Merge pull request #8169 from projectdiscovery/remediations

Updating remediation for CVEs
patch-1
Prince Chaddha 2023-09-11 20:03:59 +05:30 committed by GitHub
commit f9cf8a303a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2030 changed files with 7639 additions and 4324 deletions

View File

@ -5,19 +5,19 @@ info:
author: r3naissance
severity: medium
description: Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
remediation: Upgrade to the latest version.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2000-0114
- https://www.exploit-db.com/exploits/19897
- https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0114
remediation: Upgrade to the latest version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2000-0114
cwe-id: NVD-CWE-Other
epss-score: 0.09258
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
epss-percentile: 0.93895
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: microsoft

View File

@ -6,6 +6,8 @@ info:
severity: critical
description: |
HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
remediation: |
Apply the appropriate patch or upgrade to a fixed version of the Cisco IOS software.
reference:
- https://www.rapid7.com/db/modules/auxiliary/scanner/http/cisco_ios_auth_bypass/
- https://nvd.nist.gov/vuln/detail/CVE-2001-0537
@ -17,14 +19,14 @@ info:
cve-id: CVE-2001-0537
cwe-id: CWE-287
epss-score: 0.88063
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
epss-percentile: 0.9824
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
metadata:
max-request: 1
verified: true
shodan-query: product:"Cisco IOS http config" && 200
max-request: 1
vendor: cisco
product: ios
shodan-query: product:"Cisco IOS http config" && 200
tags: cve,cve2001,cisco,ios,auth-bypass
http:

View File

@ -5,6 +5,8 @@ info:
author: dhiyaneshDk
severity: high
description: The Virtual Keyboard plugin for SquirrelMail 1.2.6/1.2.7 is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
remediation: |
Upgrade to a patched version of SquirrelMail or apply the necessary security patches to mitigate the XSS vulnerability.
reference:
- http://www.redhat.com/support/errata/RHSA-2002-204.html
- http://www.debian.org/security/2002/dsa-191
@ -17,8 +19,8 @@ info:
cve-id: CVE-2002-1131
cwe-id: CWE-80
epss-score: 0.06018
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
epss-percentile: 0.9253
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
metadata:
max-request: 5
vendor: squirrelmail

View File

@ -5,21 +5,21 @@ info:
author: dhiyaneshDk
severity: medium
description: Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
remediation: Upgrade to the latest version.
reference:
- https://www.exploit-db.com/exploits/24068
- http://security.gentoo.org/glsa/glsa-200405-16.xml
- ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858
- http://marc.info/?l=bugtraq&m=108334862800260
remediation: Upgrade to the latest version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2004-0519
cwe-id: NVD-CWE-Other
epss-score: 0.02285
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
epss-percentile: 0.88244
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: sgi

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.
remediation: |
Upgrade to a patched version of Open Bulletin Board (OpenBB) or apply necessary security patches to mitigate the vulnerabilities.
reference:
- https://www.exploit-db.com/exploits/24055
- https://nvd.nist.gov/vuln/detail/CVE-2004-1965
@ -17,8 +19,8 @@ info:
cve-id: CVE-2004-1965
cwe-id: NVD-CWE-Other
epss-score: 0.0113
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
epss-percentile: 0.82864
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: openbb

View File

@ -5,21 +5,21 @@ info:
author: CasperGN
severity: medium
description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled (which is by default) allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).
remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
reference:
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
- https://www.exploit-db.com/exploits/39495
- https://nvd.nist.gov/vuln/detail/CVE-2005-2428
- http://marc.info/?l=bugtraq&m=112240869130356&w=2
- http://securitytracker.com/id?1014584
remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2005-2428
cwe-id: CWE-200
epss-score: 0.01188
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
epss-percentile: 0.83354
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: ibm

View File

@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: critical
description: Horde Groupware contains an administrative account with a blank password, which allows remote attackers to gain access.
remediation: |
Apply the latest security patches or upgrade to a patched version of Horde Groupware to fix the vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2005-3344
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3344
@ -17,8 +19,8 @@ info:
cve-id: CVE-2005-3344
cwe-id: NVD-CWE-Other
epss-score: 0.02158
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
epss-percentile: 0.87895
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: horde

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
frameset.htm in the BSP runtime in SAP Web Application Server (WAS) 6.10 through 7.00 allows remote attackers to log users out and redirect them to arbitrary web sites via a close command in the sap-sessioncmd parameter and a URL in the sap-exiturl parameter.
remediation: |
Apply the latest security patches and updates provided by SAP to fix the open redirect vulnerability.
reference:
- https://www.exploit-db.com/exploits/26488
- https://cxsecurity.com/issue/WLB-2005110025
@ -19,13 +21,13 @@ info:
cve-id: CVE-2005-3634
cwe-id: NVD-CWE-Other
epss-score: 0.02843
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
epss-percentile: 0.89376
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: html:"SAP Business Server Pages Team"
vendor: sap
product: sap_web_application_server
shodan-query: html:"SAP Business Server Pages Team"
tags: cve,cve2005,sap,redirect,business
http:

View File

@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: Cofax 2.0 RC3 and earlier contains a cross-site scripting vulnerability in search.htm which allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter.
remediation: |
Upgrade to a version of Cofax that is not affected by this vulnerability or apply the necessary patches provided by the vendor.
reference:
- http://pridels0.blogspot.com/2005/12/cofax-xss-vuln.html
- https://nvd.nist.gov/vuln/detail/CVE-2005-4385
@ -15,8 +17,8 @@ info:
cve-id: CVE-2005-4385
cwe-id: NVD-CWE-Other
epss-score: 0.00294
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
epss-percentile: 0.65316
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: cofax

View File

@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: Cherokee HTTPD 0.5 and earlier contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated.
remediation: |
Upgrade to a patched version of Cherokee HTTPD or apply the necessary security patches to mitigate the XSS vulnerability.
reference:
- http://www.vupen.com/english/advisories/2006/1292
- https://nvd.nist.gov/vuln/detail/CVE-2006-1681
@ -16,8 +18,8 @@ info:
cve-id: CVE-2006-1681
cwe-id: NVD-CWE-Other
epss-score: 0.01015
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
epss-percentile: 0.81872
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: cherokee

View File

@ -5,6 +5,8 @@ info:
author: dhiyaneshDk
severity: high
description: SquirrelMail 1.4.6 and earlier versions are susceptible to a PHP local file inclusion vulnerability in functions/plugin.php if register_globals is enabled and magic_quotes_gpc is disabled. This allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter.
remediation: |
Upgrade Squirrelmail to a version higher than 1.4.6 or apply the necessary patches to fix the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/27948
- http://squirrelmail.cvs.sourceforge.net/squirrelmail/squirrelmail/functions/global.php?r1=1.27.2.16&r2=1.27.2.17&view=patch&pathrev=SM-1_4-STABLE
@ -17,8 +19,8 @@ info:
cve-id: CVE-2006-2842
cwe-id: CWE-22
epss-score: 0.2925
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
epss-percentile: 0.96295
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: squirrelmail

View File

@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: Jira Rainbow.Zen contains a cross-site scripting vulnerability via Jira/secure/BrowseProject.jspa which allows remote attackers to inject arbitrary web script or HTML via the id parameter.
remediation: |
Apply the latest security patches or upgrade to a patched version of Jira Rainbow.Zen to mitigate the Cross-Site Scripting vulnerability.
reference:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32418
- https://nvd.nist.gov/vuln/detail/CVE-2007-0885
@ -14,8 +16,8 @@ info:
cve-id: CVE-2007-0885
cwe-id: NVD-CWE-Other
epss-score: 0.0059
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
epss-percentile: 0.75518
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: rainbow_portal

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! RSfiles 1.0.2 and earlier is susceptible to local file inclusion in index.php in the RSfiles component (com_rsfiles). This could allow remote attackers to arbitrarily read files via a .. (dot dot) in the path parameter in a files.display action.
remediation: |
Upgrade to the latest version of Joomla! RSfiles or apply the necessary patches provided by the vendor.
reference:
- https://www.exploit-db.com/exploits/4307
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36222
@ -15,8 +17,8 @@ info:
cve-id: CVE-2007-4504
cwe-id: CWE-22
epss-score: 0.01677
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
epss-percentile: 0.86094
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
Apache Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via for"m input beginning with a "%{" sequence and ending with a "}" character.
remediation: |
Update to the latest version of Apache Struts2
reference:
- https://www.guildhab.top/?p=2326
- https://nvd.nist.gov/vuln/detail/CVE-2007-4556
@ -18,8 +20,8 @@ info:
cve-id: CVE-2007-4556
cwe-id: NVD-CWE-Other
epss-score: 0.14147
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
epss-percentile: 0.94981
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: opensymphony

View File

@ -5,6 +5,8 @@ info:
author: dhiyaneshDK
severity: medium
description: phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, is vulnerable to cross-site scripting and allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, which are different vectors than CVE-2007-2865.
remediation: |
Upgrade to a patched version of phpPgAdmin or apply the necessary security patches provided by the vendor.
reference:
- https://www.exploit-db.com/exploits/30090
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063617.html
@ -17,13 +19,13 @@ info:
cve-id: CVE-2007-5728
cwe-id: CWE-79
epss-score: 0.02361
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
epss-percentile: 0.8841
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.title:"phpPgAdmin"
vendor: phppgadmin
product: phppgadmin
shodan-query: http.title:"phpPgAdmin"
tags: cve,cve2007,xss,pgadmin,phppgadmin,edb
http:

View File

@ -6,6 +6,8 @@ info:
severity: high
description: |
PHP remote file inclusion vulnerability in modules/syntax_highlight.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the libpath parameter.
remediation: |
Update WordPress Sniplets to the latest version or apply the patch provided by the vendor to mitigate the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/5194
- https://wpscan.com/vulnerability/d0278ebe-e6ae-4f7c-bcad-ba318573f881
@ -18,8 +20,8 @@ info:
cve-id: CVE-2008-1059
cwe-id: CWE-94
epss-score: 0.01493
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
epss-percentile: 0.85218
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: wordpress

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
WordPress Sniplets 1.1.2 and 1.2.2 plugin contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via the text parameter to warning.php, notice.php, and inset.php in view/sniplets/, and possibly modules/execute.php; via the url parameter to view/admin/submenu.php; and via the page parameter to view/admin/pager.php.
remediation: |
Update WordPress Sniplets plugin to the latest version available, which addresses the XSS vulnerability.
reference:
- https://www.exploit-db.com/exploits/5194
- https://wpscan.com/vulnerability/d0278ebe-e6ae-4f7c-bcad-ba318573f881
@ -18,8 +20,8 @@ info:
cve-id: CVE-2008-1061
cwe-id: CWE-79
epss-score: 0.00938
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
epss-percentile: 0.81093
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: wordpress

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in exchweb/bin/redir.asp in Microsoft Outlook Web Access (OWA) for Exchange Server 2003 SP2 (aka build 6.5.7638) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the URL parameter.
remediation: |
Apply the necessary security patches or upgrade to a newer version of Microsoft Exchange Server.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2008-1547
- https://www.exploit-db.com/exploits/32489
@ -17,13 +19,13 @@ info:
cve-id: CVE-2008-1547
cwe-id: CWE-601
epss-score: 0.03523
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
epss-percentile: 0.90347
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
metadata:
max-request: 2
shodan-query: http.title:"Outlook"
vendor: microsoft
product: exchange_server
shodan-query: http.title:"Outlook"
tags: cve,cve2008,redirect,owa,exchange,microsoft
http:

View File

@ -5,6 +5,8 @@ info:
author: unstabl3
severity: medium
description: AppServ Open Project 2.5.10 and earlier contains a cross-site scripting vulnerability in index.php which allows remote attackers to inject arbitrary web script or HTML via the appservlang parameter.
remediation: |
Upgrade to a patched version of AppServ Open Project (>=2.5.11) or apply the necessary security patches provided by the vendor.
reference:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42546
- http://securityreason.com/securityalert/3896
@ -15,8 +17,8 @@ info:
cve-id: CVE-2008-2398
cwe-id: CWE-79
epss-score: 0.00329
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
epss-percentile: 0.67268
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: appserv_open_project

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
CMSimple 3.1 is susceptible to local file inclusion via cmsimple/cms.php when register_globals is enabled which allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.
remediation: |
Upgrade CMSimple to a patched version or apply the necessary security patches provided by the vendor.
reference:
- http://www.cmsimple.com/forum/viewtopic.php?f=2&t=17
- http://web.archive.org/web/20140729144732/http://secunia.com:80/advisories/30463
@ -18,8 +20,8 @@ info:
cve-id: CVE-2008-2650
cwe-id: CWE-22
epss-score: 0.06344
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
epss-percentile: 0.92723
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: cmsimple

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: critical
description: Joomla! Image Browser 0.1.5 rc2 is susceptible to local file inclusion via com_imagebrowser which could allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php.
remediation: |
Upgrade to a patched version of Joomla! Image Browser or apply the necessary security patches to mitigate the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/6618
- http://securityreason.com/securityalert/4464
@ -16,8 +18,8 @@ info:
cve-id: CVE-2008-4668
cwe-id: CWE-22
epss-score: 0.01018
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
epss-percentile: 0.819
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! 2.0.0 RC2 and earlier are susceptible to local file inclusion in the eXtplorer module (com_extplorer) that allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action.
remediation: |
Upgrade Joomla! to a version higher than 2.0.0 RC2 to mitigate the vulnerability.
reference:
- https://www.exploit-db.com/exploits/5435
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41873
@ -15,8 +17,8 @@ info:
cve-id: CVE-2008-4764
cwe-id: CWE-22
epss-score: 0.00779
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
epss-percentile: 0.79142
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
metadata:
max-request: 1
vendor: extplorer

View File

@ -5,6 +5,8 @@ info:
author: dhiyaneshDK
severity: medium
description: phpPgAdmin 4.2.1 is vulnerable to local file inclusion in libraries/lib.inc.php when register globals is enabled. Remote attackers can read arbitrary files via a .. (dot dot) in the _language parameter to index.php.
remediation: |
Upgrade phpPgAdmin to a version higher than 4.2.1 or apply the necessary patches provided by the vendor.
reference:
- https://www.exploit-db.com/exploits/7363
- https://nvd.nist.gov/vuln/detail/CVE-2008-5587
@ -17,13 +19,13 @@ info:
cve-id: CVE-2008-5587
cwe-id: CWE-22
epss-score: 0.02331
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
epss-percentile: 0.88339
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.title:"phpPgAdmin"
vendor: phppgadmin
product: phppgadmin
shodan-query: http.title:"phpPgAdmin"
tags: cve,cve2008,lfi,phppgadmin,edb
http:

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! ionFiles 4.4.2 is susceptible to local file inclusion in download.php in the ionFiles (com_ionfiles) that allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
remediation: |
Update Joomla! ionFiles to the latest version or apply the provided patch to mitigate the vulnerability.
reference:
- https://www.exploit-db.com/exploits/6809
- https://nvd.nist.gov/vuln/detail/CVE-2008-6080
@ -15,8 +17,8 @@ info:
cve-id: CVE-2008-6080
cwe-id: CWE-22
epss-score: 0.00666
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
epss-percentile: 0.77115
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: codecall

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter.
remediation: |
Update Joomla! Component RWCards to the latest version to mitigate the vulnerability.
reference:
- https://www.exploit-db.com/exploits/6817
- https://nvd.nist.gov/vuln/detail/CVE-2008-6172
@ -15,8 +17,8 @@ info:
cve-id: CVE-2008-6172
cwe-id: CWE-22
epss-score: 0.00447
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
epss-percentile: 0.71823
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: weberr

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php.
remediation: |
Apply the latest security patches or upgrade to a patched version of Joomla! ProDesk to mitigate the vulnerability.
reference:
- https://www.exploit-db.com/exploits/6980
- https://nvd.nist.gov/vuln/detail/CVE-2008-6222
@ -15,8 +17,8 @@ info:
cve-id: CVE-2008-6222
cwe-id: CWE-22
epss-score: 0.00832
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
epss-percentile: 0.79864
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomlashowroom

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
Parallels H-Sphere 3.0.0 P9 and 3.1 P1 contains multiple cross-site scripting vulnerabilities in login.php in webshell4. An attacker can inject arbitrary web script or HTML via the err, errorcode, and login parameters, thus allowing theft of cookie-based authentication credentials and launch of other attacks.
remediation: |
Apply the latest security patches or upgrade to a newer version of Parallels H-Sphere to mitigate the XSS vulnerability.
reference:
- http://www.xssing.com/index.php?x=3&y=65
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45254
@ -17,14 +19,14 @@ info:
cve-id: CVE-2008-6465
cwe-id: CWE-79
epss-score: 0.00421
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
epss-percentile: 0.70992
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
metadata:
max-request: 1
verified: true
shodan-query: title:"Parallels H-Sphere
max-request: 1
vendor: parallels
product: h-sphere
shodan-query: title:"Parallels H-Sphere
tags: cve,cve2008,xss,parallels,h-sphere
http:

View File

@ -5,6 +5,8 @@ info:
author: geeknik
severity: medium
description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php.
remediation: |
Upgrade to a patched version of nweb2fax or apply the necessary security patches provided by the vendor.
reference:
- https://www.exploit-db.com/exploits/5856
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43173
@ -16,8 +18,8 @@ info:
cve-id: CVE-2008-6668
cwe-id: CWE-22
epss-score: 0.00359
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
epss-percentile: 0.68648
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: dirk_bartley

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
Devalcms 1.4a contains a cross-site scripting vulnerability in the currentpath parameter of the index.php file.
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/6369
- http://sourceforge.net/projects/devalcms/files/devalcms/devalcms-1.4b/devalcms-1.4b.zip/download
@ -17,11 +19,11 @@ info:
cve-id: CVE-2008-6982
cwe-id: CWE-79
epss-score: 0.0038
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
epss-percentile: 0.69519
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
metadata:
max-request: 1
verified: true
max-request: 1
vendor: devalcms
product: devalcms
tags: cve,cve2008,devalcms,xss,cms,edb

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in api.php in SiteEngine 5.x allows user-assisted remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the forward parameter in a logout action.
remediation: |
Apply the latest patches or updates provided by the vendor to fix the open redirect vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2008-7269
- https://www.exploit-db.com/exploits/6823
@ -15,14 +17,14 @@ info:
cve-id: CVE-2008-7269
cwe-id: CWE-20
epss-score: 0.01358
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
epss-percentile: 0.84524
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: html:"SiteEngine"
verified: "true"
max-request: 1
vendor: boka
product: siteengine
shodan-query: html:"SiteEngine"
tags: cve,cve2008,redirect,siteengine
http:

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.
remediation: |
Apply the vendor-supplied patch or upgrade to a newer version of Autonomy Ultraseek that addresses the open redirect vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2009-0347
- https://www.exploit-db.com/exploits/32766
@ -18,8 +20,8 @@ info:
cve-id: CVE-2009-0347
cwe-id: CWE-59
epss-score: 0.09851
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
epss-percentile: 0.94077
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: autonomy

View File

@ -5,6 +5,8 @@ info:
author: geeknik
severity: critical
description: ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action.
remediation: |
Upgrade to a patched version of ZeroShell.
reference:
- https://www.exploit-db.com/exploits/8023
- https://nvd.nist.gov/vuln/detail/CVE-2009-0545
@ -17,8 +19,8 @@ info:
cve-id: CVE-2009-0545
cwe-id: CWE-20
epss-score: 0.9719
cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
epss-percentile: 0.99722
cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
metadata:
max-request: 1
vendor: zeroshell

View File

@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: medium
description: Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 are susceptible to local file inclusion in framework/Image/Image.php because it allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
remediation: |
Apply the latest security patches or upgrade to a patched version of Horde/Horde Groupware.
reference:
- https://www.exploit-db.com/exploits/16154
- http://cvs.horde.org/co.php/groupware/docs/groupware/CHANGES?r=1.28.2.5
@ -17,8 +19,8 @@ info:
cve-id: CVE-2009-0932
cwe-id: CWE-22
epss-score: 0.04048
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
epss-percentile: 0.9095
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: debian

View File

@ -5,6 +5,8 @@ info:
author: princechaddha
severity: high
description: PhpMyAdmin Scripts 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 are susceptible to a remote code execution in setup.php that allows remote attackers to inject arbitrary PHP code into a configuration file via the save action. Combined with the ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
remediation: |
Update PhpMyAdmin to the latest version or apply the necessary patches.
reference:
- https://www.phpmyadmin.net/security/PMASA-2009-3/
- https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433
@ -17,8 +19,8 @@ info:
cve-id: CVE-2009-1151
cwe-id: CWE-94
epss-score: 0.79256
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
epss-percentile: 0.9785
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: phpmyadmin

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
Joomla! Cmimarketplace 0.1 is susceptible to local file inclusion because com_cmimarketplace allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php.
remediation: |
Apply the latest patch or upgrade to a newer version of Joomla! Cmimarketplace to mitigate the vulnerability.
reference:
- https://www.exploit-db.com/exploits/8367
- https://nvd.nist.gov/vuln/detail/CVE-2009-1496
@ -15,8 +17,8 @@ info:
cve-id: CVE-2009-1496
cwe-id: CWE-22
epss-score: 0.00533
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
epss-percentile: 0.7415
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Cisco Linksys WVC54GCA 1.00R22/1.00R24 is susceptible to local file inclusion in adm/file.cgi because it allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
remediation: |
Apply the latest firmware update provided by Cisco to fix the local file inclusion vulnerability.
reference:
- https://www.exploit-db.com/exploits/32954
- http://www.vupen.com/english/advisories/2009/1173
@ -17,8 +19,8 @@ info:
cve-id: CVE-2009-1558
cwe-id: CWE-22
epss-score: 0.00901
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
epss-percentile: 0.80705
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: cisco

View File

@ -5,6 +5,8 @@ info:
author: princechaddha
severity: medium
description: Adobe ColdFusion Server 8.0.1 and earlier contain multiple cross-site scripting vulnerabilities which allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm.
remediation: |
Upgrade Adobe Coldfusion to a version higher than 8.0.1 or apply the necessary patches provided by the vendor.
reference:
- https://www.tenable.com/cve/CVE-2009-1872
- http://www.adobe.com/support/security/bulletins/apsb09-12.html
@ -16,14 +18,14 @@ info:
cve-id: CVE-2009-1872
cwe-id: CWE-79
epss-score: 0.3657
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
epss-percentile: 0.96635
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.component:"Adobe ColdFusion"
verified: true
max-request: 1
vendor: adobe
product: coldfusion
shodan-query: http.component:"Adobe ColdFusion"
tags: cve,cve2009,adobe,xss,coldfusion,tenable
http:

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Joomla! Ideal MooFAQ 1.0 via com_moofaq allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter (local file inclusion).
remediation: |
Update Joomla! MooFAQ to the latest version or apply the official patch provided by the vendor.
reference:
- https://www.exploit-db.com/exploits/8898
- http://www.vupen.com/english/advisories/2009/1530
@ -15,8 +17,8 @@ info:
cve-id: CVE-2009-2015
cwe-id: CWE-22
epss-score: 0.00813
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
epss-percentile: 0.79614
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! JoomlaPraise Projectfork (com_projectfork) 2.0.10 allows remote attackers to read arbitrary files via local file inclusion in the section parameter to index.php.
remediation: |
Upgrade to a patched version of JoomlaPraise Projectfork or apply the necessary security patches to mitigate the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/8946
- https://nvd.nist.gov/vuln/detail/CVE-2009-2100
@ -14,8 +16,8 @@ info:
cve-id: CVE-2009-2100
cwe-id: CWE-22
epss-score: 0.00528
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
epss-percentile: 0.74045
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: Joomla! Agora 3.0.0b (com_agora) allows remote attackers to include and execute arbitrary local files via local file inclusion in the action parameter to the avatars page, reachable through index.php.
remediation: |
Apply the latest security patches or upgrade to a patched version of Joomla! Agora to mitigate the vulnerability.
reference:
- https://www.exploit-db.com/exploits/9564
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52964
@ -16,8 +18,8 @@ info:
cve-id: CVE-2009-3053
cwe-id: CWE-22
epss-score: 0.00367
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
epss-percentile: 0.69025
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Joomla! Roland Breedveld Album 1.14 (com_album) is susceptible to local file inclusion because it allows remote attackers to access arbitrary directories and have unspecified other impact via a .. (dot dot) in the target parameter to index.php.
remediation: |
Update to the latest version of Joomla! Roland Breedveld Album and apply any available patches or security updates.
reference:
- https://www.exploit-db.com/exploits/9706
- https://nvd.nist.gov/vuln/detail/CVE-2009-3318
@ -15,8 +17,8 @@ info:
cve-id: CVE-2009-3318
cwe-id: CWE-22
epss-score: 0.00706
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
epss-percentile: 0.77913
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: Joomla! Omilen Photo Gallery (com_omphotogallery) component Beta 0.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php.
remediation: |
Upgrade to a patched version of Joomla! Omilen Photo Gallery or apply the necessary security patches to mitigate the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/8870
- http://www.vupen.com/english/advisories/2009/1494
@ -16,8 +18,8 @@ info:
cve-id: CVE-2009-4202
cwe-id: CWE-22
epss-score: 0.01956
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
epss-percentile: 0.87217
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla

View File

@ -5,6 +5,8 @@ info:
author: geeknik
severity: high
description: KR-Web 1.1b2 and prior contain a remote file inclusion vulnerability via adm/krgourl.php, which allows remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter.
remediation: |
Upgrade to a patched version of KR-Web or apply the necessary security patches to fix the remote file inclusion vulnerability.
reference:
- https://sourceforge.net/projects/krw/
- https://www.exploit-db.com/exploits/10216
@ -17,8 +19,8 @@ info:
cve-id: CVE-2009-4223
cwe-id: CWE-94
epss-score: 0.01041
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
epss-percentile: 0.82106
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
metadata:
max-request: 1
vendor: gianni_tommasi

View File

@ -6,6 +6,8 @@ info:
severity: high
description: |
Joomla! Portfolio Nexus 1.5 contains a remote file inclusion vulnerability in the inertialFATE iF (com_if_nexus) component that allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: |
Apply the latest security patches and updates provided by Joomla! to fix the Remote File Inclusion vulnerability.
reference:
- https://www.exploit-db.com/exploits/33440
- https://nvd.nist.gov/vuln/detail/CVE-2009-4679
@ -16,8 +18,8 @@ info:
cve-id: CVE-2009-4679
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
epss-percentile: 0.79783
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: inertialfate

View File

@ -5,18 +5,18 @@ info:
author: pdteam
severity: medium
description: An open redirect vulnerability in awredir.pl in AWStats < 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2009-5020
- http://awstats.sourceforge.net/docs/awstats_changelog.txt
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:P
cvss-score: 5.8
cve-id: CVE-2009-5020
cwe-id: CWE-20
epss-score: 0.00215
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
epss-percentile: 0.58808
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: awstats

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in wgarcmin.cgi in WebGlimpse 2.18.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the DOC parameter.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/36994
- https://nvd.nist.gov/vuln/detail/CVE-2009-5114
- http://websecurity.com.ua/2628/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74321
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2009-5114
cwe-id: CWE-22
epss-score: 0.03309
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
epss-percentile: 0.90068
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: iwork

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Bible Study (com_biblestudy) component 6.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter in a studieslist action to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/10943
- https://nvd.nist.gov/vuln/detail/CVE-2010-0157
- http://packetstormsecurity.org/1001-exploits/joomlabiblestudy-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-0157
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
epss-percentile: 0.79783
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla

View File

@ -5,6 +5,8 @@ info:
author: pikpikcu
severity: critical
description: Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
remediation: |
Disable or restrict access to the Axis2 web interface, or apply the necessary patches or updates provided by the vendor.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2010-0219
- https://knowledge.broadcom.com/external/article/13994/vulnerability-axis2-default-administrato.html
@ -17,13 +19,13 @@ info:
cve-id: CVE-2010-0219
cwe-id: CWE-255
epss-score: 0.97513
cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*
epss-percentile: 0.99971
cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*
metadata:
max-request: 2
shodan-query: http.html:"Apache Axis"
vendor: apache
product: axis2
shodan-query: http.html:"Apache Axis"
tags: cve,cve2010,axis,apache,default-login,axis2
http:

View File

@ -5,21 +5,21 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the ccNewsletter (com_ccnewsletter) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a ccnewsletter action to index.php.
remediation: Apply all relevant security patches and upgrades.
reference:
- https://www.exploit-db.com/exploits/11282
- https://nvd.nist.gov/vuln/detail/CVE-2010-0467
- http://www.chillcreations.com/en/blog/ccnewsletter-joomla-newsletter/ccnewsletter-106-security-release.html
- http://www.exploit-db.com/exploits/11277
- http://www.exploit-db.com/exploits/11282
remediation: Apply all relevant security patches and upgrades.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
cvss-score: 5.8
cve-id: CVE-2010-0467
cwe-id: CWE-22
epss-score: 0.0586
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
epss-percentile: 0.92444
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: chillcreations

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in includes/download.php in the JoomlaWorks AllVideos (Jw_allVideos) plugin 3.0 through 3.2 for Joomla! allows remote attackers to read arbitrary files via a ./../.../ (modified dot dot) in the file parameter.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11447
- https://nvd.nist.gov/vuln/detail/CVE-2010-0696
- http://www.joomlaworks.gr/content/view/77/34/
- http://www.exploit-db.com/exploits/11447
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-0696
cwe-id: CWE-22
epss-score: 0.79015
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
epss-percentile: 0.97844
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomlaworks

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php in the Core Design Scriptegrator plugin 1.4.1 for Joomla! allows remote attackers to read, and possibly include and execute, arbitrary files via directory traversal sequences in the files[] parameter.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11498
- https://nvd.nist.gov/vuln/detail/CVE-2010-0759
- http://www.exploit-db.com/exploits/11498
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56380
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-0759
cwe-id: CWE-22
epss-score: 0.01326
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
epss-percentile: 0.84334
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: greatjoomla

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11089
- https://nvd.nist.gov/vuln/detail/CVE-2010-0942
- http://packetstormsecurity.org/1001-exploits/joomlajvideodirect-traversal.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55513
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-0942
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
epss-percentile: 0.72681
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: jvideodirect

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JA Showcase (com_jashowcase) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a jashowcase action to index.php.
remediation: |
Update to the latest version of Joomla! Component com_jashowcase to fix the directory traversal vulnerability.
reference:
- https://www.exploit-db.com/exploits/11090
- https://nvd.nist.gov/vuln/detail/CVE-2010-0943
@ -15,8 +17,8 @@ info:
cve-id: CVE-2010-0943
cwe-id: CWE-22
epss-score: 0.01155
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
epss-percentile: 0.8306
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomlart

View File

@ -5,21 +5,21 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JCollection (com_jcollection) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11088
- https://nvd.nist.gov/vuln/detail/CVE-2010-0944
- http://packetstormsecurity.org/1001-exploits/joomlajcollection-traversal.txt
- http://www.exploit-db.com/exploits/11088
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55514
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-0944
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
epss-percentile: 0.72681
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: thorsten_riess

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11738
- https://nvd.nist.gov/vuln/detail/CVE-2010-0972
- http://www.exploit-db.com/exploits/11738
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56863
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-0972
cwe-id: CWE-22
epss-score: 0.00813
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
epss-percentile: 0.79614
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: g4j.laoneo

View File

@ -5,18 +5,18 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/10942
- https://nvd.nist.gov/vuln/detail/CVE-2010-0982
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2010-0982
cwe-id: CWE-22
epss-score: 0.0087
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
epss-percentile: 0.80286
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomlamo

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/10948
- https://nvd.nist.gov/vuln/detail/CVE-2010-0985
- http://www.exploit-db.com/exploits/10948
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55348
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-0985
cwe-id: CWE-22
epss-score: 0.01222
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
epss-percentile: 0.83609
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: chris_simon

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11760
- https://nvd.nist.gov/vuln/detail/CVE-2010-1056
- http://www.rockettheme.com/extensions-updates/638-rokdownloads-10-released
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56898
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1056
cwe-id: CWE-22
epss-score: 0.06484
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
epss-percentile: 0.92801
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: rockettheme

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11511
- https://nvd.nist.gov/vuln/detail/CVE-2010-1081
- http://www.corejoomla.com/component/content/article/1-corejoomla-updates/40-community-polls-v153-security-release.html
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1081
cwe-id: CWE-22
epss-score: 0.02282
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
epss-percentile: 0.88237
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: corejoomla

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE -- the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected.
remediation: Apply all relevant security patches and product upgrades.
reference:
- https://www.exploit-db.com/exploits/11814
- https://nvd.nist.gov/vuln/detail/CVE-2010-1217
- http://www.packetstormsecurity.org/1003-exploits/joomlajetooltip-lfi.txt
- http://www.exploit-db.com/exploits/11814
remediation: Apply all relevant security patches and product upgrades.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2010-1217
cwe-id: CWE-22
epss-score: 0.01155
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
epss-percentile: 0.8306
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: je_form_creator

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11757
- https://nvd.nist.gov/vuln/detail/CVE-2010-1219
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56901
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1219
cwe-id: CWE-22
epss-score: 0.00813
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
epss-percentile: 0.79614
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: com_janews

View File

@ -5,18 +5,18 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11978
- https://nvd.nist.gov/vuln/detail/CVE-2010-1302
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1302
cwe-id: CWE-22
epss-score: 0.01204
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
epss-percentile: 0.83479
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: decryptweb

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in userstatus.php in the User Status (com_userstatus) component 1.21.16 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11998
- https://nvd.nist.gov/vuln/detail/CVE-2010-1304
- http://www.exploit-db.com/exploits/11998
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57483
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1304
cwe-id: CWE-22
epss-score: 0.0045
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
epss-percentile: 0.71928
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomlamo

View File

@ -5,21 +5,21 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12065
- https://nvd.nist.gov/vuln/detail/CVE-2010-1305
- http://extensions.joomla.org/extensions/e-commerce/shopping-cart/7951
- http://www.vupen.com/english/advisories/2010/0811
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57538
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1305
cwe-id: CWE-22
epss-score: 0.03203
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
epss-percentile: 0.89919
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomlamo

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12058
- https://nvd.nist.gov/vuln/detail/CVE-2010-1306
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57508
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1306
cwe-id: CWE-22
epss-score: 0.01242
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
epss-percentile: 0.83796
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: roberto_aloi

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Magic Updater (com_joomlaupdater) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12070
- https://nvd.nist.gov/vuln/detail/CVE-2010-1307
- http://www.vupen.com/english/advisories/2010/0806
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57531
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1307
cwe-id: CWE-22
epss-score: 0.01751
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
epss-percentile: 0.86395
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: software.realtyna

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the SVMap (com_svmap) component 1.1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12066
- https://nvd.nist.gov/vuln/detail/CVE-2010-1308
- http://www.vupen.com/english/advisories/2010/0809
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1308
cwe-id: CWE-22
epss-score: 0.01334
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
epss-percentile: 0.84366
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: la-souris-verte

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12077
- https://nvd.nist.gov/vuln/detail/CVE-2010-1312
- http://packetstormsecurity.org/1004-exploits/joomlanewportal-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1312
cwe-id: CWE-22
epss-score: 0.01155
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
epss-percentile: 0.8306
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: ijoomla

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12082
- https://nvd.nist.gov/vuln/detail/CVE-2010-1313
- http://www.exploit-db.com/exploits/12082
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2010-1313
cwe-id: CWE-22
epss-score: 0.0045
cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*
epss-percentile: 0.71928
cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: seber

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12086
- https://nvd.nist.gov/vuln/detail/CVE-2010-1314
- http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1314
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
epss-percentile: 0.72681
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomlanook

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/11999
- https://nvd.nist.gov/vuln/detail/CVE-2010-1315
- http://packetstormsecurity.org/1004-exploits/joomlaweberpcustomer-lfi.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57482
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1315
cwe-id: CWE-22
epss-score: 0.0087
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
epss-percentile: 0.80286
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomlamo

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/33797
- https://nvd.nist.gov/vuln/detail/CVE-2010-1340
- http://packetstormsecurity.org/1003-exploits/joomlajresearch-lfi.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57123
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1340
cwe-id: CWE-22
epss-score: 0.01155
cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*
epss-percentile: 0.8306
cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla-research

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/15453
- https://nvd.nist.gov/vuln/detail/CVE-2010-1345
- http://www.exploit-db.com/exploits/11785
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1345
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
epss-percentile: 0.72681
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: cookex

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12084
- https://nvd.nist.gov/vuln/detail/CVE-2010-1352
- http://packetstormsecurity.org/1004-exploits/joomlajukebox-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1352
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
epss-percentile: 0.72681
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: jooforge

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
remediation: |
Apply the latest security patches or updates provided by Joomla! to fix the LFI vulnerability in LoginBox component.
reference:
- https://www.exploit-db.com/exploits/12068
- https://nvd.nist.gov/vuln/detail/CVE-2010-1353
@ -16,8 +18,8 @@ info:
cve-id: CVE-2010-1353
cwe-id: CWE-22
epss-score: 0.01751
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
epss-percentile: 0.86395
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: wowjoomla

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12102
- https://nvd.nist.gov/vuln/detail/CVE-2010-1354
- http://packetstormsecurity.org/1004-exploits/joomlavjdeo-lfi.txt
- http://www.exploit-db.com/exploits/12102
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1354
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:*
epss-percentile: 0.72681
cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: ternaria

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
Red Hat JBoss Enterprise Application Platform 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 is susceptible to sensitive information disclosure. A remote attacker can obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression.
remediation: |
Apply the necessary patches or updates provided by Red Hat to fix the vulnerability.
reference:
- https://rhn.redhat.com/errata/RHSA-2010-0377.html
- https://nvd.nist.gov/vuln/detail/CVE-2010-1429
@ -18,14 +20,14 @@ info:
cve-id: CVE-2010-1429
cwe-id: CWE-264
epss-score: 0.00573
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
epss-percentile: 0.75122
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"JBoss"
verified: true
max-request: 1
vendor: redhat
product: jboss_enterprise_application_platform
shodan-query: title:"JBoss"
tags: cve,cve2010,jboss,eap,tomcat,exposure
http:

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12232
- https://nvd.nist.gov/vuln/detail/CVE-2010-1461
- http://www.exploit-db.com/exploits/12232
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1461
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:*
epss-percentile: 0.72681
cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: gogoritas

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Ternaria Informatica JProject Manager (com_jprojectmanager) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12146
- https://nvd.nist.gov/vuln/detail/CVE-2010-1469
- http://packetstormsecurity.org/1004-exploits/joomlajprojectmanager-lfi.txt
- http://www.exploit-db.com/exploits/12146
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1469
cwe-id: CWE-22
epss-score: 0.00813
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
epss-percentile: 0.79614
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: ternaria

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and have possibly other unspecified impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12166
- https://nvd.nist.gov/vuln/detail/CVE-2010-1470
- http://www.exploit-db.com/exploits/12166
- http://www.vupen.com/english/advisories/2010/0858
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1470
cwe-id: CWE-22
epss-score: 0.04616
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
epss-percentile: 0.915
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: dev.pucit.edu.pk

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: |
Update to the latest version of Joomla! Component Address Book or apply the necessary patches to fix the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/12170
- https://nvd.nist.gov/vuln/detail/CVE-2010-1471
@ -15,8 +17,8 @@ info:
cve-id: CVE-2010-1471
cwe-id: CWE-22
epss-score: 0.05684
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
epss-percentile: 0.92341
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: b-elektro

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12167
- https://nvd.nist.gov/vuln/detail/CVE-2010-1472
- http://www.exploit-db.com/exploits/12167
- http://www.vupen.com/english/advisories/2010/0859
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1472
cwe-id: CWE-22
epss-score: 0.05684
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
epss-percentile: 0.92341
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: kazulah

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12171
- https://nvd.nist.gov/vuln/detail/CVE-2010-1473
- http://packetstormsecurity.org/1004-exploits/joomlaeasyadbanner-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1473
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*
epss-percentile: 0.79783
cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: johnmccollum

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: |
Update to the latest version of Joomla! Component Sweetykeeper or apply the necessary patches to fix the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/12182
- https://nvd.nist.gov/vuln/detail/CVE-2010-1474
@ -16,8 +18,8 @@ info:
cve-id: CVE-2010-1474
cwe-id: CWE-22
epss-score: 0.01242
cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:*
epss-percentile: 0.83796
cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: supachai_teasakul

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: |
Update to the latest version of Joomla! Component Preventive And Reservation and apply any available patches or fixes to mitigate the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/12147
- https://nvd.nist.gov/vuln/detail/CVE-2010-1475
@ -16,8 +18,8 @@ info:
cve-id: CVE-2010-1475
cwe-id: CWE-22
epss-score: 0.01242
cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*
epss-percentile: 0.83796
cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: ternaria

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the view parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12150
- https://nvd.nist.gov/vuln/detail/CVE-2010-1476
- http://packetstormsecurity.org/1004-exploits/joomlaalphauserpoints-lfi.txt
- http://www.alphaplug.com/
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1476
cwe-id: CWE-22
epss-score: 0.03527
cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*
epss-percentile: 0.90353
cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: alphaplug

View File

@ -5,18 +5,18 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12145
- https://nvd.nist.gov/vuln/detail/CVE-2010-1478
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
cvss-score: 6.8
cve-id: CVE-2010-1478
cwe-id: CWE-22
epss-score: 0.00826
cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:*
epss-percentile: 0.79783
cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: ternaria

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12318
- https://nvd.nist.gov/vuln/detail/CVE-2010-1491
- http://packetstormsecurity.org/1004-exploits/joomlammsblog-lfi.txt
- http://www.exploit-db.com/exploits/12318
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1491
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:*
epss-percentile: 0.72681
cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: mms.pipp

View File

@ -5,21 +5,21 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12113
- https://nvd.nist.gov/vuln/detail/CVE-2010-1494
- http://www.exploit-db.com/exploits/12113
- http://www.awdwall.com/index.php/awdwall-updates-logs-
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57693
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1494
cwe-id: CWE-22
epss-score: 0.02305
cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:*
epss-percentile: 0.88291
cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: awdsolution

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12286
- https://nvd.nist.gov/vuln/detail/CVE-2010-1495
- http://www.vupen.com/english/advisories/2010/0929
- http://packetstormsecurity.org/1004-exploits/joomlamatamko-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1495
cwe-id: CWE-22
epss-score: 0.04503
cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:*
epss-percentile: 0.91406
cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: matamko

View File

@ -5,21 +5,21 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12054
- https://nvd.nist.gov/vuln/detail/CVE-2010-1531
- http://packetstormsecurity.org/1004-exploits/joomlaredshop-lfi.txt
- http://redcomponent.com/redshop/redshop-changelog
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57512
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1531
cwe-id: CWE-22
epss-score: 0.01815
cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:*
epss-percentile: 0.8667
cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: redcomponent

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12118
- https://nvd.nist.gov/vuln/detail/CVE-2010-1532
- http://packetstormsecurity.org/1004-exploits/joomlapowermail-lfi.txt
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1532
cwe-id: CWE-22
epss-score: 0.00477
cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:*
epss-percentile: 0.72681
cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: givesight

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12142
- https://nvd.nist.gov/vuln/detail/CVE-2010-1533
- http://www.exploit-db.com/exploits/12142
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1533
cwe-id: CWE-22
epss-score: 0.00706
cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:*
epss-percentile: 0.77913
cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: peter_hocherl

View File

@ -5,20 +5,20 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Shoutbox Pro (com_shoutbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version
reference:
- https://www.exploit-db.com/exploits/12067
- https://nvd.nist.gov/vuln/detail/CVE-2010-1534
- http://www.exploit-db.com/exploits/12067
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57534
remediation: Upgrade to a supported version
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score: 5
cve-id: CVE-2010-1534
cwe-id: CWE-22
epss-score: 0.01733
cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:*
epss-percentile: 0.86312
cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomla.batjo

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: |
Update to the latest version of Joomla! Component TRAVELbook or apply the necessary patches to fix the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/12151
- https://nvd.nist.gov/vuln/detail/CVE-2010-1535
@ -15,8 +17,8 @@ info:
cve-id: CVE-2010-1535
cwe-id: CWE-22
epss-score: 0.00706
cpe: cpe:2.3:a:peter_hocherl:com_travelbook:1.0.1:*:*:*:*:*:*:*
epss-percentile: 0.77913
cpe: cpe:2.3:a:peter_hocherl:com_travelbook:1.0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: peter_hocherl

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter.
remediation: |
Apply the latest security patches or updates provided by Joomla! to fix the directory traversal vulnerability in com_blog component.
reference:
- https://www.exploit-db.com/exploits/11625
- https://nvd.nist.gov/vuln/detail/CVE-2010-1540
@ -14,8 +16,8 @@ info:
cve-id: CVE-2010-1540
cwe-id: CWE-22
epss-score: 0.0045
cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:*
epss-percentile: 0.71928
cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: myblog

View File

@ -6,6 +6,8 @@ info:
severity: medium
description: |
Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter.
remediation: |
Apply the latest patches or updates provided by HP to fix the open redirect vulnerability.
reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1586
- https://yehg.net/lab/pr0js/advisories/hp_system_management_homepage_url_redirection_abuse
@ -16,8 +18,8 @@ info:
cve-id: CVE-2010-1586
cwe-id: CWE-20
epss-score: 0.00846
cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
epss-percentile: 0.80024
cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: hp

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JA Comment (com_jacomment) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
remediation: |
Apply the latest security patches or upgrade to a patched version of Joomla! Component JA Comment to mitigate the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/12236
- https://nvd.nist.gov/vuln/detail/CVE-2010-1601
@ -16,8 +18,8 @@ info:
cve-id: CVE-2010-1601
cwe-id: CWE-22
epss-score: 0.01299
cpe: cpe:2.3:a:joomlamart:com_jacomment:*:*:*:*:*:*:*:*
epss-percentile: 0.84165
cpe: cpe:2.3:a:joomlamart:com_jacomment:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: joomlamart

View File

@ -5,6 +5,8 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: |
Update to the latest version of Joomla! Component ZiMB Comment or apply the provided patch to fix the LFI vulnerability.
reference:
- https://www.exploit-db.com/exploits/12283
- https://nvd.nist.gov/vuln/detail/CVE-2010-1602
@ -16,8 +18,8 @@ info:
cve-id: CVE-2010-1602
cwe-id: CWE-22
epss-score: 0.03451
cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:*
epss-percentile: 0.90259
cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: zimbllc

View File

@ -5,19 +5,19 @@ info:
author: daffainfo
severity: high
description: A directory traversal vulnerability in the ZiMB Core (aka ZiMBCore or com_zimbcore) component 0.1 in the ZiMB Manager collection for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/12284
- https://nvd.nist.gov/vuln/detail/CVE-2010-1603
- http://www.vupen.com/english/advisories/2010/0931
remediation: Upgrade to a supported version.
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-1603
cwe-id: CWE-22
epss-score: 0.03451
cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:*
epss-percentile: 0.90259
cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: zimbllc

Some files were not shown because too many files have changed in this diff Show More