users to arbitrary web sites and conduct phishing attacks via the back parameter to the login URI.
+ impact: |
+ An attacker can redirect users to malicious websites, leading to phishing attacks or the download of malware.
remediation: |
Apply the latest patch or upgrade to a version that is not affected by the vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 302
-# digest: 4b0a00483046022100ecbdf540f103d151acceba5ab1000894864ed6f014d43a32563069f9983cb159022100e5e45c2ae46d16e7ab0d2f9a93e8caf25fcc31a1a8dab6f5425d56b94b80e53f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009776ba3db9cbf2e79ed4dbabfb0662340f4862132b82055252979c9fdff78bcf022020a2a76e3d3f5fc0b14ae0ba49a11bf8b41f66fb870282afcf98ee300a306def:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10924.yaml b/http/cves/2016/CVE-2016-10924.yaml
index f12b183fab..4e62d3a64d 100644
--- a/http/cves/2016/CVE-2016-10924.yaml
+++ b/http/cves/2016/CVE-2016-10924.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Wordpress Zedna eBook download prior to version 1.2 was affected by a filedownload.php local file inclusion vulnerability.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server, potentially leading to sensitive information disclosure or remote code execution.
remediation: |
Update to the latest version of the plugin to fix the vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100b8556a608b66a20d71905fe4f1f8701cf500bad5d3bcf4f94d62ee8495b4ba4a0221009092e45f03de41e47b2322d5072718e5efc37b7b21ad2fcda4c0f203720b586e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f5e4573ee0a629024d4991c7d74d8584819a3bc1b340c6997776cd28d3116af002201f9e8bd5418f20ba3c159818d714073f0e700281290f1a794d519371336ff08f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10940.yaml b/http/cves/2016/CVE-2016-10940.yaml
index 7c27ae6f00..3c203a30c5 100644
--- a/http/cves/2016/CVE-2016-10940.yaml
+++ b/http/cves/2016/CVE-2016-10940.yaml
@@ -5,6 +5,8 @@ info:
author: cckuailong,daffainfo
severity: high
description: zm-gallery plugin 1.0 for WordPress is susceptible to SQL injection via the order parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or data manipulation.
remediation: |
Update to the latest version of the zm-gallery plugin or apply the patch provided by the vendor.
reference:
@@ -53,4 +55,4 @@ http:
- 'contains(body_2, " | ")'
- '!contains(body_3, " | ")'
condition: and
-# digest: 490a004630440220714ca1e2b5886b9ebfedbdc8f204f5be9d60f2ce552b068a2701ef850104a9cf022022beba3194fe4e6a207e8e67ee745ffe06b24920ee1cf2f4d50a59d0addab407:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402204099362396e4555f69a7d4857f74ae698a03b3a5db8e54ed829fe71f978db7b6022009679cac44f3f593de368fb42709d1018d3d4d72252df240752b4b83c148803f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10956.yaml b/http/cves/2016/CVE-2016-10956.yaml
index 0d684bea26..d396db3da2 100644
--- a/http/cves/2016/CVE-2016-10956.yaml
+++ b/http/cves/2016/CVE-2016-10956.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo,0x240x23elu
severity: high
description: WordPress Mail Masta 1.0 is susceptible to local file inclusion in count_of_send.php and csvexport.php.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Update WordPress Mail Masta to the latest version or apply the vendor-supplied patch to fix the local file inclusion vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
status:
- 200
- 500
-# digest: 4b0a00483046022100a4fc8befd627e29636b1eb8d2155525344e1b1b3ad38ec471e7367d8e0f11615022100efe6673d75279312da4411012c154b1c622c92dec79b0c5da0de70851c324961:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210090fbf657cf742c244be5eb71d3d735e6aaf25d063cc01129a2e5cfb39fff64b402210087b3728da8dcd11eb4bcde14bd79437131f078ba412cf6096f2ee6e53e7f3820:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10960.yaml b/http/cves/2016/CVE-2016-10960.yaml
index 19f0e71717..10e466d89e 100644
--- a/http/cves/2016/CVE-2016-10960.yaml
+++ b/http/cves/2016/CVE-2016-10960.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: WordPress wsecure plugin before 2.4 is susceptible to remote code execution via shell metacharacters in the wsecure-config.php publish parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected WordPress site.
remediation: |
Update to the latest version of WordPress wSecure Lite plugin (2.4 or higher) to fix the vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022072c8ca7f838d6b539c2734da38594e103b483582ab5b579e3ee665d7ac4a1531022100dca231d274ed5aa8574145974d908f4011cf0597a7a8647ae3078f952c21e054:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202bb949a9a1b2979e231b1722247bfaffe20ce9a18ef186b924814fd84f5ab86a0221009467ecb13104dec66e04313a27f421cf9e50ff0827a0be2ddf670ddaafa3ab72:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10973.yaml b/http/cves/2016/CVE-2016-10973.yaml
index 65543a450c..c01f06744c 100644
--- a/http/cves/2016/CVE-2016-10973.yaml
+++ b/http/cves/2016/CVE-2016-10973.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
The Brafton plugin before 3.4.8 for WordPress has XSS via the wp-admin/admin.php?page=BraftonArticleLoader tab parameter to BraftonAdminPage.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Upgrade to the latest version of the Brafton WordPress Plugin (version 3.4.9 or higher) to mitigate this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- 'contains(body_2, "tab = alert(document.domain);")'
- 'contains(body_2, "Brafton Article Loader")'
condition: and
-# digest: 4b0a00483046022100ea9a12265b4d6d6f114c5d6266b33c2725ee926c56a20439288bc6593a9375f6022100867fec55b47aab973f5debecfe39e6f133ed0a315434e246702234cd35b48173:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220274c8fe4864f25f22fde055c7b74f729cbd20ad92e09493514b7e5eafce9593f022040e51a5e6f0350c7fae9de1ecbe382c2cfb9fbc97f9dfb9c2db2682a23c2891f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-10993.yaml b/http/cves/2016/CVE-2016-10993.yaml
index 0a4f76f709..7989e9ea0d 100644
--- a/http/cves/2016/CVE-2016-10993.yaml
+++ b/http/cves/2016/CVE-2016-10993.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress ScoreMe theme through 2016-04-01 contains a reflected cross-site scripting vulnerability via the s parameter which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patch or update to the ScoreMe Theme to fix the XSS vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100915ccd334c2855595153226aa748a12aa38d949586e117ffac28895b02f483170221009fb77198a6dd92c7d1e86b5e4ebafb332ee94418821edaf5d9712cd817fb4fd3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100c130b02b2c3077341b11b3775c603b866d01c2a6caf462f0cc86a128710fb337022100894c39e5ef40da3e7381fb475feb380e4cc1a4411899df892855bf7bd33a63f9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-1555.yaml b/http/cves/2016/CVE-2016-1555.yaml
index c59aef6189..b8989212d7 100644
--- a/http/cves/2016/CVE-2016-1555.yaml
+++ b/http/cves/2016/CVE-2016-1555.yaml
@@ -5,6 +5,8 @@ info:
author: gy741
severity: critical
description: NETGEAR WNAP320 Access Point Firmware version 2.0.3 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.
+ impact: |
+ Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the affected device.
remediation: |
Apply the latest firmware update provided by NETGEAR to mitigate this vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"
-# digest: 4a0a0047304502205f15f24279a3086b6fdcde410415f69cea354f9c61cc8447928090e38ab5207b022100cc742057a382c9b79537f7394adb8f06d72af594025b101ba6e3959546737b1f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022077431a2a530eaa3b19530f844f0a1c78d83d407a677d6a966ba3860fc99a1bb7022100b0519172142aebe889875162f4cf33b796a8ae6bc585ec0126e608a652318921:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-2389.yaml b/http/cves/2016/CVE-2016-2389.yaml
index a4f45e6e84..d4a93e0e45 100644
--- a/http/cves/2016/CVE-2016-2389.yaml
+++ b/http/cves/2016/CVE-2016-2389.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: SAP xMII 15.0 for SAP NetWeaver 7.4 is susceptible to a local file inclusion vulnerability in the GetFileList function. This can allow remote attackers to read arbitrary files via a .. (dot dot) in the path parameter to /Catalog, aka SAP Security Note 2230978.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage.
remediation: |
Apply the latest security patches and updates provided by SAP to mitigate the vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502200179e8cbaef3488e4932205f1a20bdc92481bd2a464e2dada1e495b91ac134c5022100b98790cb14625be7eccb87dc95c4272b395c16772ff2ebd78930ce2d405b39a2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220509d3f8ae3ae615f3416ca9592bf7c89dbb4dbf02aef851d67b1011dbc51bbf8022100f0bd4f4fe6fd93a9128738a3ce0f331f01ac75012352d36d396a5236d4815a05:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-3081.yaml b/http/cves/2016/CVE-2016-3081.yaml
index 83283144fd..e2f2668964 100644
--- a/http/cves/2016/CVE-2016-3081.yaml
+++ b/http/cves/2016/CVE-2016-3081.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when dynamic method invocation is enabled, allows remote attackers to execute arbitrary code via method: prefix (related to chained expressions).
+ impact: |
+ Remote code execution
remediation: |
Upgrade to Apache Struts version 2.3.20.2, 2.3.24.2, or 2.3.28.1.
reference:
@@ -43,5 +45,4 @@ http:
- type: status
status:
- 200
-
-# digest: 4a0a00473045022100e1ebb3fae89d1a5b8795fb26f9e2008383a7f2f10ab577194335edced597b9a102205f1d835e9210ebfbf66167945cf13b6b6c4e4aae07edf9e4eb6a03b8be24de8c:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502204b3f24fac8ad7e6ba5afae75c8936e7a39429255f8d9c7ec4fe849b7ef43db3f022100da3fef226f57f81f1761c6b8bae43517e38284716a3a32657453c7e23e5de09a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-3088.yaml b/http/cves/2016/CVE-2016-3088.yaml
index a1cd41ca9f..57bd1ccfb3 100644
--- a/http/cves/2016/CVE-2016-3088.yaml
+++ b/http/cves/2016/CVE-2016-3088.yaml
@@ -5,6 +5,8 @@ info:
author: fq_hsu
severity: critical
description: Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request via the Fileserver web application.
+ impact: |
+ An attacker can write arbitrary files on the server, potentially leading to remote code execution.
remediation: |
Upgrade to Apache ActiveMQ version 5.14.0 or later to fix the vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- "status_code_2==200"
- "contains((body_2), '{{rand1}}')"
condition: and
-# digest: 490a004630440220494aaa9509d2a74ac52e74622b1a178598267023ed71ffd954c4245983858ec802202d4e208030c71412b86e979b75f30c4e3d0b03bea5620bcd645bc9cb1064098d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022001ecfed66bc4ca0efb31a68cbc4a3300c51e08e6e4aeb3bb06de1ece1d899a5d0220072340e6dbdb8d59c5ec882a0f8399de19f46c7627bc1d71141d28e44b8f4f9e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-3978.yaml b/http/cves/2016/CVE-2016-3978.yaml
index 390fd75809..8b1d247367 100644
--- a/http/cves/2016/CVE-2016-3978.yaml
+++ b/http/cves/2016/CVE-2016-3978.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: FortiOS Web User Interface in 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting attacks via the "redirect" parameter to "login."
+ impact: |
+ Successful exploitation of this vulnerability could lead to unauthorized access, phishing attacks, and potential data theft.
remediation: |
Apply the latest security patches and updates provided by Fortinet to mitigate the vulnerability.
reference:
@@ -36,4 +38,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-# digest: 4a0a00473045022100ec615a8a6a911ac9ef5114d038bdd327a760e46c9fc165e1ec76ab9378b22bf302201595a3156f4d2fcc1e30612b362bd54b1a091951f1aefab515e8e42f92ac3aa4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022064c0ba89484715a2648d7b4e1b5e4c96a615f57e4559aa4712cd1c31edad4110022058abb2a9ba5472ffadadca662462dae939d740f2b676491d91ce372a351a422e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-4437.yaml b/http/cves/2016/CVE-2016-4437.yaml
index c430596b5a..c50ecad77e 100644
--- a/http/cves/2016/CVE-2016-4437.yaml
+++ b/http/cves/2016/CVE-2016-4437.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
+ impact: |
+ Remote code execution
remediation: |
Upgrade to a patched version of Apache Shiro
reference:
@@ -41,5 +43,4 @@ http:
part: interactsh_protocol
words:
- dns
-
-# digest: 4a0a0047304502200cbc5b2041fd7afe2b7885d370b01cc75256622b7555f4694b7e7f0640988fb7022100cead9be5ab42f847ebf423a34e06b00f0e1bc157fef87ed185a5743ca406299b:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100d6e9353a94ac258937539ed8ff40241674ca73fa8e78941808d2afb343bbb3ce0220533a4998d8ddd00b6627f06783d8a74f2ad7757a0b0b77ac31e1f5dc50898143:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-4975.yaml b/http/cves/2016/CVE-2016-4975.yaml
index 997c1499b4..0d8034c3b6 100644
--- a/http/cves/2016/CVE-2016-4975.yaml
+++ b/http/cves/2016/CVE-2016-4975.yaml
@@ -5,6 +5,8 @@ info:
author: melbadry9,nadino,xElkomy
severity: medium
description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir.
+ impact: |
+ Successful exploitation of this vulnerability can lead to various attacks such as session hijacking, cross-site scripting (XSS), and cache poisoning.
remediation: Upgrade to Apache HTTP Server 2.2.32/2.4.25 or higher.
reference:
- https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975
@@ -36,4 +38,4 @@ http:
part: header
regex:
- '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)'
-# digest: 4b0a00483046022100996081e37869843f800b09d2aaf1b4031251acc4ac5c89ca00d4a35416a4b158022100b77779a8ba52c26337bedeac1634e3752723b0faa5bcaa9fa9dd1014906f0c47:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402201e3d7b1750ea0331f37c87bdb7116e1196954a17c7399a700bf4282b0096b8e102200ffa21c484c0c36e220ad3c635a98bf45206dc33745bcfc70b6d117ccf0d0410:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-4977.yaml b/http/cves/2016/CVE-2016-4977.yaml
index dc2387f3d6..a1d54ee5da 100644
--- a/http/cves/2016/CVE-2016-4977.yaml
+++ b/http/cves/2016/CVE-2016-4977.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: high
description: Spring Security OAuth versions 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5 contain a remote command execution vulnerability. When processing authorization requests using the whitelabel views, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote command execution via the crafting of the value for response_type.
+ impact: |
+ Successful exploitation of this vulnerability can lead to remote code execution, compromising the affected system.
remediation: Users of 1.0.x should not use whitelabel views for approval and error pages. Users of 2.0.x should either not use whitelabel views for approval and error pages or upgrade to 2.0.10 or later.
reference:
- https://github.com/vulhub/vulhub/blob/master/spring/CVE-2016-4977/README.md
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 400
-# digest: 490a00463044022076c8bfc609561bca272ea7837022cc8fc3d6063400c60583ea653426a7e2b36e02202d6849f8ba179919a02b9150bdcccc2f622663cdeb26876f13938bab9c605b9b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ff1e44479b41d4d85fcab05aecb6554934e8ff786e17b401c4fe8d4e05c11291022023d6dfecd2d793de4c86b693a4dae0dafd48f1f50f0a637a5246de292bbcc080:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-5649.yaml b/http/cves/2016/CVE-2016-5649.yaml
index 86f2eb7ba0..f7ee34440c 100644
--- a/http/cves/2016/CVE-2016-5649.yaml
+++ b/http/cves/2016/CVE-2016-5649.yaml
@@ -5,6 +5,8 @@ info:
author: suman_kar
severity: critical
description: NETGEAR DGN2200 / DGND3700 is susceptible to a vulnerability within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. The attacker can then use this password to gain administrator access of the targeted router's web interface.
+ impact: |
+ An attacker can obtain the admin password and gain unauthorized access to the router's settings, potentially leading to further compromise of the network.
remediation: |
Update the router firmware to the latest version, which includes a fix for the vulnerability.
reference:
@@ -50,4 +52,4 @@ http:
regex:
- 'Success "([a-z]+)"'
part: body
-# digest: 4b0a00483046022100d787ee67c60b8f8b09f813ee099409adeedcf3d52f068938c73a72e82943ebb1022100ecb03cec920d5c419016145556addfbb821efbd113fd1b8c4719bdd9d2f06a25:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210096367ea3f8f0ad001aa17817e08f20ccb7fbcb41bc231665852f37d48b3efb3902210087d012ddefb1b99db5fe84e51863aa90315b368ef9dd249da7cbf53747766195:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-6195.yaml b/http/cves/2016/CVE-2016-6195.yaml
index 30a883c950..45ac6e5af8 100644
--- a/http/cves/2016/CVE-2016-6195.yaml
+++ b/http/cves/2016/CVE-2016-6195.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
vBulletin versions 3.6.0 through 4.2.3 are vulnerable to an SQL injection vulnerability in the vBulletin core forumrunner addon. The vulnerability allows an attacker to execute arbitrary SQL queries and potentially access sensitive information from the database.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and potential compromise of the entire system.
remediation: |
Upgrade to a patched version of vBulletin (4.2.4 or later) or apply the official patch provided by the vendor.
reference:
@@ -54,4 +56,4 @@ http:
- 200
- 503
condition: or
-# digest: 4b0a00483046022100e3eec4c06a725ca810e4055a865bd1707314cd5875386748737c17442c29b2c60221009a06fbdc88d5332b64aaaa5261fe28278df3bcd8b16b9ea21dd6cfe6e1a61e5e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022062d8b9c1d7cfb77bc85c8ae92a77df9725867da724d8cb70c78a625caf2b9bef022100ea23f4abaafd298853cd237e31aa79490cddd8d986670715083a4a7c355c8204:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-6277.yaml b/http/cves/2016/CVE-2016-6277.yaml
index 01a08ba3bf..ba2ec75bcc 100644
--- a/http/cves/2016/CVE-2016-6277.yaml
+++ b/http/cves/2016/CVE-2016-6277.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: high
description: NETGEAR routers R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly others allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the affected router, potentially leading to unauthorized access, data theft, or network compromise.
remediation: |
Apply the latest firmware update provided by NETGEAR to mitigate this vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502206e595bee4a9625439b4571e90c01d2283c18727ee3ded0ba304fc32e1afc5146022100b57e59cf5f9038699e056e1d45131b0787a026148b067ce4ce0b8fe6f73fbe4f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d046569d3f45081a6d1082690bb763f2bb9471d9edd05d604e2ae025332a580602206ac62f4933c99a8b9ce07fbe940d958cb4be3dbeb94bc7b926cf5e151ae0199f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-6601.yaml b/http/cves/2016/CVE-2016-6601.yaml
index b5b7564c27..34864c7675 100644
--- a/http/cves/2016/CVE-2016-6601.yaml
+++ b/http/cves/2016/CVE-2016-6601.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: high
description: ZOHO WebNMS Framework before version 5.2 SP1 is vulnerable local file inclusion which allows an attacker to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile.
+ impact: |
+ Successful exploitation of this vulnerability could lead to unauthorized access to sensitive information, remote code execution, or complete compromise of the affected system.
remediation: |
Upgrade to ZOHO WebNMS Framework version 5.2 SP1 or later to mitigate this vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100afbfcd16966f05ea2fcaacee747e1dc1ceed499bc73e96e211f3cdf76dba2c0302204264e82a70862a32a404e800be488075f0f6ac65495a8b2ac73a3774bf13757c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d6a7ed251426703aece365dfadf76c52c44897b708b13b969186c99ed609e3c20220135818f70a4e9778d4d2a4814d6211881eb74797518681bd61b62c2701636334:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-7552.yaml b/http/cves/2016/CVE-2016-7552.yaml
index dade765376..a0a5ec289d 100644
--- a/http/cves/2016/CVE-2016-7552.yaml
+++ b/http/cves/2016/CVE-2016-7552.yaml
@@ -5,6 +5,8 @@ info:
author: dwisiswant0
severity: critical
description: Trend Micro Threat Discovery Appliance 2.6.1062r1 is vulnerable to a directory traversal vulnerability when processing a session_id cookie, which allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to bypass authentication and gain unauthorized access to the appliance.
remediation: |
Apply the necessary patch or update provided by Trend Micro to fix the authentication bypass vulnerability.
reference:
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207ceb5730d987cc31fbe159b26d1db09de118ccc45c9287db85c5ec0e9bddd3a2022100f96c2537509794a887c6899a2f3d17eb23a80f7f848616400065e626343b7167:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100cfb1ffcfa7ecbc13c10c247b31827b1c2b9fbec1e77083749f67234c1a72d5f302210080f97a2c70380af5c9d3824e75ce79dab5c4da9902df724f8a81462a849880cc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-7834.yaml b/http/cves/2016/CVE-2016-7834.yaml
index 2d40348180..6b636062db 100644
--- a/http/cves/2016/CVE-2016-7834.yaml
+++ b/http/cves/2016/CVE-2016-7834.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Multiple SONY network cameras are vulnerable to sensitive information disclosure via hardcoded credentials.
+ impact: |
+ An attacker can gain unauthorized access to the camera and potentially control its functions.
remediation: |
Upgrade to the latest version of the firmware provided by Sony.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 204
-# digest: 4a0a00473045022100d46dc2d1dc6c1c894ac148bb4aa6faf2a32a6f310d6fd79c30e39d689ea01b93022068126eb3da005ad3bf3ee3c82460338481a1a1d031edd54112c099ec8a6b2d5a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210082d3f0d6de5c0422935c4d3732ceaeabdd14ec72112f94834449d829812eea3802202d4b2a08ef863c1b6b7e6e4d2aaaaa7b0e88b9ae60aa9d821bb214529a8b26a4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-7981.yaml b/http/cves/2016/CVE-2016-7981.yaml
index d2d063ee1b..3e1c0bef30 100644
--- a/http/cves/2016/CVE-2016-7981.yaml
+++ b/http/cves/2016/CVE-2016-7981.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
SPIP 3.1.2 and earlier contains a cross-site scripting vulnerability in valider_xml.php which allows remote attackers to inject arbitrary web script or HTML via the var_url parameter in a valider_xml action.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser.
remediation: |
Upgrade SPIP to version 3.1.2 or later to mitigate this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d33738c81f1b35258fc637b24d6b1bdde8405e4043aa5f90f2aafe19beffc7a0022037aed155ff8de44d6e23cb7cca576979a3acdc7b51568a5baafc32889aadff60:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ee6d69587f3d7e7744647a2123e2584e4efbb250643f5afd79e8583815d3c4d102203ae76d70671a78c809781a3b9b3efa56e2c602f9dbf3f8bbd3a2c0a80200dab3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2016/CVE-2016-8527.yaml b/http/cves/2016/CVE-2016-8527.yaml
index 63fea3e921..db4256e76a 100644
--- a/http/cves/2016/CVE-2016-8527.yaml
+++ b/http/cves/2016/CVE-2016-8527.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: Aruba Airwave before version 8.2.3.1 is vulnerable to reflected cross-site scripting.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade Aruba Airwave to version 8.2.3.1 or later to mitigate this vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d8ba2dc245dfcce9b9281971dd8847b12fd0e2da5eff1d8fce9637f9e9ed8e150221008d814343e3252cac0ec416831b4258aed224ab4bfa83179633aae9492fa7c6d2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022012b0a1141fcca2a9e54f57e313f4182fa6798e6f2af153936548f7673366e6dd0221009e7da651f3ed1adaf7b19fc60ec6d3c0763929638bffc85cd0ac398e59e83303:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-0929.yaml b/http/cves/2017/CVE-2017-0929.yaml
index 2ab2315bbe..49bbb457df 100644
--- a/http/cves/2017/CVE-2017-0929.yaml
+++ b/http/cves/2017/CVE-2017-0929.yaml
@@ -5,6 +5,8 @@ info:
author: charanrayudu,meme-lord
severity: high
description: DotNetNuke (aka DNN) before 9.2.0 suffers from a server-side request forgery vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources.
+ impact: |
+ An attacker can exploit this vulnerability to bypass security controls, access internal resources, and potentially perform further attacks.
remediation: |
Upgrade DotNetNuke (DNN) ImageHandler to version 9.2.0 or above.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 500
-# digest: 490a004630440220047248363f5670c5af030ce90f83b623b0ccf2be426942b9e93f4d08eaef132802204b896d409cb4c742f3725283e579e15b7994becae649c0c458a28952d1a653a0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ff0b79bc31995c8c892a88c73b4b8e39e6127e1c68e0b7c55088bbd0a0b98b47022100eb467d39ef61c66d326e7c0e70c7ab0055c54bc06e9fe007641bb1fb0b3ca8e0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-1000029.yaml b/http/cves/2017/CVE-2017-1000029.yaml
index 445aefc725..45a25120e1 100644
--- a/http/cves/2017/CVE-2017-1000029.yaml
+++ b/http/cves/2017/CVE-2017-1000029.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: high
description: Oracle GlassFish Server Open Source Edition 3.0.1 (build 22) is vulnerable to unauthenticated local file inclusion vulnerabilities that allow remote attackers to request arbitrary files on the server.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Apply the latest patches and updates provided by Oracle to fix the LFI vulnerability in GlassFish Server.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022040abe486b4d9478c19246b5e0c5c0dc3e39f52153f0dec74b7c3e689bc57411f022100a9bb22e22cad9236a3e5c741a72cdfa12d6b271b797394b1eedbe764f5314a63:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ebc2b52d2664bfdc3c2a5c0b60ba397dd2ea8df1deb6790fc6e05369babb1967022015da87e67f15d57df93eedd88ce24a06b02b4c6f6e355b6479d1a0020d9be3f8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-1000163.yaml b/http/cves/2017/CVE-2017-1000163.yaml
index 5285a61759..2a7e1cab0b 100644
--- a/http/cves/2017/CVE-2017-1000163.yaml
+++ b/http/cves/2017/CVE-2017-1000163.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Phoenix Framework versions 1.0.0 through 1.0.4, 1.1.0 through 1.1.6, 1.2.0, 1.2.2 and 1.3.0-rc.0 contain an open redirect vulnerability, which may result in phishing or social engineering attacks.
+ impact: |
+ An attacker can craft a malicious URL that redirects users to a malicious website, leading to potential phishing attacks.
remediation: |
Apply the latest security patches or upgrade to a patched version of the Phoenix Framework.
reference:
@@ -35,4 +37,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$'
-# digest: 4a0a00473045022100fbc64d48639e801ba44c18dc1325a7d872ddbd3e2b0d2bc36b1dd7f0a36b9bff0220462e445c4a078c41b3403b39f015f54dd2d3a21556562a51763b3b80d7938fc0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022061d920e4cf0cc267f5422bb075fb85b8a57687a359570425759dc88b3864306702200595972f0d206f6a97d8314e7c9dddcf854272edd6d96c902e7d18d6f88e8133:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-1000170.yaml b/http/cves/2017/CVE-2017-1000170.yaml
index 5a566eaed5..ee195221b2 100644
--- a/http/cves/2017/CVE-2017-1000170.yaml
+++ b/http/cves/2017/CVE-2017-1000170.yaml
@@ -5,6 +5,8 @@ info:
author: dwisiswant0
severity: high
description: WordPress Delightful Downloads Jquery File Tree versions 2.1.5 and older are susceptible to local file inclusion vulnerabilities via jqueryFileTree.
+ impact: |
+ Allows an attacker to include arbitrary local files, potentially leading to unauthorized access or code execution.
remediation: |
Update to the latest version of Delightful Downloads plugin or apply the patch provided by the vendor.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022046566273234bf6caf55c2e12b37d6e9f46394b87962e6ec73df1ad568825497602207fc5466568fcbdb3783cbd890e4fb5fd7e41f5163b1d8af5f2db9e9a88653f41:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100de5bd7b4fece1a9f461df86fbe6bee5fb4e2c4bc26b5f4b2ff803cc8f4fd3302022100dcf0958417769fd56c3b8e04540f8ae5bd0553b4575468f3934ae4b03238cded:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-1000486.yaml b/http/cves/2017/CVE-2017-1000486.yaml
index 9525b9ec00..2cf9fa10b4 100644
--- a/http/cves/2017/CVE-2017-1000486.yaml
+++ b/http/cves/2017/CVE-2017-1000486.yaml
@@ -5,6 +5,8 @@ info:
author: Moritz Nentwig
severity: critical
description: Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Apply the latest security patches or upgrade to a newer version of the Primetek Primefaces application.
reference:
@@ -43,4 +45,4 @@ http:
part: header
words:
- 'Mogwailabs: CHECKCHECK'
-# digest: 490a00463044022002e314cfaca7fbad336a98e81d9f0301405fe12ec2d85b1b60e885a410db60d102203dcb057232a516b0bff1eafd5da9d0ea916ab191da150aa02d0889516423924f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502201e438adbd2f0f976434a17c20b85ec68d50891622dffa3c1fc66e73fb8a175fd022100ac9295f7820226829d4c0a2fc6e91afd23b1d1a64d2aac21d0e8ceb9d383185e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-10075.yaml b/http/cves/2017/CVE-2017-10075.yaml
index 995d6cec64..24fa96063c 100644
--- a/http/cves/2017/CVE-2017-10075.yaml
+++ b/http/cves/2017/CVE-2017-10075.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Oracle Content Server version 11.1.1.9.0, 12.2.1.1.0 and 12.2.1.2.0 are susceptible to cross-site scripting. The vulnerability can be used to include HTML or JavaScript code in the affected web page. The code is executed in the browser of users if they visit the manipulated site.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patches provided by Oracle to fix this vulnerability.
reference:
@@ -53,4 +55,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220473eb381d888be142655f8bc72c44faabfaae5255c3b7e925f7f303d1e9987800220741bf34f88e88d91fd7782b8b7bbdc382cee6b230bfcd34a96b79b38590593b2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022050ddeab295f0f5b5ff2229fef47015ce60eb9b662eacbf82e4dcb694ece4de6502202f1447ddd180742a71065e40076b599f04cf262abb649f58dde5c639bb869416:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-10271.yaml b/http/cves/2017/CVE-2017-10271.yaml
index 96c51bcd7d..0f5c302d38 100644
--- a/http/cves/2017/CVE-2017-10271.yaml
+++ b/http/cves/2017/CVE-2017-10271.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
The Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent - WLS Security) is susceptible to remote command execution. Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. This easily exploitable vulnerability allows unauthenticated attackers with network access via T3 to compromise Oracle WebLogic Server.
+ impact: |
+ Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands with the privileges of the WebLogic server.
remediation: |
Apply the latest security patches provided by Oracle to fix this vulnerability. Additionally, restrict network access to the WebLogic server and implement strong authentication mechanisms.
reference:
@@ -105,4 +107,4 @@ http:
- body == "{{randstr}}"
- status_code == 200
condition: and
-# digest: 4b0a00483046022100a50a9fe5ab31b66ce65d3212b8e06c7942e5486daf1f1cdea73182f55500e472022100fba14ba0b63db30bbb8aeec39ce576742052bc2b3e8002c90fa4e5a772b8a588:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206f8a3318a5178a1d1d2ca24d6d105aa876b6dd510d9149d5df85dba577aca50c022100ebbb5d8cfb0f8e7b98248f30d09f63424829c1cefc596451f1844a9a34b3f10e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-10974.yaml b/http/cves/2017/CVE-2017-10974.yaml
index 2b395e8634..f975386b4a 100644
--- a/http/cves/2017/CVE-2017-10974.yaml
+++ b/http/cves/2017/CVE-2017-10974.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: high
description: Yaws 1.91 allows unauthenticated local file inclusion via /%5C../ submitted to port 8080.
+ impact: |
+ The vulnerability allows an attacker to include local files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Upgrade to a patched version of Yaws or apply the necessary security patches.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100dee066eb4122385b57e6ed1da27819aca19a9d503641f092b847b25400065c87022100eba9aa31fc122276dfa41385bff232da6cff2ef0671cb594f3ce13c4268d5999:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e2504e94cb3256d100e4734abc2ba9a84bb35c72e8615dc357f3953b7d27f4fa022100baeb2dfd9a3fdcf5722eb171c77da94ab1da7e6d556ad4bbf50515b0b5fc93f1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-11165.yaml b/http/cves/2017/CVE-2017-11165.yaml
index 7f63e4c678..e0bbec12a0 100644
--- a/http/cves/2017/CVE-2017-11165.yaml
+++ b/http/cves/2017/CVE-2017-11165.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
DataTaker DT80 dEX 1.50.012 is susceptible to information disclosure. A remote attacker can obtain sensitive credential and configuration information via a direct request for the /services/getFile.cmd?userfile=config.xml URI, thereby possibly accessing sensitive information, modifying data, and/or executing unauthorized operations.
+ impact: |
+ Successful exploitation of this vulnerability could lead to unauthorized access to sensitive data, potentially compromising the confidentiality of the system.
remediation: |
Apply the latest firmware update provided by the vendor to mitigate the information disclosure vulnerability.
reference:
@@ -51,4 +53,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022059ed64c6cdf3c80232c0d929b48e34ad528175e2f7de3e8e0d8b2d5f3cfe914a022100def77f94ad441f708244770ac084bf4fe14b7255a86b034efa19843d59c96328:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022019205ca83cef3686b86bdea2d1d6d55fca0a091cf4d20750bc9ac7a855c782d1022100cdb0e22a20379b83984d0f9262a93b39f8e4def23b5bb88ced1496d67433d7e8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-11444.yaml b/http/cves/2017/CVE-2017-11444.yaml
index 9e505cca66..0891277a11 100644
--- a/http/cves/2017/CVE-2017-11444.yaml
+++ b/http/cves/2017/CVE-2017-11444.yaml
@@ -5,6 +5,8 @@ info:
author: dwisiswant0
severity: critical
description: "Subrion CMS before 4.1.5.10 has a SQL injection vulnerability in /front/search.php via the $_GET array."
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data manipulation, or data leakage.
remediation: |
Upgrade Subrion CMS to version 4.1.5.10 or later to mitigate this vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c687b61635bc5930f816499ef56eac71580e9474d9848316cf15764bf9ac7f34022100a3da2b81578462c00feb4e4bfd5844ed1592eb84e812bbe37ba51a09e4868baa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221008eff8bb67d6080ac5ee0969d2417d4ddedb9265dc1ceebeaf37e63f14e89084002206841f4b09ccd220bb86a61610bb96f6e672d3ff3902b9cc22fc59865c1bdca0f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-11512.yaml b/http/cves/2017/CVE-2017-11512.yaml
index ca8234c61f..1b63024fa1 100644
--- a/http/cves/2017/CVE-2017-11512.yaml
+++ b/http/cves/2017/CVE-2017-11512.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
ManageEngine ServiceDesk 9.3.9328 is vulnerable to an arbitrary file retrieval due to improper restrictions of the pathname used in the name parameter for the download-snapshot path. An unauthenticated remote attacker can use this vulnerability to download arbitrary files.
+ impact: |
+ An attacker can access sensitive files on the server, potentially leading to unauthorized access or data leakage.
remediation: |
Upgrade to a patched version of ManageEngine ServiceDesk 9.3.9328 or apply the necessary security patches.
reference:
@@ -43,4 +45,4 @@ http:
- "fonts"
- "extensions"
condition: and
-# digest: 4a0a0047304502206efcae3ac42238f6b1ad19447bf0c214516282926de4b26252554b64730fbc0c022100d26f6372b8542b2ec05ee13e65b9077c1c2d6ebbc2498ceb609c0f765e6ee1e6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009a11bee4341c7d482f5babbe13b08d1d8bf6f0228f61c299529ea583a585bfb2022100c38b3339d4f136c7b103e46cf1790e1bff89046995ac16d1a1206b25d655f46f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-11586.yaml b/http/cves/2017/CVE-2017-11586.yaml
index c9025874c7..f0b55d14ce 100644
--- a/http/cves/2017/CVE-2017-11586.yaml
+++ b/http/cves/2017/CVE-2017-11586.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
FineCMS 5.0.9 contains an open redirect vulnerability via the url parameter in a sync action. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks.
remediation: |
Upgrade to FineCMS version 5.0.9 or later to fix the open redirect vulnerability.
reference:
@@ -43,4 +45,4 @@ http:
part: header
regex:
- 'Refresh:(.*)url=http:\/\/interact\.sh'
-# digest: 4a0a00473045022100e8637f367b70e444ea391c42896ccf9f3bab28efbc656f72968145b0d5d32bfe02203a8bf9c4e5aa784b08a45d761fac731fe7aadc7aab7339940b98d4232149dc21:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502200a288e1dfe635d530db31748963e18fb235ec812796d8fea798f66b4e7da6f9c02210087716d81e3cbea58b9591e7cbf94adfdbcb55989feead96259dc70f6e5e35f8e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-11610.yaml b/http/cves/2017/CVE-2017-11610.yaml
index 4878dcc24d..f71e5d3ec6 100644
--- a/http/cves/2017/CVE-2017-11610.yaml
+++ b/http/cves/2017/CVE-2017-11610.yaml
@@ -5,6 +5,8 @@ info:
author: notnotnotveg
severity: high
description: The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisor namespace lookups.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
remediation: |
Apply the latest security patches or disable the XML-RPC server if not required.
reference:
@@ -63,4 +65,4 @@ http:
- ""
- ""
condition: and
-# digest: 4a0a0047304502200e1c758f8af3b185de6c1eabbce1e4c8ff48fc9f735165c9e5fbf7d4773d6c6b022100a2ffae5cc927593094e883d7cb05c8d97fa23bbd3bcdafe4f0c2362a01ed0f86:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402204ef086474fdf3360ffea88f485401d4881f41840d507f8f85b7c57f278851e9602200bf5729901fca3960b3c5da15dce3fd420fedcd63830b0be8a46bf12317c5b1c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-11629.yaml b/http/cves/2017/CVE-2017-11629.yaml
index f9c9967f5c..8701e5c9e5 100644
--- a/http/cves/2017/CVE-2017-11629.yaml
+++ b/http/cves/2017/CVE-2017-11629.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
FineCMS through 5.0.10 contains a cross-site scripting vulnerability in controllers/api.php via the function parameter in a c=api&m=data2 request.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version of FineCMS (>=5.0.11) which includes a fix for this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b648034bbb741fbbdab76b46837240b7ec0a80c978b8395bc3f8ba086c08c4c302203ad707941844a25d6103f0697998f0ba32382e8748d3e98ac0c0d1ec0bb90596:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100c81fea3ebed14c3fd70428d6e9ebbd8af684e80acdce8a8bdf5f930a5e5cf8a7022100f233ec900fb928a1d116b54b2b5f954720aabf9289325db0217ceb2ccdad2658:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12138.yaml b/http/cves/2017/CVE-2017-12138.yaml
index d7c3537b0c..00f0b979df 100644
--- a/http/cves/2017/CVE-2017-12138.yaml
+++ b/http/cves/2017/CVE-2017-12138.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: XOOPS Core 2.5.8 contains an open redirect vulnerability in /modules/profile/index.php due to the URL filter. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the installation of malware.
remediation: |
Apply the latest security patch or upgrade to a newer version of XOOPS Core to fix the open redirect vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-# digest: 4a0a00473045022042d21d495469a2cdc93551e25c6d7a996124288651217a4a0a66101fa1127c5a02210090750895d799d1d2d6d277aaee2b8862824cbdcd2065f115cd6cae4e0c317734:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100fa67c1c9e88397fd853139dbf1cf93c9db6d998bc497150038c42f861347335c022100f2d652a8676912e3eaf0249b9966b28f683a18d17f60ea69b2db7e419d2f4806:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12149.yaml b/http/cves/2017/CVE-2017-12149.yaml
index d98c2171f7..f18f626b3c 100644
--- a/http/cves/2017/CVE-2017-12149.yaml
+++ b/http/cves/2017/CVE-2017-12149.yaml
@@ -5,6 +5,8 @@ info:
author: fopina,s0obi
severity: critical
description: Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2 is susceptible to a remote code execution vulnerability because the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization, thus allowing an attacker to execute arbitrary code via crafted serialized data.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized remote code execution on the affected server.
remediation: |
Apply the latest security patches and updates provided by Jboss to fix this vulnerability.
reference:
@@ -59,4 +61,4 @@ http:
status:
- 200
- 500
-# digest: 4b0a00483046022100c5a8d7d785b7fc8de478ef07ef74dcd47f45c142749daf2b4631d2c4bf529ef1022100ac06bc8685d37d64a1e9d24b909681681aa50d344ea702981ce36addc237d142:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100961026dd21b97de42852865d8eb6aaa1ebb31720de258aebea0d83a1dbbd595d022100a9f2f0d3fcb726ea029f816a68cc1c99d117a3d651a96c66a803b66bc242c625:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12542.yaml b/http/cves/2017/CVE-2017-12542.yaml
index 3c74c1e1d5..8508cc091f 100644
--- a/http/cves/2017/CVE-2017-12542.yaml
+++ b/http/cves/2017/CVE-2017-12542.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: critical
description: HPE Integrated Lights-out 4 (iLO 4) prior to 2.53 was found to contain an authentication bypass and code execution vulnerability.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to bypass authentication and gain unauthorized access to the affected system.
remediation: |
Upgrade HPE Integrated Lights-out 4 (ILO4) to version 2.53 or later to mitigate this vulnerability.
reference:
@@ -49,4 +51,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402204c003302d7715f4d7c30328fa9e7a9c01540b2a27ecf48293bbc888db3fa49de0220380d79d47def11781b839e8655f588af244c3a08cfe77a334da6aa359b4c0a7b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502201a3e346c6a6b738d9fb52450d9452caafc3f26834b4e89d9df767b914c5efa0c02210089ea3b0ea81e681b48bb853890215506d457b8ea5f1a435889b6707ffeb66ce8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12544.yaml b/http/cves/2017/CVE-2017-12544.yaml
index 7505138950..cf6253daa0 100644
--- a/http/cves/2017/CVE-2017-12544.yaml
+++ b/http/cves/2017/CVE-2017-12544.yaml
@@ -5,6 +5,8 @@ info:
author: divya_mudgal
severity: medium
description: HPE System Management contains a cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected user's browser.
remediation: |
Apply the latest security patches or updates provided by HPE to fix the XSS vulnerability in the System Management software.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220386130f8e942a4e3455a38c2980b391a2b04f492c2712a9a04183905e59a6009022100b92e18a4c85d8537a68fca3d5630476c8ff64c846583fb35b3635ef8c05c0815:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009ba13cf1e72902ee275f6c64e70a38b140fefdc045ec966b97e51bc344a4326a022100b825422e8bf3e1bc8b51128e2b3a870d62954d118b05ea1ad5ce48b8cd1576e7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12583.yaml b/http/cves/2017/CVE-2017-12583.yaml
index 0704f6679b..5d9570fd9c 100644
--- a/http/cves/2017/CVE-2017-12583.yaml
+++ b/http/cves/2017/CVE-2017-12583.yaml
@@ -5,6 +5,8 @@ info:
author: DhiyaneshDK
severity: medium
description: DokuWiki through 2017-02-19b contains a cross-site scripting vulnerability in the DATE_AT parameter to doku.php which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version of DokuWiki or apply the provided patch to fix the XSS vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220683596bac35536039f20773ecf109c76c8e178d1f037c135e47ed95936bd4dd1022050ab97bf5135e539634f038b6c43866e8a9dac0209d7e9d1e391def5568c7a60:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402200fa8898e1cf51cd31c5984c45336ece80f13eaeb8be7ba824990411e3382e2c10220221edd6505e87f366ad460007521cfae0cb356c6f80b9aac14426ecb5f7fd9e7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12611.yaml b/http/cves/2017/CVE-2017-12611.yaml
index 027734ce75..55346d4a7c 100644
--- a/http/cves/2017/CVE-2017-12611.yaml
+++ b/http/cves/2017/CVE-2017-12611.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: critical
description: Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1 uses an unintentional expression in a Freemarker tag instead of string literals, which makes it susceptible to remote code execution attacks.
+ impact: |
+ Remote code execution
remediation: |
Apply the latest security patches or upgrade to a non-vulnerable version of Apache Struts2.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d188cf2f02f9c4fdabc65020e1a4b6a07007919eec94ae6f24e918db33e4dd12022100e63fbd24352343f6c19017e86ae21100df4d97fd5c6378eda0293281ed485cd9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022051cf097709453b12f0cc29e773f45c31c2b20072297945baec3738f572736d86022100eaa8fbf9eda6e1e35f8c7656e278984ce520120d8708b9acd39fc5dd1c9b36b9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12615.yaml b/http/cves/2017/CVE-2017-12615.yaml
index c65cee3585..398bdf9076 100644
--- a/http/cves/2017/CVE-2017-12615.yaml
+++ b/http/cves/2017/CVE-2017-12615.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Apache Tomcat servers 7.0.{0 to 79} are susceptible to remote code execution. By design, you are not allowed to upload JSP files via the PUT method. This is likely a security measure to prevent an attacker from uploading a JSP shell and gaining remote code execution on the server. However, due to the insufficient checks, an attacker could gain remote code execution on Apache Tomcat servers that have enabled PUT method by using a specially crafted HTTP request.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the affected server.
remediation: |
Apply the latest security patches or upgrade to a non-vulnerable version of Apache Tomcat.
reference:
@@ -67,4 +69,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402203976c11bb605ad5c0f1941c384f3d3d0c70c42e63d1af82b275002833e0cdf68022054a43b54d602a4025b2b1efd35fafaafcdce592f56319b84955d190aea95cc7f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e80d5d21eaa1b74a5c141cd029262af7130c1f34c5b0459e6f24674e7c72ca4d02206226f184519ceb0746fde9a5297b181c8c2b920c0ee57a54f4cbbb7bee9a10bf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12617.yaml b/http/cves/2017/CVE-2017-12617.yaml
index 3d513983d7..9074f5f73d 100644
--- a/http/cves/2017/CVE-2017-12617.yaml
+++ b/http/cves/2017/CVE-2017-12617.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
+ impact: |
+ Successful exploitation of this vulnerability allows remote attackers to execute arbitrary code on the affected server.
remediation: |
Upgrade to Apache Tomcat version 7.0.80 or later to mitigate this vulnerability.
reference:
@@ -51,4 +53,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220119141c390b49ed4c9d5cc9b397f2002cfbee8c1889db8b4ff119b16653befa20221009e45e2f700c5f838965ab2b2d945392d13378d689202ccc07fcdb96ca976a429:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022071dd9ceebc684a86c7228090991c25617ba66553c9eec6ee5f11e443ff2547ed0220218ceb7e4518153d87360260c9296f3d59d2c55be49855e35f62e9d2a89f053d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12629.yaml b/http/cves/2017/CVE-2017-12629.yaml
index 7927987122..f3d37d4cd4 100644
--- a/http/cves/2017/CVE-2017-12629.yaml
+++ b/http/cves/2017/CVE-2017-12629.yaml
@@ -5,6 +5,8 @@ info:
author: dwisiswant0
severity: critical
description: Apache Solr with Apache Lucene before 7.1 is susceptible to remote code execution by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.
+ impact: |
+ Successful exploitation of this vulnerability could lead to information disclosure, denial of service.
remediation: |
Upgrade to a patched version of Apache Solr (7.2 or higher) or apply the recommended security patches.
reference:
@@ -49,4 +51,4 @@ http:
regex:
- '"name"\:"(.*?)"'
internal: true
-# digest: 4a0a004730450221009508d98bfcd14ef3d742a1be5863ba58100701dc10cb3827f7f67e65dd88797502200df636f509346d2b892b8b8da770d5a3714c60cdcf1600532b537b15f22ac3dd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205ff3b10fb167431b4e908557875123ac30c0ac74a17397bd111623259b056e24022100ac61faf3402994f493e17f6c487d49f3c0b7b1bdca2eacae7394b4d639c677bc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12635.yaml b/http/cves/2017/CVE-2017-12635.yaml
index 139aa388c8..43623e793f 100644
--- a/http/cves/2017/CVE-2017-12635.yaml
+++ b/http/cves/2017/CVE-2017-12635.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: critical
description: Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keysfor 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behavior that if two 'roles' keys are available in the JSON, the second one will be used for authorizing the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.
+ impact: |
+ Remote attackers can exploit this vulnerability to escalate privileges.
remediation: |
Upgrade Apache CouchDB to version 2.1.1 or later.
reference:
@@ -61,4 +63,4 @@ http:
status:
- 201
- 409
-# digest: 4a0a004730450220668cb0008ed69e186b3dac62ae2a1b5b2cf39235b4f8af09f1be4b8a9e5e4704022100d5f6614dda6e2af4941e598113eb6ff43733529271f581287cea171795977914:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022062e948131457520bf5719b89023b98b4fd948ebc16f8fcfaf5fa88628105402102202c73f0347a1ac0f0b49dd102d966e0f21fdf1db2a9b537508c6a12a202ab61c1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12637.yaml b/http/cves/2017/CVE-2017-12637.yaml
index ad72092f56..cc69e3f2c3 100644
--- a/http/cves/2017/CVE-2017-12637.yaml
+++ b/http/cves/2017/CVE-2017-12637.yaml
@@ -5,6 +5,8 @@ info:
author: apt-mirror
severity: high
description: SAP NetWeaver Application Server Java 7.5 is susceptible to local file inclusion in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS. This can allow remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access, data leakage, and potential system compromise.
remediation: |
Apply the latest security patches and updates provided by SAP to fix the LFI vulnerability in SAP NetWeaver Application Server Java 7.5.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bea8f103f782f283209cc58274ae864a0eb67d6f9d539175d776344091a9204c02210088e6594ed493ed4629f2e1bd1577cf6dbbe86410db2b75403918a8fa4932b010:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100a8683657514f719b732f05c7f6d45ec7dfa7e1e84cfb94bc48f4f48dfb98d72b022100c7903e2a07cc85ba954eac808f177b137a97309cdafbe60db6302fde5ed5c8bf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-12794.yaml b/http/cves/2017/CVE-2017-12794.yaml
index 666c0f21eb..ab73021ea5 100644
--- a/http/cves/2017/CVE-2017-12794.yaml
+++ b/http/cves/2017/CVE-2017-12794.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5 has HTML autoescaping disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allows a cross-site scripting attack. This vulnerability shouldn't affect most production sites since run with "DEBUG = True" is not on by default (which is what makes the page visible).
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of Django or apply the necessary security patches provided by the Django project.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402204bf285deaadc3fe0b915d412d086a45be71be916df777b449d2ef9880f3b966e02206b7a58203911694f3198b021356334ec4df4f3a0378f7b96fc474668a749bfc5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100c3e6f228ecb88b45dede1fdb09bc0de8eb69e3910bef23a8b392cc658b900416022100f5764bd903049f446e74a2490b9686da2809edffc40fba47ccd1bacfc8051eb7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-14135.yaml b/http/cves/2017/CVE-2017-14135.yaml
index f35e60d4c2..c70116e62b 100644
--- a/http/cves/2017/CVE-2017-14135.yaml
+++ b/http/cves/2017/CVE-2017-14135.yaml
@@ -5,6 +5,8 @@ info:
author: alph4byt3
severity: critical
description: OpenDreambox 2.0.0 is susceptible to remote code execution via the webadmin plugin. Remote attackers can execute arbitrary OS commands via shell metacharacters in the command parameter to the /script URI in enigma2-plugins/blob/master/webadmin/src/WebChilds/Script.py.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
remediation: |
Apply the latest security patches or upgrade to a patched version of OpenDreambox.
reference:
@@ -50,4 +52,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221009a970d16fc5829edc967ada93be00fe47cb0b5b6fe52e071231600693b38152a022076f49389649e053f3a74d18b3de2f6d23a00c0c7b38c38b5000f4b75d91945b3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220157cb388a5c368f67fd096a8be0f564c05cba5a2904f26d045b060193aef26a3022008e6bb9ac07464019fc095732ee47003a68d85f4d3fb0dcbc9b69afe4e813713:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-14186.yaml b/http/cves/2017/CVE-2017-14186.yaml
index db33dd26e6..3da75fbe4d 100644
--- a/http/cves/2017/CVE-2017-14186.yaml
+++ b/http/cves/2017/CVE-2017-14186.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
FortiGate FortiOS through SSL VPN Web Portal contains a cross-site scripting vulnerability. The login redir parameter is not sanitized, so an attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks such as a URL redirect. Affected versions are 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, and 5.4 and below.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, data theft, or defacement.
remediation: |
Apply the latest security patches or firmware updates provided by Fortinet to mitigate this vulnerability.
reference:
@@ -50,4 +52,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d375f7887413f53f6be88ca0a07b20a61c8f913e8e492c1d503bc1fa7dbb1b16022100e0ea8c4a597674bf28a80947a31d99e0fd825b61de1200ae747d1b54bfab94ff:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022033e095c75c7ee5b5d4ff29049155c01dbe8b0adb0045f1f654f97d384138498302207247708359a6d804ac67feddbddc4ea3be54223fa25cc7f030bc91e32d323fa7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-14524.yaml b/http/cves/2017/CVE-2017-14524.yaml
index 1d2ced86c4..7d2a1c2af1 100644
--- a/http/cves/2017/CVE-2017-14524.yaml
+++ b/http/cves/2017/CVE-2017-14524.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
OpenText Documentum Administrator 7.2.0180.0055 is susceptible to multiple open redirect vulnerabilities. An attacker can redirect a user to a malicious site and potentially obtain sensitive information, modify data, and/or execute unauthorized operations.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the download of malware.
remediation: |
Apply the latest security patches or upgrade to a patched version of OpenText Documentum Administrator.
reference:
@@ -37,4 +39,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?oast\.me(?:\s*?)$'
-# digest: 490a0046304402207974a3aefbb9a4075af20d0b9e527322841ab79789ec1040be875069aa4c882602207a59c2f1def28dfe7db8f63cda2a8bb9b0ddfe0e44a42db27487f589b2651cac:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220619f2ba461299fea2ef0aa4ee538657a6afcd1ec712499bf7ee16308cfbbcf42022055bc3bd8d4f45b3f53ff97de7cd4037a12ed3b24b776f6178d7eca86288fc6cc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-14535.yaml b/http/cves/2017/CVE-2017-14535.yaml
index 4bdcd3bd91..daac719fd7 100644
--- a/http/cves/2017/CVE-2017-14535.yaml
+++ b/http/cves/2017/CVE-2017-14535.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: high
description: Trixbox 2.8.0.4 is vulnerable to OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized remote code execution, compromising the confidentiality, integrity, and availability of the affected system.
remediation: |
Upgrade to a patched version of Trixbox or apply the necessary security patches provided by the vendor.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402200e1eea6041c5695c251491fd2fca30a07c170f636a8d197bcf9bd104ecbbeca3022051a4563a172168f8b9e365d307629a3809a78c4f4bbfcbaacd840281197e13ed:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ca2eeb51d69833fce729ea7bccda8dcd482fc9561d5790e03a4a0a866b49cb30022100d971de87dda13d5f12f2d03ad203e5ff11adcac44cf8bb5ffd3bf915bf7f3d4e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-14537.yaml b/http/cves/2017/CVE-2017-14537.yaml
index eccc4b07e0..168b15f886 100644
--- a/http/cves/2017/CVE-2017-14537.yaml
+++ b/http/cves/2017/CVE-2017-14537.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: Trixbox 2.8.0.4 is susceptible to path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read arbitrary files on the server.
remediation: |
Apply the latest security patches or upgrade to a newer version of Trixbox to mitigate this vulnerability.
reference:
@@ -56,4 +58,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022100f44828302f807f47f81672227bf0f6e606d4cdc0083c91dfa7dc747b31e0c77f021f4042da9e9c19854e245f4c1a8824b57b4915137d5e3d1301ff05cd286ca883:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ce798eebc2e3146f836802ce53f92d76f694ba17ff0de6da85a6da34fb64153302203847448c352b718f2bbaf5fc50b231f4442e16c21728227241168cb38bce5995:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-14622.yaml b/http/cves/2017/CVE-2017-14622.yaml
index b3544b4da3..f057b6a698 100644
--- a/http/cves/2017/CVE-2017-14622.yaml
+++ b/http/cves/2017/CVE-2017-14622.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress 2kb Amazon Affiliates Store plugin before 2.1.1 contains multiple cross-site scripting vulnerabilities. The plugin allows an attacker to inject arbitrary web script or HTML via the (1) page parameter or (2) kbAction parameter in the kbAmz page to wp-admin/admin.php, thus making possible theft of cookie-based authentication credentials and launch of other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential theft of sensitive information or unauthorized actions.
remediation: |
Update the WordPress 2kb Amazon Affiliates Store plugin to version 2.1.1 or later to mitigate the vulnerability.
reference:
@@ -50,4 +52,4 @@ http:
- 'contains(body_2, "")'
- 'contains(body_2, "2kb-amazon-affiliates-store")'
condition: and
-# digest: 4b0a00483046022100fb7c73f09f8db22ee3cf9e6096885624eda8e37fb5cdd44984e299bfdefb8128022100b0587c2d8d259fb63fbf42651f23046f8c27c8f154155f388d7925b1ede164a6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100fbe2638f2197d98f6d17eb8b14bba6aa3881a5802b758b859ef22d3cf902ad1802202ccb86f4fbc0b324795230c7d5844c8b3c46f39b812249c4a3820fae2582d5c9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-14651.yaml b/http/cves/2017/CVE-2017-14651.yaml
index 5393a47303..bbba668241 100644
--- a/http/cves/2017/CVE-2017-14651.yaml
+++ b/http/cves/2017/CVE-2017-14651.yaml
@@ -5,6 +5,8 @@ info:
author: mass0ma
severity: medium
description: WSO2 Data Analytics Server 3.1.0 is susceptible to cross-site scripting in carbon/resources/add_collection_ajaxprocessor.jsp via the collectionName or parentPath parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of WSO2 Data Analytics Server or apply the necessary security patches provided by the vendor.
reference:
@@ -44,4 +46,4 @@ http:
part: header
words:
- "text/html"
-# digest: 4b0a00483046022100ef1a1aba953c410e67689e521749bca385790a45a5ae9426253dcff2b7b2be60022100b6e4dcb3c03570487e047d25e697d365c595799a0c856ba5f39cc4cb2eadb1e8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008b07f1f6dcdfb99425fda0917bc8613751fe16d663a0297826b0a3db4fe14afb022100f68ca3c53fdaa80a532ad2f794369719807edae411100178d0cf5c20baeff1ba:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-14849.yaml b/http/cves/2017/CVE-2017-14849.yaml
index fd308219a5..ab037ec119 100644
--- a/http/cves/2017/CVE-2017-14849.yaml
+++ b/http/cves/2017/CVE-2017-14849.yaml
@@ -5,6 +5,8 @@ info:
author: Random_Robbie
severity: high
description: Node.js before 8.6.0 allows remote attackers to access unintended files because a change to ".." handling is incompatible with the pathname validation used by unspecified community modules.
+ impact: |
+ An attacker can read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Upgrade Node.js to version 8.6.0 or higher to mitigate the vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022017aaba785bb8a91d8344c38c42086c80a2fe3f243869b59b1239ac2f0bb53a3e022077e738f0b7713d0c09936f28508d59aba8e0bc3da4a7ed8da462d6111302ac77:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100d32e38e5c77d87ed4bf896dd4bdb9cdeee769be08f7fe2c698966d8ea053bbd3022100c83aa53a1e9d9a971011fe65d379b05b8f17d1ea1447f85808530b7f72493086:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-15287.yaml b/http/cves/2017/CVE-2017-15287.yaml
index 755c8555ed..d8bc45f000 100644
--- a/http/cves/2017/CVE-2017-15287.yaml
+++ b/http/cves/2017/CVE-2017-15287.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Dream Multimedia Dreambox devices via their WebControl component are vulnerable to reflected cross-site scripting, as demonstrated by the "Name des Bouquets" field, or the file parameter to the /file URI.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of Dreambox WebControl or apply appropriate input sanitization to prevent XSS attacks.
reference:
@@ -38,4 +40,4 @@ http:
- type: word
words:
- 'Unknown command: '
-# digest: 4a0a00473045022100db07aff63a597eab76e353f2ad7a35a7f5e54367c4c8da9075442dbf2f880948022018899463fc4e8ff0d5d597f9c15fe87abe28012ce9aced07ada493741ac9c407:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e93abdf24d9ebdfb400623b4a62901a6d7de1500c413707c694dafbc1281f705022100a25758a51d9bdecfb6f21cf981b25d44c7004255d0138a81424d72c178aab165:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-15363.yaml b/http/cves/2017/CVE-2017-15363.yaml
index 988d423e76..c0b652cc0b 100644
--- a/http/cves/2017/CVE-2017-15363.yaml
+++ b/http/cves/2017/CVE-2017-15363.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: high
description: Luracast Restler 3.0.1 via TYPO3 Restler 1.7.1 is susceptible to local file inclusion in public/examples/resources/getsource.php. This could allow remote attackers to read arbitrary files via the file parameter.
+ impact: |
+ The vulnerability allows an attacker to include local files, potentially leading to unauthorized access or code execution.
remediation: |
Update to the latest version of Restler and TYPO3 to fix the vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100b5dc466cbf54f54cf3e790af8f1f9b4e330559dcc25ebfa4c36a5e22e51dce6c0221008166bc08bfc7d1a54d9caeb1ee2d9f5cc908b2c8d3628b88dbdb7a9eb98f9c30:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220165ac278ba5a144b4ba8c0f774c904786c78a06bab7f65678eb9029af132ab8e0221009bb15f6f3a88dc6fee5e3a0a6a33ab8aecdd4131dc407ae5e2fd5b159fe9d332:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-15647.yaml b/http/cves/2017/CVE-2017-15647.yaml
index 873c8722ba..6fde3c1850 100644
--- a/http/cves/2017/CVE-2017-15647.yaml
+++ b/http/cves/2017/CVE-2017-15647.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: FiberHome routers are susceptible to local file inclusion in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the system, potentially leading to unauthorized access or information disclosure.
remediation: |
Apply the latest firmware update provided by FiberHome to fix the LFI vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ded4d3e22ba62dab364dddc8b6f251198189d6597492f45fb7d43afe1170523b022100c03dfe3310774e68395881261da7c5eec7af3319a376c1912f511bdec32acd0c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100b99b21136a7da51f6fde99bc313826c8e0cf6163b5eb0a1cd9f60058b9a2d9f302204c93df9c5308f861f92fd50798727bc52f8e0cfa37123bd8f35d83d8cf416c87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-15715.yaml b/http/cves/2017/CVE-2017-15715.yaml
index cd55dc6486..1ee0b87025 100644
--- a/http/cves/2017/CVE-2017-15715.yaml
+++ b/http/cves/2017/CVE-2017-15715.yaml
@@ -4,8 +4,9 @@ info:
name: Apache httpd <=2.4.29 - Arbitrary File Upload
author: geeknik
severity: high
- description: |
- Apache httpd 2.4.0 to 2.4.29 is susceptible to arbitrary file upload vulnerabilities via the expression specified in , which could match '$' to a newline character in a malicious filename rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are externally blocked, but only by matching the trailing portion of the filename.
+ description: Apache httpd 2.4.0 to 2.4.29 is susceptible to arbitrary file upload vulnerabilities via the expression specified in , which could match '$' to a newline character in a malicious filename rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are externally blocked, but only by matching the trailing portion of the filename.
+ impact: |
+ An attacker can upload malicious files to the server, leading to remote code execution or unauthorized access.
remediation: |
Upgrade Apache httpd to a version higher than 2.4.29 or apply the necessary patches.
reference:
@@ -55,4 +56,4 @@ http:
- type: dsl
dsl:
- 'contains(body_2, "{{randstr_1}}")'
-# digest: 4a0a00473045022100abd46adad44dafdef4d05a83d1eb72bb10e4e5c95441f4c1ebb45ca7f9f6588a022011c915ee8ca020281ecd81145377ad19054ed527c300d6098577af5244cda526:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022069ba591c8789f32ab114d7e83ef9294186d2663f7b3b9f1dd04da6b876bb306d022051e0fb2b787b48bffe629076ac4efa050ba50bfea5225a528357511d69466d41:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-15944.yaml b/http/cves/2017/CVE-2017-15944.yaml
index 682df52f2f..54a89b4589 100644
--- a/http/cves/2017/CVE-2017-15944.yaml
+++ b/http/cves/2017/CVE-2017-15944.yaml
@@ -5,6 +5,8 @@ info:
author: emadshanab,milo2012
severity: critical
description: Palo Alto Network PAN-OS and Panorama before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Apply the latest security patches and updates provided by Palo Alto Networks.
reference:
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402202d34183cb2f320d5a21d4da9fb27c11e96dabfa51a8a58d19b4a5cf31ae472fb0220245786fe60e03078a58384a4c60647ff442f3049404f3ba6413002e2d6c45055:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100b0524ec37a83dc42c2b65d5aaac79624687b7227515255ee075850523e653201022100899414ace80feab0f8077de3482984940b0ffa4b302405b75e6a9f900662f65b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-16806.yaml b/http/cves/2017/CVE-2017-16806.yaml
index 1b1eaf622a..c1573f9479 100644
--- a/http/cves/2017/CVE-2017-16806.yaml
+++ b/http/cves/2017/CVE-2017-16806.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: high
description: Ulterius Server before 1.9.5.0 allows HTTP server directory traversal via the process function in RemoteTaskServer/WebServer/HttpServer.cs.
+ impact: |
+ An attacker can exploit this vulnerability to access sensitive files, potentially leading to unauthorized access, data leakage, or further compromise of the server.
remediation: |
Upgrade Ulterius Server to version 1.9.5.0 or later to mitigate the directory traversal vulnerability.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f570950d14d48b344076ddcc943ae578008cb25b0a360b763cad398a2a8dd047022100bb17b1cadceaf0a6d750fffc5558105607450a4f5b06ac2cf306ea93397069de:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022069b7891ad5aaca1653c140cd869d8ba35fe546084d82bd8b47bb0c8ea8e823dc02201217ec2f0810289d76d3f48a7e790a571718babd758b0888df0c94e79191bbfb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-16877.yaml b/http/cves/2017/CVE-2017-16877.yaml
index 71903d7546..568b6a47e3 100644
--- a/http/cves/2017/CVE-2017-16877.yaml
+++ b/http/cves/2017/CVE-2017-16877.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: high
description: ZEIT Next.js before 2.4.1 is susceptible to local file inclusion via the /_next and /static request namespace, allowing attackers to obtain sensitive information.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, leading to unauthorized access and potential data leakage.
remediation: |
Upgrade Nextjs to version 2.4.1 or above to mitigate this vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220710dbb6922566e82da1ca35f94dd508fcbc709d10446162a9253ca1919333a57022038062489ab24d432a9451c53538a27416514188268fd5deb90ba06d48121b55a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ad6c79d8aabc67656e602bb168bd5eeceb6adc9d08c95328baf3c8332a97bd9102207ba6c60dcbd9f0be62d66d45a898c823b38a9c495abe192eb6823f6f924db40b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-16894.yaml b/http/cves/2017/CVE-2017-16894.yaml
index f4586d9d81..7c8c7b0124 100644
--- a/http/cves/2017/CVE-2017-16894.yaml
+++ b/http/cves/2017/CVE-2017-16894.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Laravel through 5.5.21 is susceptible to information disclosure. An attacker can obtain sensitive information such as externally usable passwords via a direct request for the /.env URI. NOTE: CVE pertains only to the writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting .env permissions. The .env filename is not used exclusively by Laravel.
+ impact: |
+ An attacker can exploit this vulnerability to gain sensitive information from the application.
remediation: |
Upgrade Laravel to version 5.5.21 or higher to fix the information disclosure vulnerability.
reference:
@@ -54,4 +56,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ae244c7d0f0112bbc6aad8a6ef46a65c0c412b04af53f731ef0f7d434bd27e43022070083a878a7bab37c6e405f18bfd153308962bd624b393685c92297f5b978232:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100914fea1c5c5534987b0dc8ea3a544420accc258866f44f710fad4491682b0bca022100f7a5f4ca76cea0ed4bbda6d945cee0182a2917e87824945712ce1b6fb4988113:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-17043.yaml b/http/cves/2017/CVE-2017-17043.yaml
index bf2774b361..bc046d444f 100644
--- a/http/cves/2017/CVE-2017-17043.yaml
+++ b/http/cves/2017/CVE-2017-17043.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress Emag Marketplace Connector plugin 1.0 contains a reflected cross-site scripting vulnerability because the parameter "post" to /wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php is not filtered correctly.
+ impact: |
+ Successful exploitation of this vulnerability could lead to the theft of sensitive information, session hijacking, or the execution of arbitrary code in the context of the affected user.
remediation: |
Update to the latest version of the WordPress Emag Marketplace Connector plugin (1.1) or apply the vendor-provided patch to fix the XSS vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022076ac14e629d0eb9401a2bb572264d7297ebed441080f2ca744e5bd24a98f12e702205ad3d8ff5cd8f2b7e27340523dd28da3c63f3a426ce59d3e27c8b038c63f4567:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210099b66f2b537913518129239b39f8a159700ddc127b1cacef95cc77ffc20ae2980221009c8e7999da3ad546302bf6fc02528bfb4b559370b20490ec03cb419fe9c5cb47:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-17059.yaml b/http/cves/2017/CVE-2017-17059.yaml
index 7aed5027df..4adc2176e9 100644
--- a/http/cves/2017/CVE-2017-17059.yaml
+++ b/http/cves/2017/CVE-2017-17059.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress amty-thumb-recent-post plugin 8.1.3 contains a cross-site scripting vulnerability via the query string to amtyThumbPostsAdminPg.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser.
remediation: |
Update to the latest version of amtyThumb Posts plugin or apply the patch provided by the vendor.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207b2bdbb876af0e1b7cf65774abeb017cc6ad7b9e6388fc3d1c455f680828b6ca022100b2582fdf4aa8212408787b5f87f2bb5f47bc38a10ecaca0a5ffab4aa946c1076:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221008c4f13602a06f46d0d4a6887df2d973aeafffb6358c3aad171a0174bf239740202207e98d73e8472701429a91d4960f68b35bfa05b042381951899224ac8de4302c9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-17451.yaml b/http/cves/2017/CVE-2017-17451.yaml
index 719e5aeca5..5a14e9e547 100644
--- a/http/cves/2017/CVE-2017-17451.yaml
+++ b/http/cves/2017/CVE-2017-17451.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress Mailster 1.5.4 and before contains a cross-site scripting vulnerability in the unsubscribe handler via the mes parameter to view/subscription/unsubscribe2.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Update to the latest version of the WordPress Mailster plugin (>=1.5.5) which includes a fix for this vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022021b68ba86aae15b21273b1f23c7a7172992b7fb0d4e074b595cef18ebfde0e26022100c4cddd9d836a9c0d1f8056c8a03bb07b20702bba91f2ad7c5b532d82448c6508:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220491d259e23e6cefe49a6a7b38773ccb1de991200484fb2caaecb31bcc41a6ca002203de830f8319daa563dfd24e34fcdc23dd63c2325348f95f05d31df7e2e3527c3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-17562.yaml b/http/cves/2017/CVE-2017-17562.yaml
index 3a7ebe7c2a..e074c69ee0 100644
--- a/http/cves/2017/CVE-2017-17562.yaml
+++ b/http/cves/2017/CVE-2017-17562.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
description: Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the target system.
remediation: |
Upgrade to Embedthis GoAhead version 3.6.5 or later to mitigate this vulnerability.
reference:
@@ -115,4 +117,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402204b81e1248180dfbefe035f387ae59f399f04d501acf182da47c59e91f335509a022043a07e3d24e1baa868a57e24990a74a0f85e145e86dcd15c4df74a3db28cbd8b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206d8b4f8428127f8b2379baa95eadcd604f9e7f9de8a7abc8a9f4105bca7cd921022100fbeddc2319778aa6b137c92b0c89423c7b8a8cfbbe4ad1b1fdf41b229e583285:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-17731.yaml b/http/cves/2017/CVE-2017-17731.yaml
index a07edf2b3a..60f4ad3759 100644
--- a/http/cves/2017/CVE-2017-17731.yaml
+++ b/http/cves/2017/CVE-2017-17731.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or data manipulation.
remediation: |
Apply the latest security patch or upgrade to a newer version of DedeCMS to mitigate the SQL Injection vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022034e653e41c3e05659473a8992fe6a76ca1aeacb896c8140f82cf30a7e99e799b022100bbe58c4d39469289f66e0623fe446ee744e5061ff8d12abb23b4e211a9250356:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502200156b1483e903ad84bb18d6c750cc7ed2dd09109d3cf8cb46eefe214a845b3d3022100becfb5c3c4f27c34f7668c14ccf18df54ca5a1edef33c06c4b3663dd683b6064:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-17736.yaml b/http/cves/2017/CVE-2017-17736.yaml
index e5ee583656..a0a8240e5b 100644
--- a/http/cves/2017/CVE-2017-17736.yaml
+++ b/http/cves/2017/CVE-2017-17736.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 are susceptible to a privilege escalation attack. An attacker can obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
+ impact: |
+ An attacker can gain administrative privileges on the Kentico CMS system.
remediation: |
Upgrade to the latest version of Kentico CMS to fix the privilege escalation vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- "Database Setup"
- "SQLServer"
condition: and
-# digest: 4a0a004730450220275c483b4077d073e7ebf97b131f7c4a192500af6468ad71c7584ead4ace8edc0221009794db374c2a86103fbe9990b1a94a29806d48b28cba306faf58d51ffb76244e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009d8309e4dcc4cb24832be6568404f920ce2d2a9537ebc8d4daf24e2a2f4a32fb0220488a5086a1b45f2b241f9aefb4f63e4f1b5e6002b72d0399d73ff793bf3a4213:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-18024.yaml b/http/cves/2017/CVE-2017-18024.yaml
index 02e685682b..d980b4e413 100644
--- a/http/cves/2017/CVE-2017-18024.yaml
+++ b/http/cves/2017/CVE-2017-18024.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: AvantFAX 3.3.3 contains a cross-site scripting vulnerability via an arbitrary parameter name submitted to the default URL, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of AvantFAX or apply the necessary security patches to mitigate the XSS vulnerability.
reference:
@@ -51,4 +53,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100de53369248eb5fe9eca9f5a6238f8df2cfe6f1e28dc5c6683f1bb8b64da48837022061a2c2338f9ea345a9fa94cb95645369d7536d13e1190710bbee112a8c68dfa6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d45b414e76619a9ffcccb6c9966a573c4e8379c7d4cdb93c05ee828e5ba2f5b202203b05a6ca78bfacf9803a27c2cbf925878b02fce3cd5e8508793391ac31ba718c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-18536.yaml b/http/cves/2017/CVE-2017-18536.yaml
index 12a0e0ca80..6228a0c036 100644
--- a/http/cves/2017/CVE-2017-18536.yaml
+++ b/http/cves/2017/CVE-2017-18536.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress Stop User Enumeration 1.3.7 and earlier are vulnerable to unauthenticated reflected cross-site scripting.
+ impact: |
+ This vulnerability allows remote attackers to execute arbitrary script or HTML code in the context of the victim's browser, potentially leading to session hijacking, phishing attacks, or defacement of the affected website.
remediation: |
Update to the latest version of the WordPress Stop User Enumeration plugin (1.3.7) or apply the provided patch to fix the vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022057f2280d0d5cc205ad98058980ffab68dc346fb0f3158864ec2277cd62b163a6022019fc34fe758f0ccaf78c25656061a12456a5059e5cfb3118f516d52917c8685b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402207636f90f1f13be2fb4123bf2a2a003aedf7808964a56bac0def0932465479b78022033cbd69edf1a73411c1d14cc327c94531fc81ee7e24746c556887f6f80ff40f2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-18598.yaml b/http/cves/2017/CVE-2017-18598.yaml
index dc95ecf56c..258c5ab66a 100644
--- a/http/cves/2017/CVE-2017-18598.yaml
+++ b/http/cves/2017/CVE-2017-18598.yaml
@@ -5,6 +5,8 @@ info:
author: pussycat0x
severity: medium
description: WordPress Qards through 2017-10-11 contains a cross-site scripting vulnerability via a remote document specified in the URL parameter to html2canvasproxy.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential theft of sensitive information or unauthorized actions.
remediation: |
Update to the latest version of the WordPress Qards plugin, which includes a fix for this vulnerability.
reference:
@@ -43,4 +45,4 @@ http:
part: body
words:
- "console.log"
-# digest: 4a0a0047304502201bc22e0aa2e3e5fbd5b9fd8ca25217b91a55e8aae08033f3f6f2031fb28f2176022100cc498781b317a153082a494ab990b7ab55cfe9a0f52eae9710fc4a7ee02ca5a7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022050c88ef260d0619e11218a28154fc7db52ec91359d29f4a59f5ba747ff343c21022100ec3b0241243c69bb63a072ebe60a1be1156805095362cc6101c49529687293fc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-18638.yaml b/http/cves/2017/CVE-2017-18638.yaml
index bc999d2312..26ee7da508 100644
--- a/http/cves/2017/CVE-2017-18638.yaml
+++ b/http/cves/2017/CVE-2017-18638.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Graphite's send_email in graphite-web/webapp/graphite/composer/views.py in versions up to 1.1.5 is vulnerable to server-side request forgery (SSR)F. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an email address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information.
+ impact: |
+ An attacker can exploit this vulnerability to access internal resources, potentially leading to unauthorized access, data leakage, or further attacks.
remediation: |
Upgrade to a patched version of Graphite (>=1.1.6) or apply the necessary security patches.
reference:
@@ -38,4 +40,4 @@ http:
part: interactsh_protocol
words:
- "http"
-# digest: 4b0a00483046022100b9f0843cfb7e06a31293fc0c05a647489bec863e344d49b317f5f819990ef4e3022100cb81167fee82e154c010b97d194e571741874d35db0b43d05fb45baeaee0b8ca:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402201306b79149a1759979fcdf09449b36e03f04b8a042c8ae32969a96357790f09702201b7a11d7eff916991c7ca651c1a2d4b65b4a3c9808c1bfde9c035e97338de547:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-3506.yaml b/http/cves/2017/CVE-2017-3506.yaml
index 7ab0a9a471..af4e613608 100644
--- a/http/cves/2017/CVE-2017-3506.yaml
+++ b/http/cves/2017/CVE-2017-3506.yaml
@@ -5,6 +5,8 @@ info:
author: pdteam
severity: high
description: The Oracle WebLogic Server component of Oracle Fusion Middleware (Web Services) versions 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1 and 12.2.1.2 is susceptible to a difficult to exploit vulnerability that could allow unauthenticated attackers with network access via HTTP to compromise Oracle WebLogic Server.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the target system.
remediation: |
Apply the necessary patches or updates provided by Oracle to fix this vulnerability.
reference:
@@ -55,4 +57,4 @@ http:
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"
-# digest: 4a0a004730450221008177a3474ef9cdc40025decc1dd89bc1f64a0e2294fa58a6c197a4defdb45fcd02207ad83517f61792e8038df1078bc4617365d3104d551f35d10c83e74dc48acf60:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220175917fef9b6461088885f0b91b311e26395c58ca2bc859870e8b817dff156a90220655034f392342c9cc848968901687aa91fa4aac8161478107729a2a0c2d10652:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-4011.yaml b/http/cves/2017/CVE-2017-4011.yaml
index 1f1a274af7..c7a10196d9 100644
--- a/http/cves/2017/CVE-2017-4011.yaml
+++ b/http/cves/2017/CVE-2017-4011.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: McAfee Network Data Loss Prevention User-Agent 9.3.x contains a cross-site scripting vulnerability which allows remote attackers to get session/cookie information via modification of the HTTP request.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking or unauthorized access to sensitive information.
remediation: |
Apply the latest security patches or updates provided by McAfee to mitigate the XSS vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
part: header
words:
- "text/html"
-# digest: 4a0a00473045022100f130864a3da871efc07d62b8166a93fe2aa2c35f3f842c8b4b8c7e4841e53e31022073ffca96edbeb147989e06dc51fb3bfe628d7ed86d828203de8b41b419408965:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008ca4559e5a6f00aa527d1a1048a85bf4b505772a02456c51b48f78474ed8bf16022100b8d7de7fbe7c46b94a8ca4c3010fac2db56b7400480cab0fe72203ff618a3193:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-5487.yaml b/http/cves/2017/CVE-2017-5487.yaml
index 403930ff1d..c96a2cf7c9 100644
--- a/http/cves/2017/CVE-2017-5487.yaml
+++ b/http/cves/2017/CVE-2017-5487.yaml
@@ -5,6 +5,8 @@ info:
author: Manas_Harsh,daffainfo,geeknik,dr0pd34d
severity: medium
description: WordPress Core before 4.7.1 is susceptible to user enumeration because it does not properly restrict listings of post authors via wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API, which allows a remote attacker to obtain sensitive information via a wp-json/wp/v2/users request.
+ impact: |
+ An attacker can easily determine valid usernames, which can lead to targeted attacks such as brute force attacks or social engineering.
remediation: |
Update WordPress to version 4.7.1 or later
reference:
@@ -63,4 +65,4 @@ http:
- '.[] | .slug'
- '.[].name'
part: body
-# digest: 4a0a004730450221008e0bd15d5ab220b67bf0f58679c061d9d79c5305c43499fe828e9c57d9537a17022061b8c81dbf310bff8c7211643d0e10593f11dade6848255176529cc308237cda:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022012362c3e5d6328b56620ca5ba033d652c01140ab49135a379f1fc623d1dabc80022100b3f06e821337ae0f1da2edea5c31e37a8c383e1c92dbec597ea16233f6d6491e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-5521.yaml b/http/cves/2017/CVE-2017-5521.yaml
index 255e6461c9..c95111f93c 100644
--- a/http/cves/2017/CVE-2017-5521.yaml
+++ b/http/cves/2017/CVE-2017-5521.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900, and R8000 devices are susceptible to authentication bypass via simple crafted requests to the web management server.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized configuration changes, network compromise, and potential exposure of sensitive information.
remediation: |
Apply the latest firmware update provided by NETGEAR to mitigate this vulnerability.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c13b08f6df8de58c836664fb8d8456bb47bb284c1cc624c4cc8aa57689060569022100d27cdeb185c5fa023e29a966dc73b59521191b41fab703a1cb23695f94efec5f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022049cc47bd934d92822b69ef3ae0b679bac2f61d2d3c05e2ba84c0daa804b94bd9022100b0daa20a36023cb335bcef703a4be02cbdbe8a2635e52659d0007a0504415f6c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-5631.yaml b/http/cves/2017/CVE-2017-5631.yaml
index e6bde3a78f..37e6657b09 100644
--- a/http/cves/2017/CVE-2017-5631.yaml
+++ b/http/cves/2017/CVE-2017-5631.yaml
@@ -5,6 +5,8 @@ info:
author: edoardottt
severity: medium
description: KMCIS CaseAware contains a reflected cross-site scripting vulnerability via the user parameter transmitted in the login.php query string.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
To remediate this vulnerability, it is recommended to apply the latest patches or updates provided by the vendor.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a18ce04a9837c75ebb7684f9910bf72ce4ee6051ea7a02edc24b2aae3a383d0f022100dec0fb5a72d56a015f87ffa0572e3e2226c66baa2c7fa82c62c1187f95071b4e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402204f40cf04bd12a4315fae5af77ff6dab6c4c2de3fb391356745992aa71a6feb8d022035b63f7ee7c589465ac060e6cdaabd793cb33ba4711442416dda651a72dc0f78:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-5638.yaml b/http/cves/2017/CVE-2017-5638.yaml
index 6517334f88..f89dc4f11d 100644
--- a/http/cves/2017/CVE-2017-5638.yaml
+++ b/http/cves/2017/CVE-2017-5638.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
Apache Struts 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 is susceptible to remote command injection attacks. The Jakarta Multipart parser has incorrect exception handling and error-message generation during file upload attempts, which can allow an attacker to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header. This was exploited in March 2017 with a Content-Type header containing a #cmd= string.
+ impact: |
+ Remote attackers can execute arbitrary commands on the target system.
remediation: |
Upgrade to Apache Struts 2.3.32 or 2.5.10.1 or apply the necessary patches.
reference:
@@ -46,5 +48,4 @@ http:
- type: status
status:
- 200
-
-# digest: 4a0a0047304502202407ca8e28f3783a14692497a7204673ec4edccefcb345d7da71d5070bbd0e3e022100d120da2dc23a55d8439a1c6985ceba81ac96076efa0cd41171db47cebea1668f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100fbe4f775fe83ed866915c29662a0884710cb6849a95fee93c60cd278c9551e9c022100e229c1ef4b96aeade9ffc8da95cc64cc3d6b75a4ec70d80dd7741a024d29a576:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-5689.yaml b/http/cves/2017/CVE-2017-5689.yaml
index d4a0cfc3ef..c2c9cb07a3 100644
--- a/http/cves/2017/CVE-2017-5689.yaml
+++ b/http/cves/2017/CVE-2017-5689.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
Intel Active Management platforms are susceptible to authentication bypass. A non-privileged network attacker can gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability. A non-privileged local attacker can provision manageability features, gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology. The issue has been observed in versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 for all three platforms. Versions before 6 and after 11.6 are not impacted.
+ impact: |
+ An attacker can bypass authentication and gain unauthorized access to the Intel Active Management firmware, potentially leading to unauthorized control of the affected system.
remediation: |
Update the Intel Active Management firmware to version 11.6.55, 11.7.55, 11.11.55, 11.0.25, 8.1.71, or 7.1.91 to mitigate the vulnerability.
reference:
@@ -52,4 +54,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c8a8964ac911d80b8bd68120abe723b36b79cabf6110d25e06a4aff279eaee4302204d37c271d384d98e2befb34212e1743e932e60ca43235b1b3a1483cdbcf2a2f4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402203674b13569954ddcb49c7a9fd1e250449dfbd965c265f88299a6597ec0b3401302204fa71f5cb267e9c191f41e21e6f67db25f2b6505760f156dc7c65c6d7c5c753d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-6090.yaml b/http/cves/2017/CVE-2017-6090.yaml
index c59dbb8de4..164fb4fc21 100644
--- a/http/cves/2017/CVE-2017-6090.yaml
+++ b/http/cves/2017/CVE-2017-6090.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: high
description: PhpCollab 2.5.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in logos_clients/ via clients/editclient.php.
+ impact: |
+ Successful exploitation of this vulnerability can result in unauthorized remote code execution on the affected system.
remediation: |
Apply the latest patch or upgrade to a newer version of PhpColl to mitigate this vulnerability.
reference:
@@ -54,4 +56,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210099132734cccfaf8bf298ca9150d76747e0dda63b55da13318e27fdbc8f6ad958022100bc4df2148e4639c1a281733ab8a194518b7d294bb6b7972e25d4fa0e7674d1e1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c19f020aa6bfccbac6868aec75c0c00e20aef7662cde28d4789958cdb958eb23022014ef665f00ba30656739a02baf1c80ec9a2d21070fe41be89d0a4efebe7e470f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2017/CVE-2017-7269.yaml b/http/cves/2017/CVE-2017-7269.yaml
index dc0e5e6174..05f932de93 100644
--- a/http/cves/2017/CVE-2017-7269.yaml
+++ b/http/cves/2017/CVE-2017-7269.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 contains a buffer overflow vulnerability in the ScStoragePathFromUrl function in the WebDAV service that could allow remote attackers to execute arbitrary code via a long header beginning with "If (.*?)'
internal: true
part: body
-# digest: 4a0a00473045022028cd8a2a8701ecac535948910b85cf15ac28cde153a381db6df360650f8daa37022100fbf3d855a5152999c5894b30f2db95489143480735950ce2d97b10f94d23ae74:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100a483f2e85a0a61d5442379f553a81b168cb303b02f98d1d0184615f64f55c39802206b82f6795f61c317a25436bfaaf0c775004939d135660be36de0fac888dffdde:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-1000600.yaml b/http/cves/2018/CVE-2018-1000600.yaml
index b25b9099e1..c05c2d8c9f 100644
--- a/http/cves/2018/CVE-2018-1000600.yaml
+++ b/http/cves/2018/CVE-2018-1000600.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Jenkins GitHub Plugin 1.29.1 and earlier is susceptible to server-side request forgery via GitHubTokenCredentialsCreator.java, which allows attackers to leverage attacker-specified credentials IDs obtained through another method and capture the credentials stored in Jenkins.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to internal resources, potential data leakage, and further attacks on the network.
remediation: |
Upgrade Jenkins GitHub Plugin to version 1.29.2 or later to mitigate the vulnerability.
reference:
@@ -38,4 +40,4 @@ http:
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"
-# digest: 4b0a00483046022100e9cf698a6155fca9dd32204158eb1ec8b659d4a54543e1ab8d65c9d907853fa6022100a79c2ced0e65c6ebc706488afccd56483b0b98d52f8c99ed538c063e3450e82e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402200516063b8f46f603695fe6daeb0c86266c0b5c05818b3cea995ff84873e3118402206cd2a3f491ce4f852cc50781bba8e88f14c2da1066feb45b7a7156e3ea4dc8af:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-1000671.yaml b/http/cves/2018/CVE-2018-1000671.yaml
index d8982e90cc..f9b6b8bb16 100644
--- a/http/cves/2018/CVE-2018-1000671.yaml
+++ b/http/cves/2018/CVE-2018-1000671.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Sympa version 6.2.16 and later contains a URL Redirection to Untrusted Site vulnerability in the referer parameter of the wwsympa fcgi login action that can result in open redirection and reflected cross-site scripting via data URIs.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a patched version of Sympa (>=6.2.17) or apply the necessary security patches provided by the vendor.
reference:
@@ -39,4 +41,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-# digest: 4a0a00473045022100a1a3159a4404aadc91edeae3a062b93d520ffbd46a299d8dcda7177b69ae025d0220402761aca37d8f1495841b26b21d238435828a4efb4c5b9c88cf13e0d9f575f4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008317268039141171e9f4697b55b29acacacf55a997d3689eef2e0aadfad2a0a2022100875a37481edac3278a765ceb2b55b7ee392c0bc9416433def5dc63d3136e90df:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-1000856.yaml b/http/cves/2018/CVE-2018-1000856.yaml
index 3fdcbb8fa2..b072657853 100644
--- a/http/cves/2018/CVE-2018-1000856.yaml
+++ b/http/cves/2018/CVE-2018-1000856.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
DomainMOD 4.11.01 is vulnerable to cross-site scripting via the segments/add.php Segment Name field.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version of DomainMOD or apply the vendor-provided patch to mitigate this vulnerability.
reference:
@@ -63,4 +65,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c0fc6cc177d319cac3f2c9b8ce234fe64b2eb1d62dced401cd4e839d2cc9c268022071e4e38cdfe955c22d7422e7cd0ed86e1c54342ef2297dcd2457696e1fb16f72:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022013cc56c0788009e72a90ad50fb02772d4d13e0a6d8345ea9ff32111c59a227800220243ef50e4cc4f7ff9ab318d7637ef981da6ee3b7d1cd175628dad853539050fa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-1000861.yaml b/http/cves/2018/CVE-2018-1000861.yaml
index 2747d599f8..b86a645e7e 100644
--- a/http/cves/2018/CVE-2018-1000861.yaml
+++ b/http/cves/2018/CVE-2018-1000861.yaml
@@ -5,6 +5,8 @@ info:
author: dhiyaneshDK,pikpikcu
severity: critical
description: Jenkins 2.153 and earlier and LTS 2.138.3 and earlier are susceptible to a remote command injection via stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and potential compromise of the entire Jenkins server.
remediation: |
Apply the latest security patches and updates provided by Jenkins to mitigate this vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022067b8cbd5a6dc7230eb66c5de9fe6cb0bb3389e6be67c047a0a5d09a42ed4a7c402201ec3101940d135e9ecbbbcdc0c312b7b1d2eab6d45c3467d112ee3e3d6127a90:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220392ddae9094cf42a0be96a1f52e5a7e5aba557e48d8e7626626de55207a0f5b8022100ed04daedd75764426b5b67d30c49627ec4c90d16706567bbb112087a301cc1f0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-10093.yaml b/http/cves/2018/CVE-2018-10093.yaml
index e421af55df..5ac89727c3 100644
--- a/http/cves/2018/CVE-2018-10093.yaml
+++ b/http/cves/2018/CVE-2018-10093.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow remote code execution.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the device, potentially leading to a complete compromise of the phone and unauthorized access to the VoIP network.
remediation: |
Apply the latest firmware update provided by AudioCodes to fix the vulnerability and ensure proper input validation.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022001de3a004110f8d29008c4aa47f247c0b164d240314d699d05ab8aa8de2735730221009ea6fad37b1abb7add86afab106eff2e86add605f1388dd2d0a040f71efccf04:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009a8f12052a0797f7cbbed43a8cbf98d2d2276859de246afeb55689bf0cb58581022012822d81dd35ea01de36a4407fdc3783d804bcdf3249a4936b4b7b05d08d7698:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-10095.yaml b/http/cves/2018/CVE-2018-10095.yaml
index 7480f3f45a..e7c5711f9f 100644
--- a/http/cves/2018/CVE-2018-10095.yaml
+++ b/http/cves/2018/CVE-2018-10095.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Dolibarr before 7.0.2 is vulnerable to cross-site scripting and allows remote attackers to inject arbitrary web script or HTML via the foruserlogin parameter to adherents/cartes/carte.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to Dolibarr version 7.0.2 or later to mitigate this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d22af840507ae9dfc0306cbca9efc1c1e043e6adc38d12dba17ed388e1fd8725022100e31eecc6ac20a2ef1c8654ce99f9f008cb732d3642e1d1bf5bff01307822998c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008f11a936459593b0d30f548fcdc761d05f79b578a98024c49efa84763b6dc801022100dacbb104d78edac86c44f54c8925b4f1828cadfbc0d4fa22a0406257147d09db:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-10141.yaml b/http/cves/2018/CVE-2018-10141.yaml
index 7184a324ac..c00e1e0697 100644
--- a/http/cves/2018/CVE-2018-10141.yaml
+++ b/http/cves/2018/CVE-2018-10141.yaml
@@ -5,6 +5,8 @@ info:
author: dhiyaneshDk
severity: medium
description: Palo Alto Networks PAN-OS before 8.1.4 GlobalProtect Portal Login page allows an unauthenticated attacker to inject arbitrary JavaScript or HTML, making it vulnerable to cross-site scripting.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, data theft, or other malicious activities.
remediation: |
Upgrade to Palo Alto Networks PAN-OS GlobalProtect VPN client version 8.1.4 or later to mitigate this vulnerability.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402206bd7752048e3f06146c3662900408340c7c5a96d1561cde59dab9d9a8425a759022074b40d47b3c1c1ee7bae2745e143ac5e017df6cb5b196b8cdf3e04e28fc24cb1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220472960bc7baecc2f34a1c09cd71028ea9a9246cc11771228277cb5077abdb96b02200a1a0a24c16dd85344120e450dd0385e72bfbd5ba12c3bcebfed275b1eb9880b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-10201.yaml b/http/cves/2018/CVE-2018-10201.yaml
index 10df3747a6..73ab51ed55 100644
--- a/http/cves/2018/CVE-2018-10201.yaml
+++ b/http/cves/2018/CVE-2018-10201.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_akoko
severity: high
description: Ncomputing vSpace Pro versions 10 and 11 suffer from a directory traversal vulnerability.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to read arbitrary files from the target system.
remediation: |
Apply the latest security patches or updates provided by Ncomputing to fix the directory traversal vulnerability.
reference:
@@ -44,4 +46,4 @@ http:
- "fonts"
- "extensions"
condition: and
-# digest: 490a0046304402202499dbec6a644a10ded40f743d9869a4ff389f5bd22856679de11d4945d8cd95022067455572f1d5ecb5f633ac5ef1a620b7bdbe498b4f5986594df2c64d99193a60:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502207bef5efa8ba61c5a90904662c1339b7a82a553d40a795b1ed42a79e0cd2ce78d022100a2b0fb19f6b71ce233558b6490c85c83337e0272ba51205fd9de55b7fd56d71e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-10230.yaml b/http/cves/2018/CVE-2018-10230.yaml
index c9a38d62ad..02b4122bb2 100644
--- a/http/cves/2018/CVE-2018-10230.yaml
+++ b/http/cves/2018/CVE-2018-10230.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Zend Server before version 9.13 is vulnerable to cross-site scripting via the debug_host parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade Zend Server to version 9.13 or later to mitigate this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100eb10ca982816d4ade9d3f9bf7db8a36f6eaae1705c755eba520df719317baff4022100efb9e47cc8bf9d046d89f63c541cfbcd81bee10fc78f2241361c6877a02d4efa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009bf9ff58bd53c05ecebe3fe711794d2af732156efc1c103f8716fe86408cf41c022100bc9272148cc6fc921c5c666d280933eef0c2e355dc94dc54f7af82f1a461b7ae:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-10562.yaml b/http/cves/2018/CVE-2018-10562.yaml
index 11916690fc..2ae9f2ceb2 100644
--- a/http/cves/2018/CVE-2018-10562.yaml
+++ b/http/cves/2018/CVE-2018-10562.yaml
@@ -5,6 +5,8 @@ info:
author: gy741
severity: critical
description: Dasan GPON home routers are susceptible to command injection which can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands with root privileges on the affected device.
remediation: |
Apply the latest firmware update provided by the vendor to mitigate this vulnerability.
reference:
@@ -54,4 +56,4 @@ http:
part: interactsh_request
words:
- "User-Agent: {{useragent}}"
-# digest: 4a0a00473045022100af9795e26a105b283ac69b5a1fe23a7334d2dabd2fb77f797391ebbf97cf0c5402201aa0cb80fadb87f2685f8cd43be68f4f20130443ac0dd218aa085e06e019e2c3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100a9156dd7f51f9daedd85545885cd8de4310f5e2f19cc8ca01ca1a63ba36a46e00220230db4bfe7711478155d2b8593dfde09e8c16b59b2f6741dd1ec49f21c86dbb0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-10818.yaml b/http/cves/2018/CVE-2018-10818.yaml
index 2ce9d11bbb..1d531d1358 100644
--- a/http/cves/2018/CVE-2018-10818.yaml
+++ b/http/cves/2018/CVE-2018-10818.yaml
@@ -5,6 +5,8 @@ info:
author: gy741
severity: critical
description: LG NAS devices contain a pre-auth remote command injection via the "password" parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected device.
remediation: |
Apply the latest firmware update provided by LG to mitigate this vulnerability.
reference:
@@ -47,5 +49,4 @@ http:
part: interactsh_request
words:
- "User-Agent: {{useragent}}"
-
-# digest: 4a0a00473045022100ccb2d026c1bdc3df10c2c02d7bc19b1059c4e40e9ba5b5dcd07f77a4900f0e1502203ebc6f5387949a63d6f6166a279ef005ec5bec4c4caaf3df125ce8265eb44bc5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202b56677fec54d514978c64631558171a8f9588ca78711315dd08583d0ed373340221009dff21f2f19a0772452e60725b3701999ff6c59a8bdb380e982af97876bcb175:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-10822.yaml b/http/cves/2018/CVE-2018-10822.yaml
index d5b14aeb21..f3fa73c233 100644
--- a/http/cves/2018/CVE-2018-10822.yaml
+++ b/http/cves/2018/CVE-2018-10822.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: D-Link routers DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02,DWR-512 through 2.02,DWR-712 through 2.02,DWR-912 through 2.02, DWR-921 through 2.02, DWR-111 through 1.01, and probably others with the same type of firmware allows remote attackers to read arbitrary files via a /.. or // after "GET /uir" in an HTTP request to the web interface.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the target system
remediation: |
Apply the latest firmware update provided by D-Link to fix the vulnerability
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022016e21de8891884039976f212b03fddf625f22f5849c49b92faa6a4c0defb8e58022100889f2b8febb3e6346805854a50ad4f1cba7ed6e822ed772afa4d04667f34931a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100cbf8e303e514337053ef047c67628404dc7c3c0e4d2c92e62f0454ef93e7db5c022013d61bf969a523c7fb763697cec3ce22aea57c1db022f1cba322bec8f6c55bff:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-10823.yaml b/http/cves/2018/CVE-2018-10823.yaml
index 830fda1175..1b179af403 100644
--- a/http/cves/2018/CVE-2018-10823.yaml
+++ b/http/cves/2018/CVE-2018-10823.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
D-Link DWR-116 through 1.06, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 device may allow an authenticated attacker to execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access, data theft, and complete compromise of the affected router.
remediation: |
Apply the latest firmware update provided by D-Link to mitigate this vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f7626106e52e692d05839d60506ecc8fbee523119362ef04ee0459746ede18910221008cca14c064568d57a64ddf9728181d4d550d8559771c3d60930bf35a3d63bf98:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ce33a79e6b3d3401c0e63540242834659be6ef9047431d15c88c4fbec40939dd022019045ce46747021f90a207e75119bdbf1d6cb67b21f94602bfb46baca209264b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-10956.yaml b/http/cves/2018/CVE-2018-10956.yaml
index 379703c0d6..70d8dba8fd 100644
--- a/http/cves/2018/CVE-2018-10956.yaml
+++ b/http/cves/2018/CVE-2018-10956.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
IPConfigure Orchid Core VMS 2.0.5 is susceptible to local file inclusion.
+ impact: |
+ An attacker can exploit this vulnerability to gain unauthorized access to sensitive information, potentially leading to further compromise of the system.
remediation: |
Update to the latest version of IPConfigure Orchid Core VMS to mitigate the LFI vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221008146320c55fa68651e5aad1e2a70a1c2eddd0cd8957c77b45f43b84c36fccdf1022100955e30ae17c92921153cfe5db79eef7ec23b971db2c318f5db07d46c40ed937e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d9d5fbbae10553167d9c415cb92a7db1bfc91846fe52114f108dff19dc0c0bc0022052ab683639adb114492fa4627a69ea313a36af905641a6805e29a7ff1563e57f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-11227.yaml b/http/cves/2018/CVE-2018-11227.yaml
index c83235e263..b182bc4d44 100644
--- a/http/cves/2018/CVE-2018-11227.yaml
+++ b/http/cves/2018/CVE-2018-11227.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Monstra CMS 3.0.4 and earlier contains a cross-site scripting vulnerability via index.php. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Upgrade Monstra CMS to a version higher than 3.0.4 or apply the official patch provided by the vendor.
reference:
@@ -56,4 +58,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022011bd40cba707c618ccceff97ebb516dcb49ddf287ded3cb0c97ed0e0eb4dd819022100ad4d9f3c1480bfa52ec075a59cf11961f039e7ec78075db37e322635e891f8a3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100853f9c6cfb12519c82a81347f3874fd3d2952e11fe632f0d503a7354cea22c21022061ccde204264de75fcef0b0c3c2a15d78a3d77008479064f2347391838144f87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-11231.yaml b/http/cves/2018/CVE-2018-11231.yaml
index 9a7337c1a1..e6dfd5dc1f 100644
--- a/http/cves/2018/CVE-2018-11231.yaml
+++ b/http/cves/2018/CVE-2018-11231.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
OpenCart Divido plugin is susceptible to SQL injection
+ impact: |
+ This vulnerability can lead to data theft, unauthorized access, and potential compromise of the entire Opencart Divido system.
remediation: |
Apply the official patch or upgrade to a version that includes the fix.
reference:
@@ -50,4 +52,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b7e2ef4c9724c30e475ad707fa73be68bbe98ab1bd57af857d7598731d654561022024abad990f2abc1545ec2941390f785dcfb3f2aad88e247eacac3df32fef0910:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220672fc02832aaf8d667e4a0858125dc6dea65e34b9b488b610c561ef47efa147f022100d675f5c2b812729f574e501dddc8e85db1a855c093583424954a41e193beecec:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-11409.yaml b/http/cves/2018/CVE-2018-11409.yaml
index aa93c6b988..3c752fbbc9 100644
--- a/http/cves/2018/CVE-2018-11409.yaml
+++ b/http/cves/2018/CVE-2018-11409.yaml
@@ -5,6 +5,8 @@ info:
author: harshbothra_
severity: medium
description: Splunk through 7.0.1 is susceptible to information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.
+ impact: |
+ An attacker can exploit this vulnerability to gain unauthorized access to sensitive information.
remediation: |
Upgrade Splunk to a version higher than 7.0.1 to mitigate the vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402201ec6b421be7bf09f279bfabce323c1ec7481d82e7df904a9aec4ba6bcba6701e02207a75e01e45c4676891ac968de6365364e8d169ff2f4c42a333113c034f18ee58:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008e9fb72789459ca8d438abf1a5e5848290577c6b5972411a769c05450658ae07022100c08b4dafb07b0d2a4b8ff5f164d97c91f5d93b982177b9e3a1931dca26dafbd7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-11473.yaml b/http/cves/2018/CVE-2018-11473.yaml
index 4ec649fa85..17df84a490 100644
--- a/http/cves/2018/CVE-2018-11473.yaml
+++ b/http/cves/2018/CVE-2018-11473.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Monstra CMS 3.0.4 contains a cross-site scripting vulnerability via the registration form (i.e., the login parameter to users/registration). An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version of Monstra CMS or apply the vendor-provided patch to fix the XSS vulnerability.
reference:
@@ -67,4 +69,4 @@ http:
- 'id="csrf" name="csrf" value="(.*)">'
internal: true
part: body
-# digest: 4a0a00473045022100f8976d7f70d7c1c1aa552f6551ddd2193d6da6de168306be10b5053c3968197802202f02653b79cd0a46ea1def9f3344755df764a6de25b5d1103485c74d752f9bc9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022023418b0bd7c765e159c81014598a5f5dad1a34b3183959586c9a8f775938900e022100ddb473087dac58cd50f8472054cd2caba81c7ab4fbbbad4493b07b6bd7ae6012:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-11709.yaml b/http/cves/2018/CVE-2018-11709.yaml
index 8afa6d59b3..5e23de622d 100644
--- a/http/cves/2018/CVE-2018-11709.yaml
+++ b/http/cves/2018/CVE-2018-11709.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WordPress wpForo Forum plugin before 1.4.12 for WordPress allows unauthenticated reflected cross-site scripting via the URI.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Update to the latest version of the wpForo Forum plugin (1.4.11) or apply the vendor-provided patch to fix the vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221009bbd3c2aafb10647905b4e730bbb4707396ee83609782bff3f647d339d6d1d7f02207bbc83ba0c6622ad13d1a4a218cbdbc82218236d1354e49a77afcbeacaabf7ca:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204c4f46cce9a1097999590e680c289a0c7e821fc0ccf2802777d3f355f69631ab022100e2fae5013b327f7fa3d04cc696b27c0194f2f9c03e38e58fb99f6b34e6704498:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-11759.yaml b/http/cves/2018/CVE-2018-11759.yaml
index dea1f2b3cf..08255b6ab6 100644
--- a/http/cves/2018/CVE-2018-11759.yaml
+++ b/http/cves/2018/CVE-2018-11759.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 allows specially constructed requests to expose application functionality through the reverse proxy. It is also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.
+ impact: |
+ Unauthenticated attackers can gain unauthorized access to the Apache Tomcat Manager interface, potentially leading to further compromise of the server.
remediation: |
Upgrade to a patched version of Apache Tomcat JK Connect (1.2.45 or higher) or apply the recommended security patches.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220356ae1b181e96cf9ac615854c3cd5b0d71eb7f3dbc1a27640bd67305e644d773022100c14791ac06843bcbd22caf2bd6fa417037f22f3030e78439b3485b0be2a483d3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402203cac2fe2d0ab4b4036d3e444a16be43374645739fa2015c61e060ec92dbf052802201f4d9caab87009b9e0dcdf31bd4bda4b25205bd3f9a42818781d5c8aef371a91:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-11776.yaml b/http/cves/2018/CVE-2018-11776.yaml
index 1dc426628b..c2bff933dd 100644
--- a/http/cves/2018/CVE-2018-11776.yaml
+++ b/http/cves/2018/CVE-2018-11776.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible remote code execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn''t have value and action set and in same time, its upper package have no or wildcard namespace.
+ impact: |
+ Remote code execution
remediation: |
Apply the latest security patches or upgrade to a non-vulnerable version of Apache Struts2.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ecaf52487851b3a32f8a3a12f0f317f3a393af49a5ac758d919f0ec64986768f0221009202f62d6b5253d9f129895440dc14099b34b78a3a436d1cf4ab732dc1c0a7e5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f45b973add47b6e3076816297a08941c85f7bb4d9ba71632b7db58f94e2f64c802206c151edf1356d0784f6903749a16ed853e73fa323100e602763a0f372467a8fb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-11784.yaml b/http/cves/2018/CVE-2018-11784.yaml
index 7eaf07a9d2..eaaa87a95e 100644
--- a/http/cves/2018/CVE-2018-11784.yaml
+++ b/http/cves/2018/CVE-2018-11784.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Apache Tomcat versions prior to 9.0.12, 8.5.34, and 7.0.91 are prone to an open-redirection vulnerability because it fails to properly sanitize user-supplied input.
+ impact: |
+ An attacker can redirect users to malicious websites, leading to phishing attacks or the download of malware.
remediation: |
Upgrade to Apache Tomcat version 9.0.12 or later, or apply the relevant patch provided by the Apache Software Foundation.
reference:
@@ -45,4 +47,4 @@ http:
negative: true
status:
- 404
-# digest: 4b0a00483046022100c198269185294812649aec4d11d42494a012408aeb4f6b2abd59151ce7d0727d022100dc472e978f57e82522587a836c75bc866c8046e87959a2935c81ba4f9f06e563:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402201f4393ed8f2fe20c4fd54f9616971e59357da8ef6ed5f1a16e5b354857de04d402202eaaa8e31d0f9f179bee3e1427e192ea6f0c5acbc67849263611effa8fe9c4cc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-12031.yaml b/http/cves/2018/CVE-2018-12031.yaml
index f5652a1e5f..f41b076bb3 100644
--- a/http/cves/2018/CVE-2018-12031.yaml
+++ b/http/cves/2018/CVE-2018-12031.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: critical
description: Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via directory traversal, which can lead to sensitive information disclosure, denial of service and code execution.
+ impact: |
+ An attacker can exploit this vulnerability to gain unauthorized access to sensitive information, potentially leading to further compromise of the system.
remediation: |
Apply the latest security patch or upgrade to a newer version of Eaton Intelligent Power Manager to mitigate this vulnerability.
reference:
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c31f40454ca7102e23152f4d70414136b95ad9c8c175ff4df1c876b5a6fde493022100b61d3b864d34763054d252e4d8bb9b29311061ae9b2b6195f33e9df6cb9a27d2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402200c568082d57463015a72c0ac3d5597c5799adb4b265412913c026d4f0b1e170f022073cd9359256b3a6d7d44863f0ee1096c922eccd59e7bb32ff2b6919d5201f415:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-12054.yaml b/http/cves/2018/CVE-2018-12054.yaml
index 97a7b407c4..2ac3902371 100644
--- a/http/cves/2018/CVE-2018-12054.yaml
+++ b/http/cves/2018/CVE-2018-12054.yaml
@@ -5,6 +5,8 @@ info:
author: wisnupramoedya
severity: high
description: Schools Alert Management Script is susceptible to an arbitrary file read vulnerability via the f parameter in img.php, aka absolute path traversal.
+ impact: |
+ This vulnerability can lead to unauthorized access to sensitive information stored on the system, potentially exposing personal data of students, staff, and other stakeholders.
remediation: |
Apply the latest patch or update provided by the vendor to fix the arbitrary file read vulnerability in the Schools Alert Management Script.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022064a95903712a34a383c4634be61f999b94e0134ac32eba40ebb21aa098f97240022100c299bf424914b10d2ace2c040a529eb76214720b62d4327e67f5a3a0e53085e8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022079925b2c8857f3bb3c1cce640e60688393ebc60e04262285b9d24cbdf74dd759022100db052a9649054c760bac709de0e3da56fad43afbf316e2320e4e15499eb87874:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-1207.yaml b/http/cves/2018/CVE-2018-1207.yaml
index a39cd6259e..57c97ce58e 100644
--- a/http/cves/2018/CVE-2018-1207.yaml
+++ b/http/cves/2018/CVE-2018-1207.yaml
@@ -8,6 +8,8 @@ info:
Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a CGI injection vulnerability
which could be used to execute remote code. A remote unauthenticated attacker may
potentially be able to use CGI variables to execute remote code.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected device.
remediation: |
Apply the latest firmware updates provided by Dell to mitigate this vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
part: response
words:
- "calling init: /lib/"
-# digest: 4b0a004830460221009ab4463c0cf7898d889cebb97230cdf8e026e44d849f8d95dbc2a52d8a302a06022100aed203db27dc69f5d96f206c7c1db20020ff365c4cef08fc78c7acc480e0fe5d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100cdc2713773363d8045519f2ee5ad1fc4363f3c539ea66a96ec4d9c62f84b827e0221008229950b33559b0ebc4637536d2243365bd216d52026213fd976ae2463db841e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-12095.yaml b/http/cves/2018/CVE-2018-12095.yaml
index 3bd7b7380a..07a2417384 100644
--- a/http/cves/2018/CVE-2018-12095.yaml
+++ b/http/cves/2018/CVE-2018-12095.yaml
@@ -5,6 +5,8 @@ info:
author: LogicalHunter
severity: medium
description: OEcms 3.1 is vulnerable to reflected cross-site scripting via the mod parameter of info.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest patch or upgrade to a newer version of OEcms to fix the XSS vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221008559698d72502995f5f2d8db5091ab204423b4ae2c4144bab327501682e4668002205472eeb66ea4d2bf3ed42f342d48083e99fb92f54c1f87507b4c303119a83d56:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022075be208a307205c853110c33fd7341734b6d40f9269ce8189d387ebc40a9baaf02201dea139339978ec040a1c04e8f5e2c7a726b6e8bde414f5b4cdbf6d6a2e88ae5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-12296.yaml b/http/cves/2018/CVE-2018-12296.yaml
index 4eaca1279e..48f1392013 100644
--- a/http/cves/2018/CVE-2018-12296.yaml
+++ b/http/cves/2018/CVE-2018-12296.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: high
description: Seagate NAS OS version 4.3.15.1 has insufficient access control which allows attackers to obtain information about the NAS without authentication via empty POST requests in /api/external/7.0/system.System.get_infos.
+ impact: |
+ An attacker can gain sensitive information about the server, potentially leading to further attacks.
remediation: |
Upgrade to a patched version of Seagate NAS OS.
reference:
@@ -45,4 +47,4 @@ http:
regex:
- '"version": "([0-9.]+)"'
part: body
-# digest: 4a0a0047304502210099133e0a1103fa78df6a8ed5b8ad14c025c6db6be209ac8986d22e0da32cd3f4022050fc3d2624787f4a2d8c3875cf0eca8d367824e0f3ee051168c72adce67508dd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210088c34461d85bffb165c308034533866bd7eee6e6163d58b39046c076002f3b9302206e0a4ba175fb723e39796f8311ab738341de9e92387dc4222f386f13919274d9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-12300.yaml b/http/cves/2018/CVE-2018-12300.yaml
index c5a197cfad..961af41ca2 100644
--- a/http/cves/2018/CVE-2018-12300.yaml
+++ b/http/cves/2018/CVE-2018-12300.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Seagate NAS OS 4.3.15.1 contains an open redirect vulnerability in echo-server.html, which can allow an attacker to disclose information in the referer header via the state URL parameter.
+ impact: |
+ Successful exploitation of this vulnerability could lead to user redirection to malicious websites, potentially resulting in the theft of sensitive information or the installation of malware.
remediation: |
Apply the latest security patches or updates provided by Seagate to fix the open redirect vulnerability in NAS OS 4.3.15.1.
reference:
@@ -34,4 +36,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-# digest: 4a0a0047304502203fc07d00611d13090ff372c8868135d3915079d0c8cf7a3640e83e6865c7bece022100a0cc57baadd20aa924a7275f40a996e810d452c8f7a7134c12db9c8d8d5bd3de:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202c4d01625343e65e244bd0213b48c9a0ba194cab7aaed23d0116310c260a2908022100814be48649c8b8b57de19a3812207b9e5a8213058dd0606bb8acb0c4a398137c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-12613.yaml b/http/cves/2018/CVE-2018-12613.yaml
index 9e1a85c94d..966099b72f 100644
--- a/http/cves/2018/CVE-2018-12613.yaml
+++ b/http/cves/2018/CVE-2018-12613.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: high
description: PhpMyAdmin before version 4.8.2 is susceptible to local file inclusion that allows an attacker to include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server.
remediation: |
Upgrade PhpMyAdmin to version 4.8.2 or later to fix the vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d8be22d57997125efb7788431962c99efee8c3467907cf03e308c69582a3719b022100c37b69c80c31705d85ed2a02695d28b2406a65ecac8d0546359df04e388fda07:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e82db79b01411365294e1064bb99286ad38506c0360beace48c376afb76e2a50022044b656574a2e6467ede70477d7e91d8a63ed3f335cd8c133436ca98f4b127d5b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-12634.yaml b/http/cves/2018/CVE-2018-12634.yaml
index 52d3c762eb..23d3d66ae1 100644
--- a/http/cves/2018/CVE-2018-12634.yaml
+++ b/http/cves/2018/CVE-2018-12634.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: critical
description: CirCarLife Scada before 4.3 allows remote attackers to obtain sensitive information via a direct request for the html/log or services/system/info.html URI. CirCarLife is an internet-connected electric vehicle charging station.
+ impact: |
+ An attacker can gain access to sensitive system logs, potentially leading to unauthorized access or information disclosure.
remediation: |
Upgrade CirCarLife Scada to version 4.3 or above to fix the system log exposure vulnerability.
reference:
@@ -49,4 +51,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100cb884b9064727c42b1f086ad7d11ff2df5809439cbe2b7f57a8a2088722bb32c022100c36a55ce8eb12e853bdd2d2b72cd866515acdfcdbcd582b4a4f17e6dcef4e09f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206478c6dbec451155ed0308a4ae148ba881af0c7b1b46ef63551f46dda83c2c710221009a44c42737796faeaf56ea11f0940ddd6217af486def2b5b042f8b589e7f15fa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-12675.yaml b/http/cves/2018/CVE-2018-12675.yaml
index 70f82f6466..56f94483c3 100644
--- a/http/cves/2018/CVE-2018-12675.yaml
+++ b/http/cves/2018/CVE-2018-12675.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
SV3C HD Camera L Series 2.3.4.2103-S50-NTD-B20170508B and 2.3.4.2103-S50-NTD-B20170823B contains an open redirect vulnerability. It does not perform origin checks on URLs in the camera's web interface, which can be leveraged to send a user to an unexpected endpoint. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
+ impact: |
+ An attacker can use this vulnerability to redirect users to malicious websites, leading to phishing attacks.
remediation: |
Apply the latest firmware update provided by the vendor to fix the open redirect vulnerability.
reference:
@@ -38,4 +40,4 @@ http:
part: body
words:
- ''
-# digest: 4b0a00483046022100a1781ce85f3abc1318969c1480b980aa165bbfda3308e12cc7b804f29da3488002210087c749ecf233c3ad8989782936e586241256fa81fd5c37826d8ebbc74e1beb92:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220259ce09b98d9d5e11104831565de1695869962725c611a4de2aa00a3e2c8d4cb022100ea6707597fa386d381f2ab3e939a3e9516457cfacc86e637fdc11280279cb04d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-1271.yaml b/http/cves/2018/CVE-2018-1271.yaml
index 04ba9452ad..a7bfc04969 100644
--- a/http/cves/2018/CVE-2018-1271.yaml
+++ b/http/cves/2018/CVE-2018-1271.yaml
@@ -5,6 +5,8 @@ info:
author: hetroublemakr
severity: medium
description: Spring MVC Framework versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported are vulnerable to local file inclusion because they allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). A malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Apply the latest security patches and updates provided by the Spring MVC Framework to mitigate this vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ffa51f20ec96c2e7941833eb20f0577e8d1637998fdc44b37fd9ef92340868b5022100aec08ff027670294c3dfc30cad92f7c570ce932903213012333f05ff3df03753:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210088b3514173bab2d2d9e78e2e2ade11c914ff4e81ba7666a3fbef88e8436ff7f902200d766541f08f927ee5b7063eb539eeb9875e767f8b7dcdb10b301e672ff77584:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-1273.yaml b/http/cves/2018/CVE-2018-1273.yaml
index 28ca68907e..8470dadd4b 100644
--- a/http/cves/2018/CVE-2018-1273.yaml
+++ b/http/cves/2018/CVE-2018-1273.yaml
@@ -11,6 +11,8 @@ info:
An unauthenticated remote malicious user (or attacker) can supply
specially crafted request parameters against Spring Data REST backed HTTP resources
or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
+ impact: |
+ Successful exploitation of this vulnerability could lead to remote code execution, allowing an attacker to execute arbitrary code on the affected system.
remediation: |
Apply the latest security patches provided by the vendor to fix the deserialization vulnerability.
reference:
@@ -53,4 +55,4 @@ http:
- "root:.*:0:0:"
- "\\[(font|extension|file)s\\]"
condition: or
-# digest: 490a004630440220559c83e68898e628b3c266802f69ab1049aa08c2f270a9ad464e23af28f0e0ae022027b2b9868b55b3540b68ef253a404e37d036df2c5434ecea6b74772fb5c4bd7d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220699a47b0d24976d01b1760fd164fd5b8c6105c9a3ff09d1f43d560b184b3ea940220287897b643d3538f1ca3824daadc3a5c96be99c456069ed622edbe69c409708b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-12998.yaml b/http/cves/2018/CVE-2018-12998.yaml
index 6008395783..c90ae4e311 100644
--- a/http/cves/2018/CVE-2018-12998.yaml
+++ b/http/cves/2018/CVE-2018-12998.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: Zoho manageengine is vulnerable to reflected cross-site scripting. This impacts Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patch or update provided by Zoho ManageEngine to fix the XSS vulnerability.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100861ac032a60b2dd757f2c02b8c8ef6c4977a96e0f6634e687478bf8bf2b30885022100f351810fdb8584cecffbfbde0aed8f9c7cd6c24831d3722d0ffde984ce38b0db:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220111fe9d6e03a68b2a8a4b78b2f8e92000c7a040ac44b63f00a3ff899b56986bb0221008bca6dba56fafce19541133bdd4b5cd06f8d3543b4b82d3b53b2ceccbb980b36:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-1335.yaml b/http/cves/2018/CVE-2018-1335.yaml
index a50cb61f29..36d27fb37b 100644
--- a/http/cves/2018/CVE-2018-1335.yaml
+++ b/http/cves/2018/CVE-2018-1335.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: high
description: Apache Tika versions 1.7 to 1.17 allow clients to send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients.
+ impact: |
+ Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the affected server.
remediation: Upgrade to Tika 1.18.
reference:
- https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/
@@ -56,4 +58,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100af5b3907d1999f7c14c1b1718ea5fbb6020c32c3b5801da97796a8115a8706a10221009f38702fe2d2d1ff2c13d01a4a2d89a24824d5e2425efc93a08645bfc7f5e3c2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502207021fa50afc6de338557b57d7aa37b6c87abe24ce1cb02ef5d530ac841cf1097022100efa68638f3441565a793eac0fee29f75d80eff1c0a1cca49d77e36d8a92ec312:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-13379.yaml b/http/cves/2018/CVE-2018-13379.yaml
index 54b9e1877f..c2515f4352 100644
--- a/http/cves/2018/CVE-2018-13379.yaml
+++ b/http/cves/2018/CVE-2018-13379.yaml
@@ -5,6 +5,8 @@ info:
author: organiccrap
severity: critical
description: Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests due to improper limitation of a pathname to a restricted directory (path traversal).
+ impact: |
+ An attacker can obtain sensitive information such as usernames and passwords.
remediation: |
Apply the necessary patches or updates provided by Fortinet to fix the vulnerability.
reference:
@@ -37,4 +39,4 @@ http:
part: body
regex:
- '^var fgt_lang ='
-# digest: 4a0a00473045022100d368d28843e4b00033c043c35811a4e77d4a79fcef8dc56e2bef1d9d56b0a07202206ec07dc52b7807036a4f176b8be54828ac613b55dc047e953c1a5d0559391b70:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502200f8a42452e53a5164f36e00127b700fc50aa2a7a570220127eb4723c66d55f25022100d4fa9709de322b21d33c9505402f90f12cf8d484495303c489c922c9c9681549:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-13380.yaml b/http/cves/2018/CVE-2018-13380.yaml
index 0344cb476d..119d1e900d 100644
--- a/http/cves/2018/CVE-2018-13380.yaml
+++ b/http/cves/2018/CVE-2018-13380.yaml
@@ -5,6 +5,8 @@ info:
author: shelld3v,AaronChen0
severity: medium
description: Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below versions under SSL VPN web portal are vulnerable to cross-site scripting and allows attacker to execute unauthorized malicious script code via the error or message handling parameters.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patches or updates provided by Fortinet to fix this vulnerability.
reference:
@@ -50,4 +52,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a85902d5579ecad098187cea202495c67d63287ef964f74ebed2183f62edae4b02201609cdd3a9fa92dcea6ab341e691f039beb0f0e66130ee955e855653ff6f6a67:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ed83af5f3e347370c653d56a1d04ebe556ac9156b46b87e39b4e6df4242489f30221008399c5b5667cf68f66138b59d59ab2c7f22aa428660362b90413fc582a1541c0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-13980.yaml b/http/cves/2018/CVE-2018-13980.yaml
index 95c2a1720c..6e743b4d21 100644
--- a/http/cves/2018/CVE-2018-13980.yaml
+++ b/http/cves/2018/CVE-2018-13980.yaml
@@ -5,6 +5,8 @@ info:
author: wisnupramoedya
severity: medium
description: Zeta Producer Desktop CMS before 14.2.1 is vulnerable to local file inclusion if the plugin "filebrowser" is installed because of assets/php/filebrowser/filebrowser.main.php?file=../ directory traversal.
+ impact: |
+ An attacker can exploit this vulnerability to access sensitive information, such as configuration files, credentials, or other sensitive data stored on the server.
remediation: |
Upgrade Zeta Producer Desktop CMS to version 14.2.1 or later to mitigate the vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c145b24c88ef4304562418a71d6915618df942950d27d488248a0190122272470220060f5b0db592ebbfbb134621d5fbd07b277589ae47cca18de1de09c2574140b8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100fd3411082032af8bbb8b2257d19924985a982a9a8139579fcbba09b06005a8bd02206fcd7e7cf6ea345adecdd73ea79643aff0e5c5dc2e71ef38f9793dd9a3223432:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-14013.yaml b/http/cves/2018/CVE-2018-14013.yaml
index fe6022022e..8d0f87fda2 100644
--- a/http/cves/2018/CVE-2018-14013.yaml
+++ b/http/cves/2018/CVE-2018-14013.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 is vulnerable to cross-site scripting via the AJAX and html web clients.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a version of Synacor Zimbra Collaboration Suite Collaboration that is equal to or greater than 8.8.11 to mitigate the vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022010ee3f7738bcfa36bdfbe9263605f83f8a77987077e6db1e0d4dbf541019a52402202ee6210b0595692bee62527988cbfcf0b2cee65d8f7ac8bdfdf9fcabc230e414:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502201f68e01812a6a2ac06cfbc727c2fc18af1f6d279cf8accaadb438dd8b388b2a4022100ce88ef90892dd6bc1304bb0e415d6f9b7fa3ffac32f17a6fd31d767a6a33303d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-14474.yaml b/http/cves/2018/CVE-2018-14474.yaml
index 9c62a611dd..5243a776fb 100644
--- a/http/cves/2018/CVE-2018-14474.yaml
+++ b/http/cves/2018/CVE-2018-14474.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Orange Forum 1.4.0 contains an open redirect vulnerability in views/auth.go via the next parameter to /login or /signup. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the installation of malware.
remediation: |
Upgrade to a patched version of Orange Forum or apply the necessary security patches to fix the open redirect vulnerability.
reference:
@@ -39,4 +41,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-# digest: 4a0a0047304502210091964ceb545a7dba2616de624fee32cfe3aef44b6f70f43068fcebc768f3d27e02207af51ff5b1c7def7b0730fc7e0086b7cab86066b7abbdacae2440e61f29ae84d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100939a2b23e92686e811d38e50bccc1e8bacff3c62f7cf7d4130426cb89e596cfa022100d864cfe4a0f5417f096a11f107dc90a9738d28055e0666a485155a1de3ffdfbb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-14574.yaml b/http/cves/2018/CVE-2018-14574.yaml
index 14cc22a218..7d83ed2fec 100644
--- a/http/cves/2018/CVE-2018-14574.yaml
+++ b/http/cves/2018/CVE-2018-14574.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 contains an open redirect vulnerability. If django.middleware.common.CommonMiddleware and APPEND_SLASH settings are selected, and if the project has a URL pattern that accepts any path ending in a slash, an attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
+ impact: |
+ An attacker can craft a malicious URL that redirects users to a malicious website, leading to potential phishing attacks or the exploitation of other vulnerabilities.
remediation: |
Upgrade to the latest version of Django or apply the relevant patch provided by the Django project.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 301
-# digest: 4a0a004730450220675fcf2003c58b0f4a17cc9c464bc2258c400f20dc83ba8521fd7ef9e1abf684022100a2d7b2fdc63dee5dd50aaccf1c4436adedf8d0a9ab521643850229f86ecda5bb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008eb325406f3b381f24b0138441f39ebbe9f1c4232104f304ff132c5e75e3335302210099c15fb6ce8201c103a69788ee4eb4a1f27e39257ae40078ddea19e80b821e14:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-14728.yaml b/http/cves/2018/CVE-2018-14728.yaml
index 1a175e174e..e04fd74fed 100644
--- a/http/cves/2018/CVE-2018-14728.yaml
+++ b/http/cves/2018/CVE-2018-14728.yaml
@@ -5,6 +5,8 @@ info:
author: madrobot
severity: critical
description: Responsive filemanager 9.13.1 is susceptible to server-side request forgery in upload.php via the url parameter.
+ impact: |
+ An attacker can exploit this vulnerability to bypass security controls, access internal resources, and potentially perform further attacks.
remediation: |
Upgrade to a patched version of Responsive Filemanager or apply the necessary security patches to mitigate the SSRF vulnerability.
reference:
@@ -36,4 +38,4 @@ http:
part: body
regex:
- "root:.*:0:0:"
-# digest: 490a0046304402205ba0061904ecc9d617b9914382463267a0fba619544849766dafb0e4a1f6b19b022021ba4533ec0dc1ee326d07126f866be17d69b9b2f1bc60d3b5576e98c2e3aef2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022014ff41efa0fa46b999efc7034d1de4b1d83688c6a8d4625f3fb73937ccc37dcb02205de22757069bbe19e3f8bb95c3157aca4b616feafff7108e867a0a7f467cc410:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-14916.yaml b/http/cves/2018/CVE-2018-14916.yaml
index add54978c8..f6488ad9ff 100644
--- a/http/cves/2018/CVE-2018-14916.yaml
+++ b/http/cves/2018/CVE-2018-14916.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: critical
description: Loytec LGATE-902 versions prior to 6.4.2 suffers from a local file inclusion vulnerability.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the device.
remediation: |
Upgrade the Loytec LGATE-902 device to version 6.4.2 or later to mitigate the vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e93698b59ae2043cd7b2c24d0aa1f3fee7fe1ab9463a716112cb8e6314bd822c022016a935afcf0994c6e6808e1824dc34e7222c6b1264bca56b1c283692ad227fc5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100a0a4114bdb83e7e6cc14c9982396554803968368529bdd011bc3b5153ac5042b022006d47aab742e1084692b36198078d7fd3480ad0d997e3569a400d7b257b6d5fb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-14918.yaml b/http/cves/2018/CVE-2018-14918.yaml
index 1b2341ccbd..db0d4fb837 100644
--- a/http/cves/2018/CVE-2018-14918.yaml
+++ b/http/cves/2018/CVE-2018-14918.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
LOYTEC LGATE-902 6.3.2 is susceptible to local file inclusion which could allow an attacker to manipulate path references and access files and directories (including critical system files) that are stored outside the root folder of the web application running on the device. This can be used to read and configuration files containing, e.g., usernames and passwords.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the device, potentially leading to unauthorized access or information disclosure.
remediation: |
Apply the latest firmware update provided by LOYTEC to fix the LFI vulnerability.
reference:
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100cbe3295ee5e6574d7eb73d9160a3121080960ad83a3e0cb3fa9be183be9fe5e8022100db1bc0331ac2a2ca580ed7f98fb24ee38117d8dd72f88f05fdc60c7cb3749a31:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100ac5bdac032fa1f86830731897a94b28a6839ab4aef6bcf654490af18c7b89b8b022100dc1f6769b4f4e2f0a072fd6cf7c6103a9bc87c4bc69159a95323775ea6a034ec:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-14931.yaml b/http/cves/2018/CVE-2018-14931.yaml
index df49ec5cf0..4865e4f279 100644
--- a/http/cves/2018/CVE-2018-14931.yaml
+++ b/http/cves/2018/CVE-2018-14931.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Polarisft Intellect Core Banking Software Version 9.7.1 is susceptible to an open redirect issue in the Core and Portal modules via the /IntellectMain.jsp?IntellectSystem= URI.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the theft of sensitive information.
remediation: |
Apply the latest security patches or updates provided by Polarisft to fix the open redirect vulnerability.
reference:
@@ -34,4 +36,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-# digest: 4a0a00473045022100aed674e2aa9219b7edf4b423ae6cecedabe30806dcab19d673dc0294380598af02207dc3decfec02badfc4e477541125fed2cc76b33cfaa9895e688e376b07efb4c0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100952f4e06b256687fdeb9f4452bfd8ca4b2fe74688a71dea5ef6cc6d690d426010221008c394a7c7c8d37003e53d08a217d17132481e414d91bb8fec18321be2366edfd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-15138.yaml b/http/cves/2018/CVE-2018-15138.yaml
index 66e5c5d024..b1d4888710 100644
--- a/http/cves/2018/CVE-2018-15138.yaml
+++ b/http/cves/2018/CVE-2018-15138.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: high
description: Ericsson-LG iPECS NMS 30M allows local file inclusion via ipecs-cm/download?filename=../ URIs.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the target system, potentially leading to unauthorized access or information disclosure.
remediation: |
Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402202f124248993872edb7264ac5a39ac4d40f4342cec3beb2e0f1de23376f92177b0220044de4625949ecd879b015d2954f6d6d0f5d1f7d984f89817ffaafb225499902:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100b7bcf9a6f1c466fb9475a9a3067017085396a60a3ce03b48b78534d22f9cd60a02205882a1cd98063f2fa7d5ce7341ad0760f9b61fd37dca55237bc6699084135c94:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-15517.yaml b/http/cves/2018/CVE-2018-15517.yaml
index 46eb341021..1ea847bab5 100644
--- a/http/cves/2018/CVE-2018-15517.yaml
+++ b/http/cves/2018/CVE-2018-15517.yaml
@@ -5,6 +5,8 @@ info:
author: gy741
severity: high
description: D-Link Central WifiManager is susceptible to server-side request forgery. The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI. This can undermine accountability of where scan or connections actually came from and or bypass the FW etc. This can be automated via script or using a browser.
+ impact: |
+ Successful exploitation of this vulnerability could lead to unauthorized access to internal resources, data leakage, and potential compromise of the entire network.
remediation: |
Apply the latest security patches or updates provided by D-Link to fix the SSRF vulnerability in Central WifiManager.
reference:
@@ -36,4 +38,4 @@ http:
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"
-# digest: 4b0a00483046022100d66a4d99f5537882b6c9570f14bcef3de3f92fb899332e84faa67c4632a64b0f022100a319966f11754e509a726a3a7ab1b32b3d2e073ac490caff2b1492127977e17d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e348737b605b08be54e205caa8c5bab94855c04ab9eade358706b4709167b4bf022100c75c81f077961bd41bc6d037f8587b350bb3eab8bd2866d54c50beb721fc72be:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-15535.yaml b/http/cves/2018/CVE-2018-15535.yaml
index 110de1e143..fd7150c97c 100644
--- a/http/cves/2018/CVE-2018-15535.yaml
+++ b/http/cves/2018/CVE-2018-15535.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Responsive FileManager before version 9.13.4 is vulnerable to local file inclusion via filemanager/ajax_calls.php because it uses external input to construct a pathname that should be within a restricted directory, aka local file inclusion.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
remediation: |
Upgrade to Responsive FileManager version 9.13.4 or later to fix the vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022005e6731e75b9f07892e106a164741f48ffd69783b1cca658544d40285422eee9022100ab32d3ebc539748ac788fea5c8bb2e4d89887cf1faf54888ac1f8706bb2507db:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220008949825f275d63efd906265e62d12c7fbf214cd71d1a088371ed0186d4774d0221008bfadcfef8c5eff615186f26cf48f5fc7377e33e5417428297b76323f787d06c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-15745.yaml b/http/cves/2018/CVE-2018-15745.yaml
index bffd345472..1ed9482828 100644
--- a/http/cves/2018/CVE-2018-15745.yaml
+++ b/http/cves/2018/CVE-2018-15745.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Argus Surveillance DVR 4.0.0.0 devices allow unauthenticated local file inclusion, leading to file disclosure via a ..%2F in the WEBACCOUNT.CGI RESULTPAGE parameter.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server.
remediation: |
Upgrade to a patched version of Argus Surveillance DVR.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b5e1464fb61a895f4f9ca9b9c8f8996050502cd99bdd0f8df8cbc54d6c17399302200121d1e5efc868b0ed74fd0b8352ebbb66db1af0119735cd55f874e536d3461e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f6288b19120fdaa738aed697a4829c5d9b0fe554a829787bdc32524cda307310022100d6d0757761cada3d4070c3f656fb94c7dc20102669037c70944c9edb8e2ed9e1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-15961.yaml b/http/cves/2018/CVE-2018-15961.yaml
index d10dfab75d..d9d28de69d 100644
--- a/http/cves/2018/CVE-2018-15961.yaml
+++ b/http/cves/2018/CVE-2018-15961.yaml
@@ -5,6 +5,8 @@ info:
author: SkyLark-Lab,ImNightmaree
severity: critical
description: Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlier, and Update 14 and earlier have an unrestricted file upload vulnerability. Successful exploitation could lead to arbitrary code execution.
+ impact: |
+ Successful exploitation of this vulnerability can result in remote code execution, allowing an attacker to take control of the affected system.
remediation: |
Apply the necessary security patches or updates provided by Adobe to fix this vulnerability.
reference:
@@ -74,4 +76,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022027f3e1825c29bdfd98d3c206ae75ebc49d7afb72c7eb695eb460cce0a9628955022100bb2949edb9b9be4919f56dc23371c5a7cae7a8987e309287a281b4a802cbf162:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202ea3883204a4effb1a5a6528cb554f7cbac69a7b5e7a10098686e742f128cfc8022100f88820e3ea537d64a035cfa822a942de6c1bbc332b57bd38d2e45129a1e03990:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16059.yaml b/http/cves/2018/CVE-2018-16059.yaml
index 72b34defed..5e3aa4e6fb 100644
--- a/http/cves/2018/CVE-2018-16059.yaml
+++ b/http/cves/2018/CVE-2018-16059.yaml
@@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: WirelessHART Fieldgate SWG70 3.0 is vulnerable to local file inclusion via the fcgi-bin/wgsetcgi filename parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the system, potentially leading to unauthorized access or information disclosure.
remediation: |
Apply the latest security patches or updates provided by the vendor to fix the LFI vulnerability in WirelessHART Fieldgate SWG70 3.0.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a3fb19119f16e5d0c22dcf53221632b41bb51e451223c97dc138f5dfcd04f1ec022100f0a53833bc0aac40ab450c5c2386fb166ecc87d603d24d1b40d5b03fc2b531d7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502200bfc10d29eb9db4a52fd0ff17235654873176c4e7b8bf8d17a7d42e698a1d54c022100b8f6c1a7a225b6b7a9c6b392c59ef6a1de05c0007211c4402c9248c4b12abb5e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16133.yaml b/http/cves/2018/CVE-2018-16133.yaml
index 792ad44ca5..d366cafeaf 100644
--- a/http/cves/2018/CVE-2018-16133.yaml
+++ b/http/cves/2018/CVE-2018-16133.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Cybrotech CyBroHttpServer 1.0.3 is vulnerable to local file inclusion in the URI.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, remote code execution, and potential compromise of the affected system.
remediation: |
Apply the latest security patches or updates provided by the vendor to fix the LFI vulnerability in Cybrotech CyBroHttpServer 1.0.3.
reference:
@@ -41,4 +43,4 @@ http:
- "fonts"
- "extensions"
condition: and
-# digest: 490a00463044022079074c50ec90bedfcc6743c1ac875ae6d6c9c545d9a67733d11e4aa5d67d237f0220138f274e6923fba65634392a617360a81b291249ed00ddad5e402ef8a7b3dbad:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100edc7c7acd7e9ddc8f6d19c366651d30ec02b31f2a47e4d95062c11d2b10dd2af022100a6690a7c1cf14bfc7e282c557704e8e67689cecb4da7ded13590108920be6e78:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16139.yaml b/http/cves/2018/CVE-2018-16139.yaml
index bfe45ccd02..377a36b891 100644
--- a/http/cves/2018/CVE-2018-16139.yaml
+++ b/http/cves/2018/CVE-2018-16139.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
BIBLIOsoft BIBLIOpac 2008 contains a cross-site scripting vulnerability via the db or action parameter to bin/wxis.exe/bibliopac/, which allows a remote attacker to inject arbitrary web script or HTML.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest patch or upgrade to a newer version of BIBLIOsoft BIBLIOpac 2008 that addresses the XSS vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022011e1a765f78fed23e65557fd3954ded3d5d56fbbf2e62ad41c8737fc5f991a2f02210097539b4f1de19c0c7a313c6f7b1bd72b917df57c0b0597ace27bdf5c3a522992:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f7cecd18d3bc31ddf34dc595afa19c5d22c668abd3ef2ef12f0e82cd3e486df1022100f7b1ad1b18cc5e23c63868452b90d0ff7c62138abf09559d515910fcccbfcb45:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16159.yaml b/http/cves/2018/CVE-2018-16159.yaml
index 9dba71fb60..e18ef2c29e 100644
--- a/http/cves/2018/CVE-2018-16159.yaml
+++ b/http/cves/2018/CVE-2018-16159.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
WordPress Gift Vouchers plugin before 4.1.8 contains a blind SQL injection vulnerability via the template_id parameter in a wp-admin/admin-ajax.php wpgv_doajax_front_template request. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to extract sensitive information from the database.
remediation: Fixed in version 4.1.8.
reference:
- https://wpscan.com/vulnerability/9117
@@ -47,4 +49,4 @@ http:
- 'contains(content_type, "application/json")'
- 'contains(body, "images") && contains(body, "title")'
condition: and
-# digest: 4a0a00473045022041da8934aef02c1d1921dd28d4740f84581635b25bacce8f4e9a8e52303a3672022100f24d15c54261799482bf921b35d233a0470b004afa0bfa6ddbeed750d8239037:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502207e0c66bf2257b1f95bc3917f50ab45b30e6a4dd83496c1bf9b331e02bfaafc9f022100a199a8737d8081dc0061ef53e4d00eee14663a6e2991c07c59b70a9b574217f4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16167.yaml b/http/cves/2018/CVE-2018-16167.yaml
index a151cf7b7d..dcd6ba14cc 100644
--- a/http/cves/2018/CVE-2018-16167.yaml
+++ b/http/cves/2018/CVE-2018-16167.yaml
@@ -5,6 +5,8 @@ info:
author: gy741
severity: critical
description: LogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.
+ impact: |
+ Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the target system.
remediation: |
Upgrade LogonTracer to a version higher than 1.2.0.
reference:
@@ -41,4 +43,4 @@ http:
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- http
-# digest: 4a0a0047304502200c102b86b0c68d244cdbc942e8499c2982027c10621d2abf05b5798cc105647a022100ec9d36d36322b02bcf9c89f8391cc8400c2b188d8f869b1bf303940101617d68:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402207029b8ea7fa8c68f08425c2f54517e7d9f59d797a3269122bbd94131d8811baa02207c305c3139e642a717567be4d31ca357f108bc6d00d3217139e44fdd3c0ebfa2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16288.yaml b/http/cves/2018/CVE-2018-16288.yaml
index 9376a40400..6b101f82a3 100644
--- a/http/cves/2018/CVE-2018-16288.yaml
+++ b/http/cves/2018/CVE-2018-16288.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
LG SuperSign CMS 2.5 allows reading of arbitrary files via signEzUI/playlist/edit/upload/..%2f URIs - aka local file inclusion.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files, execute arbitrary code, or launch further attacks.
remediation: |
Apply the latest security patches or upgrade to a patched version of LG SuperSign EZ CMS.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b986c0c96baa92b2372182af5c62f833fa4164809ce68f81b8ca61248be0a8de02204b6f26f2a367d767a4680ae1cb1cd006d4636a7ffbd70f4b3879bea08d857764:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022031367cb31d4dc9482f6cab37e2f94866dd9c92ba02eccc0e0a41648bf98cd15102206eb324e21841db77697ab3f3113bc4c6f724549d11eeb30741756870f42c1c0f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16299.yaml b/http/cves/2018/CVE-2018-16299.yaml
index 5d1086b6bd..bac78bcc29 100644
--- a/http/cves/2018/CVE-2018-16299.yaml
+++ b/http/cves/2018/CVE-2018-16299.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
WordPress Localize My Post 1.0 is susceptible to local file inclusion via the ajax/include.php file parameter.
+ impact: |
+ An attacker can exploit this vulnerability to read sensitive files on the server.
remediation: |
Update to the latest version of WordPress Localize My Post plugin.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402200c00ef034465dcb65667421f2b92b127bacd21b0ac636ec96124fae3a3f4e35902203e29e815c05e73f73271c1ffa3248370265dbcf089b4cb566a9e3d4739e012a5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022030ea9d78b08143eb6a9b24778e5ddcb47733d608d23525ded1598060985eec5a022055ad6cf09b83fa3afd8998ae2c293c7aca0c2414a7b2cd9cd7bb4880c018220c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16341.yaml b/http/cves/2018/CVE-2018-16341.yaml
index 5e237e081a..2eb2398ca0 100644
--- a/http/cves/2018/CVE-2018-16341.yaml
+++ b/http/cves/2018/CVE-2018-16341.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Nuxeo prior to version 10.3 is susceptible to an unauthenticated remote code execution vulnerability via server-side template injection.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Upgrade Nuxeo to version 10.3 or later to mitigate this vulnerability.
reference:
@@ -26,5 +28,4 @@ http:
part: body
words:
- "31333333337"
-
-# digest: 490a00463044022059a51103f6f4ecdcf4d6c60198ce852e3a140a9ab22cf3171b45345cc35dac9c022071bb3d4196fbb3916aa58945e922a4035e8e72aa9f65794a75547ecbf3f05bd6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022017a2a773e0a8c43949c4027d6437f57793abc123d2c7261c898df8c37a3837af02206bcaf8386cd8920db888038d5d0ee827d956b2cc5222be63bb1649ac54c8d3a5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16668.yaml b/http/cves/2018/CVE-2018-16668.yaml
index 7e6b75e961..aa7b0f3ca9 100644
--- a/http/cves/2018/CVE-2018-16668.yaml
+++ b/http/cves/2018/CVE-2018-16668.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: CirCarLife before 4.3 is susceptible to improper authentication. An internal installation path disclosure exists due to the lack of authentication for /html/repository.System. An attacker can obtain sensitive information, modify data, and/or execute unauthorized operations.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive data, compromising the confidentiality and integrity of the system.
remediation: |
Upgrade CirCarLife to version 4.3 or higher to fix the improper authentication issue.
reference:
@@ -44,4 +46,4 @@ http:
- "** Platform sources **"
- "** Application sources **"
condition: and
-# digest: 4a0a00473045022100ad6fe616e3e804f193c67c2fa020485c0296f86a09b8004109c958448fa93011022009ceed8b70e5ad3989807a48af24f9054cb1011c571f723099b113814607451f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100caf372831772e7dc3291b27557963fe6e4d0972ed8776e9d63b3696166d6564f02207bce46176fcb607294c9b654458450771cd3f26f2cbfeaaafe620bc65dba1835:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16671.yaml b/http/cves/2018/CVE-2018-16671.yaml
index c5cee0cf82..b845d9201d 100644
--- a/http/cves/2018/CVE-2018-16671.yaml
+++ b/http/cves/2018/CVE-2018-16671.yaml
@@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: CirCarLife before 4.3 is susceptible to improper authentication. A system software information disclosure exists due to lack of authentication for /html/device-id. An attacker can obtain sensitive information, modify data, and/or execute unauthorized operations.
+ impact: |
+ Successful exploitation of this vulnerability can lead to unauthorized access to sensitive data, compromising the confidentiality and integrity of the system.
remediation: |
Upgrade CirCarLife to version 4.3 or higher to fix the improper authentication issue.
reference:
@@ -46,4 +48,4 @@ http:
part: body
regex:
- "(19|20)\\d\\d[- /.](0[1-9]|1[012])[- /.](0[1-9]|[12][0-9]|3[01])"
-# digest: 4a0a00473045022100b7b5b59bc8cc4bc989bbc5bdcab8ec34d83c2a8ddab8d2be64ab40667cad23b3022002ad8a86d17820d0d18bab87d70a7cdbab09491a7e285ece17883e3dc9d555e1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502200ce2d4efe87a9a002725838e84f97f18d41f8687d30ca0457a11fa3947fbcef9022100b0117104e0bfe4eff4361575be3eb05f5db60801f4b83975728dc12f2c878e94:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16716.yaml b/http/cves/2018/CVE-2018-16716.yaml
index de3ac4007a..6692262be0 100644
--- a/http/cves/2018/CVE-2018-16716.yaml
+++ b/http/cves/2018/CVE-2018-16716.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: critical
description: NCBI ToolBox 2.0.7 through 2.2.26 legacy versions contain a path traversal vulnerability via viewcgi.cgi which may result in reading of arbitrary files (i.e., significant information disclosure) or file deletion via the nph-viewgif.cgi query string.
+ impact: |
+ An attacker can view, modify, or delete sensitive files on the server, potentially leading to unauthorized access, data leakage, or system compromise.
remediation: |
Apply the latest patch or update from the vendor to fix the directory traversal vulnerability in the NCBI ToolBox.
reference:
@@ -38,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205791ec953bbc3bcbe750accae8a89e5e7cb8117611effbd6091d3502872aa79402205d13b8bd62c13e6a440b8beb005865982e32b2ebbb8489c16ed919399a9c3924:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210085d8fbddbeb5957650f4e95e026b14aaccdfce34f39ba2e17aef46dbc14a504002203cea283f109ccb847450587da60f0459b2f3a1ff54c203f98b5104b725b4d136:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16761.yaml b/http/cves/2018/CVE-2018-16761.yaml
index 71c0839283..eebbf279c4 100644
--- a/http/cves/2018/CVE-2018-16761.yaml
+++ b/http/cves/2018/CVE-2018-16761.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Eventum before 3.4.0 contains an open redirect vulnerability. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the theft of sensitive information.
remediation: |
Upgrade to Eventum version 3.4.0 or later to fix the open redirect vulnerability.
reference:
@@ -38,4 +40,4 @@ http:
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-# digest: 4a0a00473045022100e68e354987d451e277ccac2c10468cdf6d87beea8597aa753a9e8f4751df4abc022021779a80486b81aafaf24911ab853093579be4881ad7f3b7fbe4b06b4e7b90c9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022047b620e8e0ce5b9f239d17672bdbc010a2ea2503e92d99eead51281386314541022100fa376ae6dafb9770e1761305da2b8eddff166c5916b135d3c8f20e00850714ef:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16763.yaml b/http/cves/2018/CVE-2018-16763.yaml
index 88109be094..e7c29015ec 100644
--- a/http/cves/2018/CVE-2018-16763.yaml
+++ b/http/cves/2018/CVE-2018-16763.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: critical
description: FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the target system, leading to complete compromise of the application and potentially the underlying server.
remediation: |
Upgrade to FUEL CMS version 1.4.2 or later, which includes a patch for this vulnerability.
reference:
@@ -42,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207b6ce05bfa6b99931dd7e21c4dddd04e681570f65f89405613a333e0a3f6491b02210085d493b62357f6d8f411196c412ea5c7679875ca597d0f89a12cb604351854bb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022026fd2c9dad267c5a6fbd50909f735595b1c7064aed449a41226da2a324634aa8022100f3d8e9e666410b97e2c9b29f619787c9506b2e37599d0a2fc5c66cae27311cfb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16836.yaml b/http/cves/2018/CVE-2018-16836.yaml
index c030277670..479e4f0f35 100644
--- a/http/cves/2018/CVE-2018-16836.yaml
+++ b/http/cves/2018/CVE-2018-16836.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: critical
description: Rubedo CMS through 3.4.0 contains a directory traversal vulnerability in the theme component, allowing unauthenticated attackers to read and execute arbitrary files outside of the service root path, as demonstrated by a /theme/default/img/%2e%2e/..//etc/passwd URI.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server.
remediation: |
Upgrade to a patched version of Rubedo CMS (>=3.4.1) or apply the provided security patch.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022038360eaa180dfdef9ac218b0e51cb48e5a9cee0d967f56fb06ba449131807fd5022100c6a4787d094357262990ecd70aea2ca35ad457f02a26f134d9091d277ae363b6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502210099479d2bade258189160293fb9fb6399ae83fe19db85de8045640eb8b8edcac0022066e5d47db305d1c7dd4b45c32568a3f8173f588ff886ea976cc59accf58d4160:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-16979.yaml b/http/cves/2018/CVE-2018-16979.yaml
index 60f0018c15..dc302ff8a9 100644
--- a/http/cves/2018/CVE-2018-16979.yaml
+++ b/http/cves/2018/CVE-2018-16979.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Monstra CMS 3.0.4 is susceptible to HTTP header injection in the plugins/captcha/crypt/cryptographp.php cfg parameter. An attacker can potentially supply invalid input and cause the server to allow redirects to attacker-controlled domains, perform cache poisoning, and/or allow improper access to virtual hosts not intended for this purpose. This is a related issue to CVE-2012-2943.
+ impact: |
+ This vulnerability can lead to various attacks such as session hijacking, cross-site scripting (XSS), and remote code execution (RCE).
remediation: |
Upgrade Monstra CMS to version 3.0.5 or later to mitigate the HTTP Header Injection vulnerability.
reference:
@@ -43,4 +45,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e83dd7b3545ce41cf7087d4e8eed0d83e5ddab49c26c8d8db558b4f6e5110266022063fd8abf645291922139f4844ce91827cf35a875d7659dbaefb470fb76dc0dcb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204fb12023533296276ddddb7f4c0dca7e6c90a512bd1603ddac51a9f214397438022100de788991d48ce8d2df6ec03bbf2c6074c55a7efcc4ef73bb412ad4facc6d14aa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-17153.yaml b/http/cves/2018/CVE-2018-17153.yaml
index 59a662126d..7cc7c7ea3b 100644
--- a/http/cves/2018/CVE-2018-17153.yaml
+++ b/http/cves/2018/CVE-2018-17153.yaml
@@ -6,6 +6,8 @@ info:
severity: critical
description: |
It was discovered that the Western Digital My Cloud device before 2.30.196 is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called \"cgi_get_ipv6\" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter \"flag\" with the value \"1\" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie.
+ impact: |
+ An attacker can bypass authentication and gain unauthorized access to the device, potentially leading to data theft or unauthorized control of the NAS.
remediation: |
Apply the latest firmware update provided by Western Digital to fix the authentication bypass vulnerability.
reference:
@@ -47,4 +49,4 @@ http:
- contains(body, "ganalytics")
- status_code == 200
condition: and
-# digest: 4a0a0047304502202da97720846ca9e84a28ac1344cfcca4ed1190971d23f84bc508df03d974cc59022100b6ee2479d225da541a95a17b1de9849e143244f91190c0bed9fb5ae41df07e65:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d20f9bd82d848fd52f8021d862a8aab244b2fa2bbc9dabf59d02ad9ea2fb7ac002207e6d055f2b948e93a99ae4a6b6bdb9ccf54547a21ca1fdd838064f4c54cfc699:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-17246.yaml b/http/cves/2018/CVE-2018-17246.yaml
index e0f90055bb..4c28afa9af 100644
--- a/http/cves/2018/CVE-2018-17246.yaml
+++ b/http/cves/2018/CVE-2018-17246.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha,thelicato
severity: critical
description: Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute JavaScript which could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server, leading to potential information disclosure and further attacks.
remediation: |
Apply the latest security patches and updates provided by the vendor to mitigate this vulnerability.
reference:
@@ -51,4 +53,4 @@ http:
part: header
words:
- "application/json"
-# digest: 4b0a00483046022100fc1fb57b927865cf23d832405636f3b9bed49385ae346919d733bed1f38c3370022100f0fc6ed7b9f4e47d122379484cb90a0415ef3bec1a724b22521c7a254b724131:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e19dd0c69dd68b88c52971dc65ba9b1552afe873c6552db27c5c84daa1cb5262022100da464e134545f68cf2550c6dfd32c9fd88dce6a8e132622db659a41af2ea16ac:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-17254.yaml b/http/cves/2018/CVE-2018-17254.yaml
index 5a6e0bd12a..e33c66d185 100644
--- a/http/cves/2018/CVE-2018-17254.yaml
+++ b/http/cves/2018/CVE-2018-17254.yaml
@@ -5,6 +5,8 @@ info:
author: Suman_Kar
severity: critical
description: The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data manipulation, or data leakage.
remediation: Update or remove the affected plugin.
reference:
- http://packetstormsecurity.com/files/161683/Joomla-JCK-Editor-6.4.4-SQL-Injection.html
@@ -38,4 +40,4 @@ http:
part: body
words:
- '{{md5(num)}}'
-# digest: 4a0a00473045022100f46dec1bb0bd4dfe210a2f29b13a1a075b01bb385d01118874d9aaf6adab040c0220498b24f54dfd34575da35c00b489cad51cd6aa646b4a3ee10e4efe2f08dc3ee9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d281a66380f218c040583ca45da5631e52ca10dae41652236336600c29e07430022071ccc73e71124a5d104f3732269ed3a1fa1415d0c388c22a28460b188c398bd7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-17422.yaml b/http/cves/2018/CVE-2018-17422.yaml
index e9df96e631..98a34aba79 100644
--- a/http/cves/2018/CVE-2018-17422.yaml
+++ b/http/cves/2018/CVE-2018-17422.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
dotCMS before 5.0.2 contains multiple open redirect vulnerabilities via the html/common/forward_js.jsp FORWARD_URL parameter or the html/portlet/ext/common/page_preview_popup.jsp hostname parameter. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the installation of malware.
remediation: |
Upgrade to a version of DotCMS that is higher than 5.0.2 to mitigate the open redirect vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
words:
- "self.location = 'http://evil.com'"
- "location.href = 'http\\x3a\\x2f\\x2fwww\\x2eevil\\x2ecom'"
-# digest: 490a004630440220764e714391324e71519aaa1566713979cb48a419e59b64d3b4201a6237a2fc4302207adf0922d92981fdcad0d44ed3e97b43e55b3c966bbc2fe7fc4246f8dde8a626:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402207fff7a89a291c247ce3e33712e522aaf653c4789d54404d0ab3e15212a5abdb402202536232c184bf37c893b6f45d63519126783206d7e46d26f85e1a8f8322ea575:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-17431.yaml b/http/cves/2018/CVE-2018-17431.yaml
index 11e76aaf60..567fa239f7 100644
--- a/http/cves/2018/CVE-2018-17431.yaml
+++ b/http/cves/2018/CVE-2018-17431.yaml
@@ -5,6 +5,8 @@ info:
author: dwisiswant0
severity: critical
description: Comodo Firewall & Central Manager (UTM) All Release before 2.7.0 & 1.5.0 are susceptible to a web shell based remote code execution vulnerability.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
remediation: |
Apply the latest security patches or updates provided by Comodo to fix this vulnerability.
reference:
@@ -48,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210082001249f68dfb2fbd0709410682f398e554138bd7c47eaac9146b70fd9b9b4a02203c4caf4d9e6dd1fc5d4b0064d56b09a8b61deea85e0561a1212b6d65a6c02251:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c61cb461fed0c28ef7b72aaba2cc8b6f340dc281adb0c21cecbd9b08d14f297d02201bd55f622da9fb615643bebcaa087b28cc73287e0592c2ff8b76473f8e6e114a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-18069.yaml b/http/cves/2018/CVE-2018-18069.yaml
index 1790772bb5..010c50e864 100644
--- a/http/cves/2018/CVE-2018-18069.yaml
+++ b/http/cves/2018/CVE-2018-18069.yaml
@@ -5,6 +5,8 @@ info:
author: nadino
severity: medium
description: WordPress plugin sitepress-multilingual-cms 3.6.3 is vulnerable to cross-site scripting in process_forms via any locale_file_name_ parameter (such as locale_file_name_en) in an authenticated theme-localization.php request to wp-admin/admin.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft or unauthorized actions.
remediation: |
Update WordPress sitepress-multilingual-cms to the latest version to mitigate the XSS vulnerability.
reference:
@@ -41,4 +43,4 @@ http:
- 'contains(set_cookie, "_icl_current_admin_language")'
- 'contains(body, "\">")'
condition: and
-# digest: 490a004630440220751db0953aee0c0b063ad1a27c18ff3cb7a7804525600ccc8c9185de8536768502200711cfae316e48931a4e7f0fc3bdcc6a769a13baf88e070d9e99fa8210fb445c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022025096c0add9eded7737dac192f3967cdd798afe2bea6264336b9416338ca7537022100e17fc6a1cfa18c1d89c565d599d67a015f6c16cd65232e1022bc682a94aa76a9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-18264.yaml b/http/cves/2018/CVE-2018-18264.yaml
index 81c8fb17c3..9b56e4b421 100644
--- a/http/cves/2018/CVE-2018-18264.yaml
+++ b/http/cves/2018/CVE-2018-18264.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster.
+ impact: |
+ An attacker can bypass authentication and gain unauthorized access to the Kubernetes Dashboard, potentially leading to further compromise of the Kubernetes cluster.
remediation: |
Upgrade to Kubernetes Dashboard version 1.10.1 or later to mitigate the authentication bypass vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100b24742f63a05b3f5b6bdc1d2d21476de48f066464ca01da7b1be4543fbc4dd2f022100cc9366d107751747cd7ffebd6629c170603b1287dba02c55e227d968992ae717:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022008ca3c376b75bd33f0781f8f393afd285ae62302db8637a426727ee93fd7135e022100e3f92d05fe1c30436b29225aeda8463158fa9b01db4f9649f1791ee0f917f517:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-18323.yaml b/http/cves/2018/CVE-2018-18323.yaml
index 93fc09a449..c2c16ddf3f 100644
--- a/http/cves/2018/CVE-2018-18323.yaml
+++ b/http/cves/2018/CVE-2018-18323.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Centos Web Panel version 0.9.8.480 suffers from local file inclusion vulnerabilities. Other vulnerabilities including cross-site scripting and remote code execution are also known to impact this version.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to read sensitive files on the server.
remediation: |
Upgrade to a patched version of Centos Web Panel.
reference:
@@ -41,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210094e1e91c112925f02574355a647acaa935bdf59e8b47c1e81a3daae79422ecb5022100878ef436f6a39ba4681024e8a509e97297686d3963b21830bd01278a1a75b62e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e68d62f7ad1346d100c40736e9b5f836af425f2907ede7b06213c9f8638b606d022100e434c324535cac337bcedad0838fe445311a0dc98a211a8b2cd644145dffe07e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-18570.yaml b/http/cves/2018/CVE-2018-18570.yaml
index ef0280cd30..203743f286 100644
--- a/http/cves/2018/CVE-2018-18570.yaml
+++ b/http/cves/2018/CVE-2018-18570.yaml
@@ -5,6 +5,8 @@ info:
author: emadshanab
severity: medium
description: Planon before Live Build 41 is vulnerable to cross-site scripting.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest patch or upgrade to a non-vulnerable version of Planon Live Build.
reference:
@@ -44,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502201615f098a9736da7233e87a52f0b667704189f2dc0493d73912c81a4273ad4c7022100aa1854ae9596595bdcaeac92dd2fb1b5fdefed6b6a11e06f550fd60a0d7d7905:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220521f81939e04c8b11e7399207b5ff5241471783cac11ccbef6ec58b8bfa303df022100dd39e8d49b1067ee52556b028ba715132fe4ca43582b4964267ec4d526989621:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-18608.yaml b/http/cves/2018/CVE-2018-18608.yaml
index 798265ea62..19b5646518 100644
--- a/http/cves/2018/CVE-2018-18608.yaml
+++ b/http/cves/2018/CVE-2018-18608.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
DedeCMS 5.7 SP2 is vulnerable to cross-site scripting via the function named GetPageList defined in the include/datalistcp.class.php file that is used to display the page numbers list at the bottom of some templates, as demonstrated by the PATH_INFO to /member/index.php, /member/pm.php, /member/content_list.php, or /plus/feedback.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version of DedeCMS or apply the official patch provided by the vendor to fix the XSS vulnerability.
reference:
@@ -50,4 +52,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207de6b92f9c88d9f8ab31ef04426d5f72e7af7f7cd0cfbc95e600fdd829dff7e5022100a2a0ea844c51ead4cbc7e803687aee449c54692cccf9eed22ad48744eaf5bfe6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008ed2619cee872ea0b25fdec8aef5bf8388725b6cbf22e828af2b10dbcd82aa490221008fe627c8e0b749ea1962a991ac79480fb8032491a34d19359a2a5bff957743a7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-18775.yaml b/http/cves/2018/CVE-2018-18775.yaml
index 314a86fa43..278adf6bec 100644
--- a/http/cves/2018/CVE-2018-18775.yaml
+++ b/http/cves/2018/CVE-2018-18775.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: medium
description: Microstrategy Web 7 does not sufficiently encode user-controlled inputs, resulting in cross-site scripting via the Login.asp Msg parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patches or updates provided by Microstrategy to fix the XSS vulnerability in the Web 7 application.
reference:
@@ -45,4 +47,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c4c435cd00762eb2c9eccaf5de1c36ff3ecd25b4f3513f0244c0f8106cd5dc5d022100c4ebf543b3ae0a6360044a36c739abc8e88a24456d2d9dd38b7dcbdb2084556c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220266494839f4320d0266f61f16a5360640dcce7548bf95fe21794672fa19184ed02204c3cba0704d8c636c1a230a51b042bf23dec8310ea3a55596111ea75d50765c3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-18777.yaml b/http/cves/2018/CVE-2018-18777.yaml
index d351f6f220..a0dfdee854 100644
--- a/http/cves/2018/CVE-2018-18777.yaml
+++ b/http/cves/2018/CVE-2018-18777.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
Microstrategy Web 7 is vulnerable to local file inclusion via "/WebMstr7/servlet/mstrWeb" (in the parameter subpage). Remote authenticated users can bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application. NOTE: this is a deprecated product.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server.
remediation: |
Apply the latest security patches or upgrade to a newer version of Microstrategy Web.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009b423c63a3d2e04546b8dea5f2114289c3d4f18297c3df4b89eb022bba358114022100cc159f9e3e825224ece53277ac74c2323a4a7f49d8469bfc05548e9bf33f9bde:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402200d6d2ff87dba44b58403ea1645699256e37ab6181b0d2d009e3dff3618cdda8e02202259737bf64ca51ad14e96d0fc9cb8fdc8da62247c979d07c2a1cae0b231d0d0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-18778.yaml b/http/cves/2018/CVE-2018-18778.yaml
index a0e75d27f0..819d12900a 100644
--- a/http/cves/2018/CVE-2018-18778.yaml
+++ b/http/cves/2018/CVE-2018-18778.yaml
@@ -5,6 +5,8 @@ info:
author: DhiyaneshDK,dogasantos
severity: medium
description: ACME mini_httpd before 1.30 is vulnerable to local file inclusion.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server.
remediation: |
Upgrade ACME mini_httpd to version 1.30 or later to mitigate this vulnerability.
reference:
@@ -53,4 +55,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e6b7b548bde569b368312f5ac758f650aaec65f0da9daf841b5c3f559002c0c402210082add919636ce9ced41d96542d3b51387d54583c3c4e7cd2176c6740576e5786:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022038468c968d47ad446ab1cfd510be13223851e833702af08f2fa19e3b2d55cdf302204986bdaf5d56697ea6883a2cbe86d964f6f99ef709a39b20e0150649ba870f27:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-18809.yaml b/http/cves/2018/CVE-2018-18809.yaml
index 63809dc76c..9ba7ae7486 100644
--- a/http/cves/2018/CVE-2018-18809.yaml
+++ b/http/cves/2018/CVE-2018-18809.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
The default server implementation of TIBCO Software Inc.'s TIBCO JasperReports Library, TIBCO JasperReports Library Community Edition, TIBCO JasperReports Library for ActiveMatrix BPM, TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a directory-traversal vulnerability that may theoretically allow web server users to access contents of the host system.
+ impact: |
+ An attacker can access sensitive files, potentially leading to unauthorized disclosure of sensitive information.
remediation: |
Apply the latest security patches or upgrade to a patched version of TIBCO JasperReports Library.
reference:
@@ -47,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402207c08214931c6bd01893a31cd4dc36742c506df02c05e81633ff8e11b0740b71002200561fb80835f3ee23a7a0989e294606688360d6832196e0bf914ce045a04cb4b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204859d97f8c4c05b4634fadcc778e895623b6e67684f5f461228f22d1bff79920022100a9cff990042097e99304e63cf6140b081b0fc70c98137a6135d709e89f2b90cf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-18925.yaml b/http/cves/2018/CVE-2018-18925.yaml
index e45d1f7878..c58c977e81 100644
--- a/http/cves/2018/CVE-2018-18925.yaml
+++ b/http/cves/2018/CVE-2018-18925.yaml
@@ -5,6 +5,8 @@ info:
author: princechaddha
severity: critical
description: Gogs 0.11.66 allows remote code execution because it does not properly validate session IDs, as demonstrated by a ".." session-file forgery in the file session provider in file.go. This is related to session ID handling in the go-macaron/session code for Macaron.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
remediation: This issue will be fixed by updating to the latest version of Gogs.
reference:
- https://www.anquanke.com/post/id/163575
@@ -40,4 +42,4 @@ http:
- type: dsl
dsl:
- 'status_code_1 == 500 && status_code_2 == 200 && contains(body_2, "")'
-# digest: 4a0a00473045022017ccf157b9ab2896aaa03de0833881a381e2a09b77053cb3219070002bdd81ad022100df6574b0b987f2c32e9fcba515340a46ec3bef05f872f2efe59480b6f38086a7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009ef7dc8eabdf502adf2ea8bdc74e38ce2cd66868b181fc88754dafb02c670a6c022100bcafbd1d57bce06f3364805d946d141756fe0802f24b53ba677efd1a0342330f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-19136.yaml b/http/cves/2018/CVE-2018-19136.yaml
index 0463ca7686..d34619082b 100644
--- a/http/cves/2018/CVE-2018-19136.yaml
+++ b/http/cves/2018/CVE-2018-19136.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
DomainMOD 4.11.01 is vulnerable to reflected cross-site scripting via assets/edit/registrar-account.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version of DomainMOD or apply the vendor-provided patch to mitigate this vulnerability.
reference:
@@ -54,4 +56,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502204177e8926c3bdc58889bf1284f2c455976e462eda023a06c7e745ac99b28714a022100acf1d952072ae67c4d56564dd4d3e98627c72c74df5fa6cb2b595bb81ace2d22:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502204f301c5246853945eff93923827a60e52611a9a78c79c15becacc65b6db21236022100e55ba57fa82b3b890a0c9c7529f05d392d4515b0625a29d54d45780eda751be7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-19137.yaml b/http/cves/2018/CVE-2018-19137.yaml
index 07a671d189..ffa618c0f6 100644
--- a/http/cves/2018/CVE-2018-19137.yaml
+++ b/http/cves/2018/CVE-2018-19137.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
DomainMOD 4.11.01 is vulnerable to reflected cross-site Scripting via assets/edit/ip-address.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version of DomainMOD or apply the vendor-provided patch to mitigate this vulnerability.
reference:
@@ -53,4 +55,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ba2e01eccc37b26d8a81156d4c898d8fe4fdf4c49ac0c5554310d47ee27f541e022033f6e3ebfe2b629d93f879f598f849ba9095affd6db417a436676003101455e0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100b8b80cb827acebd82aec44a1c08b36097619340bc65fa829c2bf196de3d68d45022100eb79c2f34fc72750506bec357c368393d4e667db54cc2aff120a70574b665aac:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-19287.yaml b/http/cves/2018/CVE-2018-19287.yaml
index c5c17b3076..7df56138dc 100644
--- a/http/cves/2018/CVE-2018-19287.yaml
+++ b/http/cves/2018/CVE-2018-19287.yaml
@@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress Ninja Forms plugin before 3.3.18 contains a cross-site scripting vulnerability. An attacker can inject arbitrary script in includes/Admin/Menus/Submissions.php via the begin_date, end_date, or form_id parameters. This can allow an attacker to steal cookie-based authentication credentials and launch other attacks.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Upgrade to the latest version of the Ninja Forms plugin (3.3.18 or higher) to mitigate this vulnerability.
reference:
@@ -57,4 +59,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ba026d5bb06f15877023a164ba03d42ab7440fba85ada6cf144951973f027dc1022012a4ac9bf223d8aa0817516a4e731f6f415f56c6a42027c65ad5977aa6969be6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100b411059e8363c4a572600337f21146dd39cf5e140c8f72678cdd4ba2f168bcd6022100a92ec95a257ad9b13106e84ff3d553b2cf2f559670c8504b72fb8a8a159119e1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-19326.yaml b/http/cves/2018/CVE-2018-19326.yaml
index d750b31825..d188573b0f 100644
--- a/http/cves/2018/CVE-2018-19326.yaml
+++ b/http/cves/2018/CVE-2018-19326.yaml
@@ -6,6 +6,8 @@ info:
severity: high
description: |
Zyxel VMG1312-B10D 5.13AAXA.8 is susceptible to local file inclusion. A remote unauthenticated attacker can send a specially crafted URL request containing "dot dot" sequences (/../), conduct directory traversal attacks, and view arbitrary files.
+ impact: |
+ Successful exploitation of this vulnerability allows an attacker to read sensitive files on the target system.
remediation: |
Apply the latest firmware update provided by Zyxel to fix the Local File Inclusion vulnerability.
reference:
@@ -46,4 +48,4 @@ http:
part: body
regex:
- "root:.*:0:0:"
-# digest: 4b0a00483046022100a2699401224705f61c319383efad7d21bab4de91bf4366821568811ca7aacbd802210086aac634c2030dbadc36389d42712a87f697a737a4d9c779bbb5c7616b89c2a7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221008ba74a09a2d2f34678a64238aca41057e02cc9b5a1cb10eab316b278cbc540bd02201737606efe00aeeccf0a3889008db0ad4e27a4fcec778a7240c1535af71b7363:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-19365.yaml b/http/cves/2018/CVE-2018-19365.yaml
index 38b88e263c..4339c7164c 100644
--- a/http/cves/2018/CVE-2018-19365.yaml
+++ b/http/cves/2018/CVE-2018-19365.yaml
@@ -5,6 +5,8 @@ info:
author: 0x_Akoko
severity: critical
description: Wowza Streaming Engine 4.7.4.01 allows traversal of the directory structure and retrieval of a file via a remote, specifically crafted HTTP request to the REST API.
+ impact: |
+ An attacker can exploit this vulnerability to read arbitrary files on the server, potentially leading to unauthorized access or disclosure of sensitive information.
remediation: |
Upgrade to the latest version of Wowza Streaming Engine Manager or apply the necessary patches to fix the directory traversal vulnerability.
reference:
@@ -40,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502201d91fc3e46202a91c4f748734c6c5c0b6cba4a0096af86439227aebc5fdbff43022100e111e49ebfcd2aaa9f07e3596e5c990a48b867bc784adeea7f02b0456945ee0c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009d8f2260d6ed961d01036c4cd7023d10bc804d4ac7cc87e2cff9cdf7f6291544022062bb9b5fc97e34b1db32914cc1bd161c75c0eccb428ecc6a3c8937f507cb3893:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-19386.yaml b/http/cves/2018/CVE-2018-19386.yaml
index 0ae9f0ff3a..48666a5555 100644
--- a/http/cves/2018/CVE-2018-19386.yaml
+++ b/http/cves/2018/CVE-2018-19386.yaml
@@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: SolarWinds Database Performance Analyzer 11.1.457 contains a reflected cross-site scripting vulnerability in its idcStateError component, where the page parameter is reflected into the HREF of the 'Try Again' Button on the page, aka a /iwc/idcStateError.iwc?page= URI.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking or defacement of the affected application.
remediation: |
Apply the latest patch or upgrade to a non-vulnerable version of SolarWinds Database Performance Analyzer.
reference:
@@ -39,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a877abd8859f2cdd1860445d1fc59c10745e46aeb006be1a12d0589de734bf5c022044cddec49eb35450067f09d6c886eea2947442460051bf99e3204eac4a63fe5f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502202509b59bc3f7b365cd0a9849aceee35902998c0c68765e4465c9481b25692e84022100cbeec72fc01472a0e85b57b01c001ba0bc90212ac0e03de6304c3a87efb4b000:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2018/CVE-2018-19439.yaml b/http/cves/2018/CVE-2018-19439.yaml
index 0417ddbc66..d9054d6e9e 100644
--- a/http/cves/2018/CVE-2018-19439.yaml
+++ b/http/cves/2018/CVE-2018-19439.yaml
@@ -5,6 +5,8 @@ info:
author: madrobot,dwisiswant0
severity: medium
description: Oracle Secure Global Desktop Administration Console 4.4 contains a reflected cross-site scripting vulnerability in helpwindow.jsp via all parameters, as demonstrated by the sgdadmin/faces/com_sun_web_ui/help/helpwindow.jsp windowTitle parameter.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking or unauthorized actions.
remediation: Fixed in later versions including 5.4.
reference:
- http://packetstormsecurity.com/files/150444/Oracle-Secure-Global-Desktop-Administration-Console-4.4-Cross-Site-Scripting.html
@@ -34,4 +36,4 @@ http:
part: body
words:
- " |