commit
f9cf8a303a
|
@ -5,19 +5,19 @@ info:
|
|||
author: r3naissance
|
||||
severity: medium
|
||||
description: Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
|
||||
remediation: Upgrade to the latest version.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2000-0114
|
||||
- https://www.exploit-db.com/exploits/19897
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0114
|
||||
remediation: Upgrade to the latest version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2000-0114
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.09258
|
||||
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.93895
|
||||
cpe: cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: microsoft
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: critical
|
||||
description: |
|
||||
HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
|
||||
remediation: |
|
||||
Apply the appropriate patch or upgrade to a fixed version of the Cisco IOS software.
|
||||
reference:
|
||||
- https://www.rapid7.com/db/modules/auxiliary/scanner/http/cisco_ios_auth_bypass/
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2001-0537
|
||||
|
@ -17,14 +19,14 @@ info:
|
|||
cve-id: CVE-2001-0537
|
||||
cwe-id: CWE-287
|
||||
epss-score: 0.88063
|
||||
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.9824
|
||||
cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
verified: true
|
||||
shodan-query: product:"Cisco IOS http config" && 200
|
||||
max-request: 1
|
||||
vendor: cisco
|
||||
product: ios
|
||||
shodan-query: product:"Cisco IOS http config" && 200
|
||||
tags: cve,cve2001,cisco,ios,auth-bypass
|
||||
|
||||
http:
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: dhiyaneshDk
|
||||
severity: high
|
||||
description: The Virtual Keyboard plugin for SquirrelMail 1.2.6/1.2.7 is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||
remediation: |
|
||||
Upgrade to a patched version of SquirrelMail or apply the necessary security patches to mitigate the XSS vulnerability.
|
||||
reference:
|
||||
- http://www.redhat.com/support/errata/RHSA-2002-204.html
|
||||
- http://www.debian.org/security/2002/dsa-191
|
||||
|
@ -17,8 +19,8 @@ info:
|
|||
cve-id: CVE-2002-1131
|
||||
cwe-id: CWE-80
|
||||
epss-score: 0.06018
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.9253
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 5
|
||||
vendor: squirrelmail
|
||||
|
|
|
@ -5,21 +5,21 @@ info:
|
|||
author: dhiyaneshDk
|
||||
severity: medium
|
||||
description: Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
|
||||
remediation: Upgrade to the latest version.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/24068
|
||||
- http://security.gentoo.org/glsa/glsa-200405-16.xml
|
||||
- ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
|
||||
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858
|
||||
- http://marc.info/?l=bugtraq&m=108334862800260
|
||||
remediation: Upgrade to the latest version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 6.8
|
||||
cve-id: CVE-2004-0519
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02285
|
||||
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.88244
|
||||
cpe: cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: sgi
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
Multiple cross-site scripting (XSS) vulnerabilities in Open Bulletin Board (OpenBB) 1.0.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) redirect parameter to member.php, (2) to parameter to myhome.php (3) TID parameter to post.php, or (4) redirect parameter to index.php.
|
||||
remediation: |
|
||||
Upgrade to a patched version of Open Bulletin Board (OpenBB) or apply necessary security patches to mitigate the vulnerabilities.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/24055
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2004-1965
|
||||
|
@ -17,8 +19,8 @@ info:
|
|||
cve-id: CVE-2004-1965
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.0113
|
||||
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.82864
|
||||
cpe: cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: openbb
|
||||
|
|
|
@ -5,21 +5,21 @@ info:
|
|||
author: CasperGN
|
||||
severity: medium
|
||||
description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled (which is by default) allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).
|
||||
remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
|
||||
reference:
|
||||
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
|
||||
- https://www.exploit-db.com/exploits/39495
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2005-2428
|
||||
- http://marc.info/?l=bugtraq&m=112240869130356&w=2
|
||||
- http://securitytracker.com/id?1014584
|
||||
remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2005-2428
|
||||
cwe-id: CWE-200
|
||||
epss-score: 0.01188
|
||||
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.83354
|
||||
cpe: cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: ibm
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: pikpikcu
|
||||
severity: critical
|
||||
description: Horde Groupware contains an administrative account with a blank password, which allows remote attackers to gain access.
|
||||
remediation: |
|
||||
Apply the latest security patches or upgrade to a patched version of Horde Groupware to fix the vulnerability.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2005-3344
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3344
|
||||
|
@ -17,8 +19,8 @@ info:
|
|||
cve-id: CVE-2005-3344
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02158
|
||||
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.87895
|
||||
cpe: cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
vendor: horde
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
frameset.htm in the BSP runtime in SAP Web Application Server (WAS) 6.10 through 7.00 allows remote attackers to log users out and redirect them to arbitrary web sites via a close command in the sap-sessioncmd parameter and a URL in the sap-exiturl parameter.
|
||||
remediation: |
|
||||
Apply the latest security patches and updates provided by SAP to fix the open redirect vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/26488
|
||||
- https://cxsecurity.com/issue/WLB-2005110025
|
||||
|
@ -19,13 +21,13 @@ info:
|
|||
cve-id: CVE-2005-3634
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.02843
|
||||
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.89376
|
||||
cpe: cpe:2.3:a:sap:sap_web_application_server:6.10:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
shodan-query: html:"SAP Business Server Pages Team"
|
||||
vendor: sap
|
||||
product: sap_web_application_server
|
||||
shodan-query: html:"SAP Business Server Pages Team"
|
||||
tags: cve,cve2005,sap,redirect,business
|
||||
|
||||
http:
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: geeknik
|
||||
severity: medium
|
||||
description: Cofax 2.0 RC3 and earlier contains a cross-site scripting vulnerability in search.htm which allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter.
|
||||
remediation: |
|
||||
Upgrade to a version of Cofax that is not affected by this vulnerability or apply the necessary patches provided by the vendor.
|
||||
reference:
|
||||
- http://pridels0.blogspot.com/2005/12/cofax-xss-vuln.html
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2005-4385
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2005-4385
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.00294
|
||||
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.65316
|
||||
cpe: cpe:2.3:a:cofax:cofax:1.9.9c:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: cofax
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: geeknik
|
||||
severity: medium
|
||||
description: Cherokee HTTPD 0.5 and earlier contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via a malformed request that generates an HTTP 400 error, which is not properly handled when the error message is generated.
|
||||
remediation: |
|
||||
Upgrade to a patched version of Cherokee HTTPD or apply the necessary security patches to mitigate the XSS vulnerability.
|
||||
reference:
|
||||
- http://www.vupen.com/english/advisories/2006/1292
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2006-1681
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2006-1681
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.01015
|
||||
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.81872
|
||||
cpe: cpe:2.3:a:cherokee:cherokee_httpd:0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: cherokee
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: dhiyaneshDk
|
||||
severity: high
|
||||
description: SquirrelMail 1.4.6 and earlier versions are susceptible to a PHP local file inclusion vulnerability in functions/plugin.php if register_globals is enabled and magic_quotes_gpc is disabled. This allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter.
|
||||
remediation: |
|
||||
Upgrade Squirrelmail to a version higher than 1.4.6 or apply the necessary patches to fix the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/27948
|
||||
- http://squirrelmail.cvs.sourceforge.net/squirrelmail/squirrelmail/functions/global.php?r1=1.27.2.16&r2=1.27.2.17&view=patch&pathrev=SM-1_4-STABLE
|
||||
|
@ -17,8 +19,8 @@ info:
|
|||
cve-id: CVE-2006-2842
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.2925
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.96295
|
||||
cpe: cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: squirrelmail
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: geeknik
|
||||
severity: medium
|
||||
description: Jira Rainbow.Zen contains a cross-site scripting vulnerability via Jira/secure/BrowseProject.jspa which allows remote attackers to inject arbitrary web script or HTML via the id parameter.
|
||||
remediation: |
|
||||
Apply the latest security patches or upgrade to a patched version of Jira Rainbow.Zen to mitigate the Cross-Site Scripting vulnerability.
|
||||
reference:
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32418
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2007-0885
|
||||
|
@ -14,8 +16,8 @@ info:
|
|||
cve-id: CVE-2007-0885
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.0059
|
||||
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.75518
|
||||
cpe: cpe:2.3:a:rainbow_portal:rainbow.zen:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: rainbow_portal
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: Joomla! RSfiles 1.0.2 and earlier is susceptible to local file inclusion in index.php in the RSfiles component (com_rsfiles). This could allow remote attackers to arbitrarily read files via a .. (dot dot) in the path parameter in a files.display action.
|
||||
remediation: |
|
||||
Upgrade to the latest version of Joomla! RSfiles or apply the necessary patches provided by the vendor.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/4307
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36222
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2007-4504
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01677
|
||||
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.86094
|
||||
cpe: cpe:2.3:a:joomla:rsfiles:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
Apache Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via for"m input beginning with a "%{" sequence and ending with a "}" character.
|
||||
remediation: |
|
||||
Update to the latest version of Apache Struts2
|
||||
reference:
|
||||
- https://www.guildhab.top/?p=2326
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2007-4556
|
||||
|
@ -18,8 +20,8 @@ info:
|
|||
cve-id: CVE-2007-4556
|
||||
cwe-id: NVD-CWE-Other
|
||||
epss-score: 0.14147
|
||||
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.94981
|
||||
cpe: cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: opensymphony
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: dhiyaneshDK
|
||||
severity: medium
|
||||
description: phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, is vulnerable to cross-site scripting and allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, which are different vectors than CVE-2007-2865.
|
||||
remediation: |
|
||||
Upgrade to a patched version of phpPgAdmin or apply the necessary security patches provided by the vendor.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/30090
|
||||
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063617.html
|
||||
|
@ -17,13 +19,13 @@ info:
|
|||
cve-id: CVE-2007-5728
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.02361
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.8841
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:3.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
shodan-query: http.title:"phpPgAdmin"
|
||||
vendor: phppgadmin
|
||||
product: phppgadmin
|
||||
shodan-query: http.title:"phpPgAdmin"
|
||||
tags: cve,cve2007,xss,pgadmin,phppgadmin,edb
|
||||
|
||||
http:
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: high
|
||||
description: |
|
||||
PHP remote file inclusion vulnerability in modules/syntax_highlight.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the libpath parameter.
|
||||
remediation: |
|
||||
Update WordPress Sniplets to the latest version or apply the patch provided by the vendor to mitigate the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/5194
|
||||
- https://wpscan.com/vulnerability/d0278ebe-e6ae-4f7c-bcad-ba318573f881
|
||||
|
@ -18,8 +20,8 @@ info:
|
|||
cve-id: CVE-2008-1059
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.01493
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.85218
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: wordpress
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
WordPress Sniplets 1.1.2 and 1.2.2 plugin contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via the text parameter to warning.php, notice.php, and inset.php in view/sniplets/, and possibly modules/execute.php; via the url parameter to view/admin/submenu.php; and via the page parameter to view/admin/pager.php.
|
||||
remediation: |
|
||||
Update WordPress Sniplets plugin to the latest version available, which addresses the XSS vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/5194
|
||||
- https://wpscan.com/vulnerability/d0278ebe-e6ae-4f7c-bcad-ba318573f881
|
||||
|
@ -18,8 +20,8 @@ info:
|
|||
cve-id: CVE-2008-1061
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00938
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.81093
|
||||
cpe: cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: wordpress
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
Open redirect vulnerability in exchweb/bin/redir.asp in Microsoft Outlook Web Access (OWA) for Exchange Server 2003 SP2 (aka build 6.5.7638) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the URL parameter.
|
||||
remediation: |
|
||||
Apply the necessary security patches or upgrade to a newer version of Microsoft Exchange Server.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2008-1547
|
||||
- https://www.exploit-db.com/exploits/32489
|
||||
|
@ -17,13 +19,13 @@ info:
|
|||
cve-id: CVE-2008-1547
|
||||
cwe-id: CWE-601
|
||||
epss-score: 0.03523
|
||||
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
|
||||
epss-percentile: 0.90347
|
||||
cpe: cpe:2.3:a:microsoft:exchange_server:2003:sp2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
shodan-query: http.title:"Outlook"
|
||||
vendor: microsoft
|
||||
product: exchange_server
|
||||
shodan-query: http.title:"Outlook"
|
||||
tags: cve,cve2008,redirect,owa,exchange,microsoft
|
||||
|
||||
http:
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: unstabl3
|
||||
severity: medium
|
||||
description: AppServ Open Project 2.5.10 and earlier contains a cross-site scripting vulnerability in index.php which allows remote attackers to inject arbitrary web script or HTML via the appservlang parameter.
|
||||
remediation: |
|
||||
Upgrade to a patched version of AppServ Open Project (>=2.5.11) or apply the necessary security patches provided by the vendor.
|
||||
reference:
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42546
|
||||
- http://securityreason.com/securityalert/3896
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2008-2398
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00329
|
||||
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.67268
|
||||
cpe: cpe:2.3:a:appserv_open_project:appserv:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: appserv_open_project
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
CMSimple 3.1 is susceptible to local file inclusion via cmsimple/cms.php when register_globals is enabled which allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.
|
||||
remediation: |
|
||||
Upgrade CMSimple to a patched version or apply the necessary security patches provided by the vendor.
|
||||
reference:
|
||||
- http://www.cmsimple.com/forum/viewtopic.php?f=2&t=17
|
||||
- http://web.archive.org/web/20140729144732/http://secunia.com:80/advisories/30463
|
||||
|
@ -18,8 +20,8 @@ info:
|
|||
cve-id: CVE-2008-2650
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06344
|
||||
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.92723
|
||||
cpe: cpe:2.3:a:cmsimple:cmsimple:3.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: cmsimple
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: critical
|
||||
description: Joomla! Image Browser 0.1.5 rc2 is susceptible to local file inclusion via com_imagebrowser which could allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php.
|
||||
remediation: |
|
||||
Upgrade to a patched version of Joomla! Image Browser or apply the necessary security patches to mitigate the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/6618
|
||||
- http://securityreason.com/securityalert/4464
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2008-4668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01018
|
||||
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.819
|
||||
cpe: cpe:2.3:a:joomla:com_imagebrowser:0.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: Joomla! 2.0.0 RC2 and earlier are susceptible to local file inclusion in the eXtplorer module (com_extplorer) that allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action.
|
||||
remediation: |
|
||||
Upgrade Joomla! to a version higher than 2.0.0 RC2 to mitigate the vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/5435
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41873
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2008-4764
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00779
|
||||
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
|
||||
epss-percentile: 0.79142
|
||||
cpe: cpe:2.3:a:extplorer:com_extplorer:*:rc2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: extplorer
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: dhiyaneshDK
|
||||
severity: medium
|
||||
description: phpPgAdmin 4.2.1 is vulnerable to local file inclusion in libraries/lib.inc.php when register globals is enabled. Remote attackers can read arbitrary files via a .. (dot dot) in the _language parameter to index.php.
|
||||
remediation: |
|
||||
Upgrade phpPgAdmin to a version higher than 4.2.1 or apply the necessary patches provided by the vendor.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/7363
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2008-5587
|
||||
|
@ -17,13 +19,13 @@ info:
|
|||
cve-id: CVE-2008-5587
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02331
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.88339
|
||||
cpe: cpe:2.3:a:phppgadmin:phppgadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
shodan-query: http.title:"phpPgAdmin"
|
||||
vendor: phppgadmin
|
||||
product: phppgadmin
|
||||
shodan-query: http.title:"phpPgAdmin"
|
||||
tags: cve,cve2008,lfi,phppgadmin,edb
|
||||
|
||||
http:
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: Joomla! ionFiles 4.4.2 is susceptible to local file inclusion in download.php in the ionFiles (com_ionfiles) that allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
|
||||
remediation: |
|
||||
Update Joomla! ionFiles to the latest version or apply the provided patch to mitigate the vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/6809
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2008-6080
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2008-6080
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00666
|
||||
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.77115
|
||||
cpe: cpe:2.3:a:codecall:com_ionfiles:4.4.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: codecall
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter.
|
||||
remediation: |
|
||||
Update Joomla! Component RWCards to the latest version to mitigate the vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/6817
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2008-6172
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2008-6172
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00447
|
||||
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.71823
|
||||
cpe: cpe:2.3:a:weberr:rwcards:3.0.11:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: weberr
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: Joomla! Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php.
|
||||
remediation: |
|
||||
Apply the latest security patches or upgrade to a patched version of Joomla! ProDesk to mitigate the vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/6980
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2008-6222
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2008-6222
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00832
|
||||
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.79864
|
||||
cpe: cpe:2.3:a:joomlashowroom:pro_desk_support_center:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomlashowroom
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
Parallels H-Sphere 3.0.0 P9 and 3.1 P1 contains multiple cross-site scripting vulnerabilities in login.php in webshell4. An attacker can inject arbitrary web script or HTML via the err, errorcode, and login parameters, thus allowing theft of cookie-based authentication credentials and launch of other attacks.
|
||||
remediation: |
|
||||
Apply the latest security patches or upgrade to a newer version of Parallels H-Sphere to mitigate the XSS vulnerability.
|
||||
reference:
|
||||
- http://www.xssing.com/index.php?x=3&y=65
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45254
|
||||
|
@ -17,14 +19,14 @@ info:
|
|||
cve-id: CVE-2008-6465
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.00421
|
||||
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
|
||||
epss-percentile: 0.70992
|
||||
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
verified: true
|
||||
shodan-query: title:"Parallels H-Sphere
|
||||
max-request: 1
|
||||
vendor: parallels
|
||||
product: h-sphere
|
||||
shodan-query: title:"Parallels H-Sphere
|
||||
tags: cve,cve2008,xss,parallels,h-sphere
|
||||
|
||||
http:
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: geeknik
|
||||
severity: medium
|
||||
description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php.
|
||||
remediation: |
|
||||
Upgrade to a patched version of nweb2fax or apply the necessary security patches provided by the vendor.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/5856
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43173
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2008-6668
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00359
|
||||
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.68648
|
||||
cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
vendor: dirk_bartley
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
Devalcms 1.4a contains a cross-site scripting vulnerability in the currentpath parameter of the index.php file.
|
||||
remediation: |
|
||||
Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/6369
|
||||
- http://sourceforge.net/projects/devalcms/files/devalcms/devalcms-1.4b/devalcms-1.4b.zip/download
|
||||
|
@ -17,11 +19,11 @@ info:
|
|||
cve-id: CVE-2008-6982
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.0038
|
||||
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.69519
|
||||
cpe: cpe:2.3:a:devalcms:devalcms:1.4a:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
verified: true
|
||||
max-request: 1
|
||||
vendor: devalcms
|
||||
product: devalcms
|
||||
tags: cve,cve2008,devalcms,xss,cms,edb
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
Open redirect vulnerability in api.php in SiteEngine 5.x allows user-assisted remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the forward parameter in a logout action.
|
||||
remediation: |
|
||||
Apply the latest patches or updates provided by the vendor to fix the open redirect vulnerability.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2008-7269
|
||||
- https://www.exploit-db.com/exploits/6823
|
||||
|
@ -15,14 +17,14 @@ info:
|
|||
cve-id: CVE-2008-7269
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.01358
|
||||
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.84524
|
||||
cpe: cpe:2.3:a:boka:siteengine:5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
shodan-query: html:"SiteEngine"
|
||||
verified: "true"
|
||||
max-request: 1
|
||||
vendor: boka
|
||||
product: siteengine
|
||||
shodan-query: html:"SiteEngine"
|
||||
tags: cve,cve2008,redirect,siteengine
|
||||
|
||||
http:
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.
|
||||
remediation: |
|
||||
Apply the vendor-supplied patch or upgrade to a newer version of Autonomy Ultraseek that addresses the open redirect vulnerability.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2009-0347
|
||||
- https://www.exploit-db.com/exploits/32766
|
||||
|
@ -18,8 +20,8 @@ info:
|
|||
cve-id: CVE-2009-0347
|
||||
cwe-id: CWE-59
|
||||
epss-score: 0.09851
|
||||
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.94077
|
||||
cpe: cpe:2.3:a:autonomy:ultraseek:_nil_:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: autonomy
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: geeknik
|
||||
severity: critical
|
||||
description: ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action.
|
||||
remediation: |
|
||||
Upgrade to a patched version of ZeroShell.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/8023
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2009-0545
|
||||
|
@ -17,8 +19,8 @@ info:
|
|||
cve-id: CVE-2009-0545
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.9719
|
||||
cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
|
||||
epss-percentile: 0.99722
|
||||
cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: zeroshell
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: pikpikcu
|
||||
severity: medium
|
||||
description: Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 are susceptible to local file inclusion in framework/Image/Image.php because it allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
|
||||
remediation: |
|
||||
Apply the latest security patches or upgrade to a patched version of Horde/Horde Groupware.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/16154
|
||||
- http://cvs.horde.org/co.php/groupware/docs/groupware/CHANGES?r=1.28.2.5
|
||||
|
@ -17,8 +19,8 @@ info:
|
|||
cve-id: CVE-2009-0932
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04048
|
||||
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.9095
|
||||
cpe: cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: debian
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: princechaddha
|
||||
severity: high
|
||||
description: PhpMyAdmin Scripts 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 are susceptible to a remote code execution in setup.php that allows remote attackers to inject arbitrary PHP code into a configuration file via the save action. Combined with the ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
|
||||
remediation: |
|
||||
Update PhpMyAdmin to the latest version or apply the necessary patches.
|
||||
reference:
|
||||
- https://www.phpmyadmin.net/security/PMASA-2009-3/
|
||||
- https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433
|
||||
|
@ -17,8 +19,8 @@ info:
|
|||
cve-id: CVE-2009-1151
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.79256
|
||||
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.9785
|
||||
cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: phpmyadmin
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
Joomla! Cmimarketplace 0.1 is susceptible to local file inclusion because com_cmimarketplace allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php.
|
||||
remediation: |
|
||||
Apply the latest patch or upgrade to a newer version of Joomla! Cmimarketplace to mitigate the vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/8367
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2009-1496
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2009-1496
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00533
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.7415
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: Cisco Linksys WVC54GCA 1.00R22/1.00R24 is susceptible to local file inclusion in adm/file.cgi because it allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
|
||||
remediation: |
|
||||
Apply the latest firmware update provided by Cisco to fix the local file inclusion vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/32954
|
||||
- http://www.vupen.com/english/advisories/2009/1173
|
||||
|
@ -17,8 +19,8 @@ info:
|
|||
cve-id: CVE-2009-1558
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00901
|
||||
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.80705
|
||||
cpe: cpe:2.3:h:cisco:wvc54gca:1.00r22:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: cisco
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: princechaddha
|
||||
severity: medium
|
||||
description: Adobe ColdFusion Server 8.0.1 and earlier contain multiple cross-site scripting vulnerabilities which allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm.
|
||||
remediation: |
|
||||
Upgrade Adobe Coldfusion to a version higher than 8.0.1 or apply the necessary patches provided by the vendor.
|
||||
reference:
|
||||
- https://www.tenable.com/cve/CVE-2009-1872
|
||||
- http://www.adobe.com/support/security/bulletins/apsb09-12.html
|
||||
|
@ -16,14 +18,14 @@ info:
|
|||
cve-id: CVE-2009-1872
|
||||
cwe-id: CWE-79
|
||||
epss-score: 0.3657
|
||||
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.96635
|
||||
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
shodan-query: http.component:"Adobe ColdFusion"
|
||||
verified: true
|
||||
max-request: 1
|
||||
vendor: adobe
|
||||
product: coldfusion
|
||||
shodan-query: http.component:"Adobe ColdFusion"
|
||||
tags: cve,cve2009,adobe,xss,coldfusion,tenable
|
||||
|
||||
http:
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: Joomla! Ideal MooFAQ 1.0 via com_moofaq allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter (local file inclusion).
|
||||
remediation: |
|
||||
Update Joomla! MooFAQ to the latest version or apply the official patch provided by the vendor.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/8898
|
||||
- http://www.vupen.com/english/advisories/2009/1530
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2009-2015
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.79614
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: Joomla! JoomlaPraise Projectfork (com_projectfork) 2.0.10 allows remote attackers to read arbitrary files via local file inclusion in the section parameter to index.php.
|
||||
remediation: |
|
||||
Upgrade to a patched version of JoomlaPraise Projectfork or apply the necessary security patches to mitigate the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/8946
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2009-2100
|
||||
|
@ -14,8 +16,8 @@ info:
|
|||
cve-id: CVE-2009-2100
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00528
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.74045
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: Joomla! Agora 3.0.0b (com_agora) allows remote attackers to include and execute arbitrary local files via local file inclusion in the action parameter to the avatars page, reachable through index.php.
|
||||
remediation: |
|
||||
Apply the latest security patches or upgrade to a patched version of Joomla! Agora to mitigate the vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/9564
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52964
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2009-3053
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00367
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.69025
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: Joomla! Roland Breedveld Album 1.14 (com_album) is susceptible to local file inclusion because it allows remote attackers to access arbitrary directories and have unspecified other impact via a .. (dot dot) in the target parameter to index.php.
|
||||
remediation: |
|
||||
Update to the latest version of Joomla! Roland Breedveld Album and apply any available patches or security updates.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/9706
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2009-3318
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2009-3318
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00706
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.77913
|
||||
cpe: cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: Joomla! Omilen Photo Gallery (com_omphotogallery) component Beta 0.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php.
|
||||
remediation: |
|
||||
Upgrade to a patched version of Joomla! Omilen Photo Gallery or apply the necessary security patches to mitigate the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/8870
|
||||
- http://www.vupen.com/english/advisories/2009/1494
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2009-4202
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01956
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.87217
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: geeknik
|
||||
severity: high
|
||||
description: KR-Web 1.1b2 and prior contain a remote file inclusion vulnerability via adm/krgourl.php, which allows remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter.
|
||||
remediation: |
|
||||
Upgrade to a patched version of KR-Web or apply the necessary security patches to fix the remote file inclusion vulnerability.
|
||||
reference:
|
||||
- https://sourceforge.net/projects/krw/
|
||||
- https://www.exploit-db.com/exploits/10216
|
||||
|
@ -17,8 +19,8 @@ info:
|
|||
cve-id: CVE-2009-4223
|
||||
cwe-id: CWE-94
|
||||
epss-score: 0.01041
|
||||
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
|
||||
epss-percentile: 0.82106
|
||||
cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: gianni_tommasi
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: high
|
||||
description: |
|
||||
Joomla! Portfolio Nexus 1.5 contains a remote file inclusion vulnerability in the inertialFATE iF (com_if_nexus) component that allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: |
|
||||
Apply the latest security patches and updates provided by Joomla! to fix the Remote File Inclusion vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/33440
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2009-4679
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2009-4679
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.79783
|
||||
cpe: cpe:2.3:a:inertialfate:com_if_nexus:1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: inertialfate
|
||||
|
|
|
@ -5,18 +5,18 @@ info:
|
|||
author: pdteam
|
||||
severity: medium
|
||||
description: An open redirect vulnerability in awredir.pl in AWStats < 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2009-5020
|
||||
- http://awstats.sourceforge.net/docs/awstats_changelog.txt
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:P
|
||||
cvss-score: 5.8
|
||||
cve-id: CVE-2009-5020
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.00215
|
||||
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.58808
|
||||
cpe: cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
vendor: awstats
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in wgarcmin.cgi in WebGlimpse 2.18.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the DOC parameter.
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/36994
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2009-5114
|
||||
- http://websecurity.com.ua/2628/
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74321
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2009-5114
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03309
|
||||
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.90068
|
||||
cpe: cpe:2.3:a:iwork:webglimpse:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: iwork
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the Bible Study (com_biblestudy) component 6.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter in a studieslist action to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/10943
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0157
|
||||
- http://packetstormsecurity.org/1001-exploits/joomlabiblestudy-lfi.txt
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-0157
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.79783
|
||||
cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: pikpikcu
|
||||
severity: critical
|
||||
description: Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
|
||||
remediation: |
|
||||
Disable or restrict access to the Axis2 web interface, or apply the necessary patches or updates provided by the vendor.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0219
|
||||
- https://knowledge.broadcom.com/external/article/13994/vulnerability-axis2-default-administrato.html
|
||||
|
@ -17,13 +19,13 @@ info:
|
|||
cve-id: CVE-2010-0219
|
||||
cwe-id: CWE-255
|
||||
epss-score: 0.97513
|
||||
cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.99971
|
||||
cpe: cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 2
|
||||
shodan-query: http.html:"Apache Axis"
|
||||
vendor: apache
|
||||
product: axis2
|
||||
shodan-query: http.html:"Apache Axis"
|
||||
tags: cve,cve2010,axis,apache,default-login,axis2
|
||||
|
||||
http:
|
||||
|
|
|
@ -5,21 +5,21 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the ccNewsletter (com_ccnewsletter) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a ccnewsletter action to index.php.
|
||||
remediation: Apply all relevant security patches and upgrades.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11282
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0467
|
||||
- http://www.chillcreations.com/en/blog/ccnewsletter-joomla-newsletter/ccnewsletter-106-security-release.html
|
||||
- http://www.exploit-db.com/exploits/11277
|
||||
- http://www.exploit-db.com/exploits/11282
|
||||
remediation: Apply all relevant security patches and upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
|
||||
cvss-score: 5.8
|
||||
cve-id: CVE-2010-0467
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0586
|
||||
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.92444
|
||||
cpe: cpe:2.3:a:chillcreations:com_ccnewsletter:1.0.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: chillcreations
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in includes/download.php in the JoomlaWorks AllVideos (Jw_allVideos) plugin 3.0 through 3.2 for Joomla! allows remote attackers to read arbitrary files via a ./../.../ (modified dot dot) in the file parameter.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11447
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0696
|
||||
- http://www.joomlaworks.gr/content/view/77/34/
|
||||
- http://www.exploit-db.com/exploits/11447
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-0696
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.79015
|
||||
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.97844
|
||||
cpe: cpe:2.3:a:joomlaworks:jw_allvideos:3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomlaworks
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php in the Core Design Scriptegrator plugin 1.4.1 for Joomla! allows remote attackers to read, and possibly include and execute, arbitrary files via directory traversal sequences in the files[] parameter.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11498
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0759
|
||||
- http://www.exploit-db.com/exploits/11498
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56380
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-0759
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01326
|
||||
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.84334
|
||||
cpe: cpe:2.3:a:greatjoomla:scriptegrator_plugin:1.4.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: greatjoomla
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11089
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0942
|
||||
- http://packetstormsecurity.org/1001-exploits/joomlajvideodirect-traversal.txt
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55513
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-0942
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.72681
|
||||
cpe: cpe:2.3:a:jvideodirect:com_jvideodirect:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: jvideodirect
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the JA Showcase (com_jashowcase) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a jashowcase action to index.php.
|
||||
remediation: |
|
||||
Update to the latest version of Joomla! Component com_jashowcase to fix the directory traversal vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11090
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0943
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2010-0943
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.8306
|
||||
cpe: cpe:2.3:a:joomlart:com_jashowcase:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomlart
|
||||
|
|
|
@ -5,21 +5,21 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the JCollection (com_jcollection) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11088
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0944
|
||||
- http://packetstormsecurity.org/1001-exploits/joomlajcollection-traversal.txt
|
||||
- http://www.exploit-db.com/exploits/11088
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55514
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-0944
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.72681
|
||||
cpe: cpe:2.3:a:thorsten_riess:com_jcollection:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: thorsten_riess
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11738
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0972
|
||||
- http://www.exploit-db.com/exploits/11738
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56863
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-0972
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.79614
|
||||
cpe: cpe:2.3:a:g4j.laoneo:com_gcalendar:2.1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: g4j.laoneo
|
||||
|
|
|
@ -5,18 +5,18 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/10942
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0982
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 4.3
|
||||
cve-id: CVE-2010-0982
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0087
|
||||
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.80286
|
||||
cpe: cpe:2.3:a:joomlamo:com_cartweberp:1.56.75:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomlamo
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/10948
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0985
|
||||
- http://www.exploit-db.com/exploits/10948
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55348
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-0985
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01222
|
||||
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.83609
|
||||
cpe: cpe:2.3:a:chris_simon:com_abbrev:1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: chris_simon
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11760
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1056
|
||||
- http://www.rockettheme.com/extensions-updates/638-rokdownloads-10-released
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56898
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 6.8
|
||||
cve-id: CVE-2010-1056
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.06484
|
||||
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.92801
|
||||
cpe: cpe:2.3:a:rockettheme:com_rokdownloads:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: rockettheme
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11511
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1081
|
||||
- http://www.corejoomla.com/component/content/article/1-corejoomla-updates/40-community-polls-v153-security-release.html
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1081
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02282
|
||||
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.88237
|
||||
cpe: cpe:2.3:a:corejoomla:com_communitypolls:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: corejoomla
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE -- the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected.
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11814
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1217
|
||||
- http://www.packetstormsecurity.org/1003-exploits/joomlajetooltip-lfi.txt
|
||||
- http://www.exploit-db.com/exploits/11814
|
||||
remediation: Apply all relevant security patches and product upgrades.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 4.3
|
||||
cve-id: CVE-2010-1217
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.8306
|
||||
cpe: cpe:2.3:a:je_form_creator:je_form_creator:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: je_form_creator
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11757
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1219
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56901
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 6.8
|
||||
cve-id: CVE-2010-1219
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.79614
|
||||
cpe: cpe:2.3:a:com_janews:com_janews:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: com_janews
|
||||
|
|
|
@ -5,18 +5,18 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11978
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1302
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1302
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01204
|
||||
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.83479
|
||||
cpe: cpe:2.3:a:decryptweb:com_dwgraphs:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: decryptweb
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in userstatus.php in the User Status (com_userstatus) component 1.21.16 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11998
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1304
|
||||
- http://www.exploit-db.com/exploits/11998
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57483
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1304
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0045
|
||||
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.71928
|
||||
cpe: cpe:2.3:a:joomlamo:com_userstatus:1.21.16:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomlamo
|
||||
|
|
|
@ -5,21 +5,21 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12065
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1305
|
||||
- http://extensions.joomla.org/extensions/e-commerce/shopping-cart/7951
|
||||
- http://www.vupen.com/english/advisories/2010/0811
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57538
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1305
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03203
|
||||
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.89919
|
||||
cpe: cpe:2.3:a:joomlamo:com_jinventory:1.23.02:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomlamo
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12058
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1306
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57508
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-1306
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.83796
|
||||
cpe: cpe:2.3:a:roberto_aloi:com_joomlapicasa2:2.0.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: roberto_aloi
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Magic Updater (com_joomlaupdater) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12070
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1307
|
||||
- http://www.vupen.com/english/advisories/2010/0806
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57531
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1307
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01751
|
||||
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.86395
|
||||
cpe: cpe:2.3:a:software.realtyna:com_joomlaupdater:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: software.realtyna
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the SVMap (com_svmap) component 1.1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12066
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1308
|
||||
- http://www.vupen.com/english/advisories/2010/0809
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1308
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01334
|
||||
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.84366
|
||||
cpe: cpe:2.3:a:la-souris-verte:com_svmap:1.1.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: la-souris-verte
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12077
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1312
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlanewportal-lfi.txt
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1312
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.8306
|
||||
cpe: cpe:2.3:a:ijoomla:com_news_portal:1.5.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: ijoomla
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12082
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1313
|
||||
- http://www.exploit-db.com/exploits/12082
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 4.3
|
||||
cve-id: CVE-2010-1313
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0045
|
||||
cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.71928
|
||||
cpe: cpe:2.3:a:seber:com_sebercart:1.0.0.12:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: seber
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12086
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1314
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txt
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1314
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.72681
|
||||
cpe: cpe:2.3:a:joomlanook:com_hsconfig:1.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomlanook
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11999
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1315
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlaweberpcustomer-lfi.txt
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57482
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1315
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0087
|
||||
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.80286
|
||||
cpe: cpe:2.3:a:joomlamo:com_weberpcustomer:1.2.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomlamo
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/33797
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1340
|
||||
- http://packetstormsecurity.org/1003-exploits/joomlajresearch-lfi.txt
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57123
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1340
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01155
|
||||
cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.8306
|
||||
cpe: cpe:2.3:a:joomla-research:com_jresearch:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla-research
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/15453
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1345
|
||||
- http://www.exploit-db.com/exploits/11785
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1345
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.72681
|
||||
cpe: cpe:2.3:a:cookex:com_ckforms:1.3.3:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: cookex
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12084
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1352
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlajukebox-lfi.txt
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1352
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.72681
|
||||
cpe: cpe:2.3:a:jooforge:com_jukebox:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: jooforge
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
|
||||
remediation: |
|
||||
Apply the latest security patches or updates provided by Joomla! to fix the LFI vulnerability in LoginBox component.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12068
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1353
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2010-1353
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01751
|
||||
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.86395
|
||||
cpe: cpe:2.3:a:wowjoomla:com_loginbox:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: wowjoomla
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12102
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1354
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlavjdeo-lfi.txt
|
||||
- http://www.exploit-db.com/exploits/12102
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1354
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.72681
|
||||
cpe: cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: ternaria
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
Red Hat JBoss Enterprise Application Platform 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 is susceptible to sensitive information disclosure. A remote attacker can obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression.
|
||||
remediation: |
|
||||
Apply the necessary patches or updates provided by Red Hat to fix the vulnerability.
|
||||
reference:
|
||||
- https://rhn.redhat.com/errata/RHSA-2010-0377.html
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1429
|
||||
|
@ -18,14 +20,14 @@ info:
|
|||
cve-id: CVE-2010-1429
|
||||
cwe-id: CWE-264
|
||||
epss-score: 0.00573
|
||||
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
|
||||
epss-percentile: 0.75122
|
||||
cpe: cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
shodan-query: title:"JBoss"
|
||||
verified: true
|
||||
max-request: 1
|
||||
vendor: redhat
|
||||
product: jboss_enterprise_application_platform
|
||||
shodan-query: title:"JBoss"
|
||||
tags: cve,cve2010,jboss,eap,tomcat,exposure
|
||||
|
||||
http:
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12232
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1461
|
||||
- http://www.exploit-db.com/exploits/12232
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1461
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.72681
|
||||
cpe: cpe:2.3:a:gogoritas:com_photobattle:1.0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: gogoritas
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Ternaria Informatica JProject Manager (com_jprojectmanager) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12146
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1469
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlajprojectmanager-lfi.txt
|
||||
- http://www.exploit-db.com/exploits/12146
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 6.8
|
||||
cve-id: CVE-2010-1469
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00813
|
||||
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.79614
|
||||
cpe: cpe:2.3:a:ternaria:com_jprojectmanager:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: ternaria
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and have possibly other unspecified impacts via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12166
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1470
|
||||
- http://www.exploit-db.com/exploits/12166
|
||||
- http://www.vupen.com/english/advisories/2010/0858
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-1470
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04616
|
||||
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.915
|
||||
cpe: cpe:2.3:a:dev.pucit.edu.pk:com_webtv:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: dev.pucit.edu.pk
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: |
|
||||
Update to the latest version of Joomla! Component Address Book or apply the necessary patches to fix the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12170
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1471
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2010-1471
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05684
|
||||
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.92341
|
||||
cpe: cpe:2.3:a:b-elektro:com_addressbook:1.5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: b-elektro
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12167
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1472
|
||||
- http://www.exploit-db.com/exploits/12167
|
||||
- http://www.vupen.com/english/advisories/2010/0859
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-1472
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.05684
|
||||
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.92341
|
||||
cpe: cpe:2.3:a:kazulah:com_horoscope:1.5.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: kazulah
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12171
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1473
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlaeasyadbanner-lfi.txt
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 6.8
|
||||
cve-id: CVE-2010-1473
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.79783
|
||||
cpe: cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: johnmccollum
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: |
|
||||
Update to the latest version of Joomla! Component Sweetykeeper or apply the necessary patches to fix the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12182
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1474
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2010-1474
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.83796
|
||||
cpe: cpe:2.3:a:supachai_teasakul:com_sweetykeeper:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: supachai_teasakul
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: |
|
||||
Update to the latest version of Joomla! Component Preventive And Reservation and apply any available patches or fixes to mitigate the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12147
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1475
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2010-1475
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01242
|
||||
cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.83796
|
||||
cpe: cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: ternaria
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the view parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12150
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1476
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlaalphauserpoints-lfi.txt
|
||||
- http://www.alphaplug.com/
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 6.8
|
||||
cve-id: CVE-2010-1476
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03527
|
||||
cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.90353
|
||||
cpe: cpe:2.3:a:alphaplug:com_alphauserpoints:1.5.5:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: alphaplug
|
||||
|
|
|
@ -5,18 +5,18 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12145
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1478
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 6.8
|
||||
cve-id: CVE-2010-1478
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00826
|
||||
cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.79783
|
||||
cpe: cpe:2.3:a:ternaria:com_jfeedback:1.2:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: ternaria
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12318
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1491
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlammsblog-lfi.txt
|
||||
- http://www.exploit-db.com/exploits/12318
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1491
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.72681
|
||||
cpe: cpe:2.3:a:mms.pipp:com_mmsblog:2.3.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: mms.pipp
|
||||
|
|
|
@ -5,21 +5,21 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12113
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1494
|
||||
- http://www.exploit-db.com/exploits/12113
|
||||
- http://www.awdwall.com/index.php/awdwall-updates-logs-
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57693
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1494
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.02305
|
||||
cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.88291
|
||||
cpe: cpe:2.3:a:awdsolution:com_awdwall:1.5.4:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: awdsolution
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12286
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1495
|
||||
- http://www.vupen.com/english/advisories/2010/0929
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlamatamko-lfi.txt
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-1495
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.04503
|
||||
cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.91406
|
||||
cpe: cpe:2.3:a:matamko:com_matamko:1.01:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: matamko
|
||||
|
|
|
@ -5,21 +5,21 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12054
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1531
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlaredshop-lfi.txt
|
||||
- http://redcomponent.com/redshop/redshop-changelog
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57512
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-1531
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01815
|
||||
cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.8667
|
||||
cpe: cpe:2.3:a:redcomponent:com_redshop:1.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: redcomponent
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12118
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1532
|
||||
- http://packetstormsecurity.org/1004-exploits/joomlapowermail-lfi.txt
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1532
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00477
|
||||
cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.72681
|
||||
cpe: cpe:2.3:a:givesight:com_powermail:1.53:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: givesight
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12142
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1533
|
||||
- http://www.exploit-db.com/exploits/12142
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-1533
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00706
|
||||
cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.77913
|
||||
cpe: cpe:2.3:a:peter_hocherl:com_tweetla:1.0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: peter_hocherl
|
||||
|
|
|
@ -5,20 +5,20 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the Shoutbox Pro (com_shoutbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to a supported version
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12067
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1534
|
||||
- http://www.exploit-db.com/exploits/12067
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57534
|
||||
remediation: Upgrade to a supported version
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
|
||||
cvss-score: 5
|
||||
cve-id: CVE-2010-1534
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01733
|
||||
cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.86312
|
||||
cpe: cpe:2.3:a:joomla.batjo:com_shoutbox:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomla.batjo
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: |
|
||||
Update to the latest version of Joomla! Component TRAVELbook or apply the necessary patches to fix the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12151
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1535
|
||||
|
@ -15,8 +17,8 @@ info:
|
|||
cve-id: CVE-2010-1535
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.00706
|
||||
cpe: cpe:2.3:a:peter_hocherl:com_travelbook:1.0.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.77913
|
||||
cpe: cpe:2.3:a:peter_hocherl:com_travelbook:1.0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: peter_hocherl
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter.
|
||||
remediation: |
|
||||
Apply the latest security patches or updates provided by Joomla! to fix the directory traversal vulnerability in com_blog component.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/11625
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1540
|
||||
|
@ -14,8 +16,8 @@ info:
|
|||
cve-id: CVE-2010-1540
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.0045
|
||||
cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.71928
|
||||
cpe: cpe:2.3:a:myblog:com_myblog:3.0.329:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: myblog
|
||||
|
|
|
@ -6,6 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: |
|
||||
Open redirect vulnerability in red2301.html in HP System Management Homepage (SMH) 2.x.x.x allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the RedirectUrl parameter.
|
||||
remediation: |
|
||||
Apply the latest patches or updates provided by HP to fix the open redirect vulnerability.
|
||||
reference:
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1586
|
||||
- https://yehg.net/lab/pr0js/advisories/hp_system_management_homepage_url_redirection_abuse
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2010-1586
|
||||
cwe-id: CWE-20
|
||||
epss-score: 0.00846
|
||||
cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.80024
|
||||
cpe: cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: hp
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
description: A directory traversal vulnerability in the JA Comment (com_jacomment) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
|
||||
remediation: |
|
||||
Apply the latest security patches or upgrade to a patched version of Joomla! Component JA Comment to mitigate the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12236
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1601
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2010-1601
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.01299
|
||||
cpe: cpe:2.3:a:joomlamart:com_jacomment:*:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.84165
|
||||
cpe: cpe:2.3:a:joomlamart:com_jacomment:*:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: joomlamart
|
||||
|
|
|
@ -5,6 +5,8 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: |
|
||||
Update to the latest version of Joomla! Component ZiMB Comment or apply the provided patch to fix the LFI vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12283
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1602
|
||||
|
@ -16,8 +18,8 @@ info:
|
|||
cve-id: CVE-2010-1602
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03451
|
||||
cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.90259
|
||||
cpe: cpe:2.3:a:zimbllc:com_zimbcomment:0.8.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: zimbllc
|
||||
|
|
|
@ -5,19 +5,19 @@ info:
|
|||
author: daffainfo
|
||||
severity: high
|
||||
description: A directory traversal vulnerability in the ZiMB Core (aka ZiMBCore or com_zimbcore) component 0.1 in the ZiMB Manager collection for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
|
||||
remediation: Upgrade to the latest version to mitigate this vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/12284
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-1603
|
||||
- http://www.vupen.com/english/advisories/2010/0931
|
||||
remediation: Upgrade to a supported version.
|
||||
classification:
|
||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2010-1603
|
||||
cwe-id: CWE-22
|
||||
epss-score: 0.03451
|
||||
cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:*
|
||||
epss-percentile: 0.90259
|
||||
cpe: cpe:2.3:a:zimbllc:com_zimbcore:0.1:*:*:*:*:*:*:*
|
||||
metadata:
|
||||
max-request: 1
|
||||
vendor: zimbllc
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue