-
Notifications
You must be signed in to change notification settings - Fork 58
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
GSD-automation
committed
Apr 24, 2024
1 parent
74a6e92
commit 0fe7cbb
Showing
713 changed files
with
33,265 additions
and
2,518 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -138,6 +138,11 @@ | |
"name": "https://dheatattack.gitlab.io/", | ||
"refsource": "MISC", | ||
"url": "https://dheatattack.gitlab.io/" | ||
}, | ||
{ | ||
"name": "https://ieeexplore.ieee.org/document/10374117", | ||
"refsource": "MISC", | ||
"url": "https://ieeexplore.ieee.org/document/10374117" | ||
} | ||
] | ||
} | ||
|
@@ -586,7 +591,7 @@ | |
} | ||
], | ||
"id": "CVE-2002-20001", | ||
"lastModified": "2024-01-11T03:15:08.380", | ||
"lastModified": "2024-04-23T07:15:41.853", | ||
"metrics": { | ||
"cvssMetricV2": [ | ||
{ | ||
|
@@ -674,6 +679,10 @@ | |
"source": "[email protected]", | ||
"url": "https://gitlab.com/dheatattack/dheater" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://ieeexplore.ieee.org/document/10374117" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -105,110 +105,119 @@ | |
} | ||
}, | ||
"nvd.nist.gov": { | ||
"configurations": { | ||
"CVE_data_version": "4.0", | ||
"nodes": [ | ||
"cve": { | ||
"configurations": [ | ||
{ | ||
"children": [], | ||
"cpe_match": [ | ||
"nodes": [ | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:voice_of_web:allmyguests:*:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"versionEndIncluding": "0.4.1", | ||
"vulnerable": true | ||
"cpeMatch": [ | ||
{ | ||
"criteria": "cpe:2.3:a:allmyguests_project:allmyguests:*:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "C340FD19-43D3-4CA4-A1AA-1E97492F3C45", | ||
"versionEndIncluding": "0.4.1", | ||
"vulnerable": true | ||
} | ||
], | ||
"negate": false, | ||
"operator": "OR" | ||
} | ||
], | ||
"operator": "OR" | ||
] | ||
} | ||
] | ||
}, | ||
"cve": { | ||
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2006-4993" | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"lang": "en", | ||
"value": "Multiple PHP remote file inclusion vulnerabilities in AllMyGuests 0.4.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the _AMGconfig[cfg_serverpath] parameter in (1) modules/AllMyGuests/signin.php (aka the Nuke module) and (2) AllMyGuests/signin.php (aka the standalone)." | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Multiple PHP remote file inclusion vulnerabilities in AllMyGuests 0.4.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the _AMGconfig[cfg_serverpath] parameter in (1) modules/AllMyGuests/signin.php (aka the Nuke module) and (2) AllMyGuests/signin.php (aka the standalone)." | ||
}, | ||
{ | ||
"lang": "es", | ||
"value": "M\u00faltiples vulnerabilidades PHP de inclusi\u00f3n remota de archivo en AllMyGuests 0.4.1 y anteriores permiten a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro _AMGconfig[cfg_serverpath] en modules/AllMyGuests/signin.php (tambi\u00e9n conocido como el m\u00f3dulo Nuke) y (2) AllMyGuests/signin.php (tambi\u00e9n conocido como el aut\u00f3nomo)." | ||
} | ||
], | ||
"id": "CVE-2006-4993", | ||
"lastModified": "2024-04-23T19:52:10.963", | ||
"metrics": { | ||
"cvssMetricV2": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "NVD-CWE-Other" | ||
} | ||
] | ||
"acInsufInfo": false, | ||
"baseSeverity": "HIGH", | ||
"cvssData": { | ||
"accessComplexity": "LOW", | ||
"accessVector": "NETWORK", | ||
"authentication": "NONE", | ||
"availabilityImpact": "PARTIAL", | ||
"baseScore": 7.5, | ||
"confidentialityImpact": "PARTIAL", | ||
"integrityImpact": "PARTIAL", | ||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", | ||
"version": "2.0" | ||
}, | ||
"exploitabilityScore": 10.0, | ||
"impactScore": 6.4, | ||
"obtainAllPrivilege": false, | ||
"obtainOtherPrivilege": true, | ||
"obtainUserPrivilege": false, | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"userInteractionRequired": false | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "22095", | ||
"refsource": "SECUNIA", | ||
"tags": [], | ||
"url": "http://secunia.com/advisories/22095" | ||
}, | ||
{ | ||
"name": "20303", | ||
"refsource": "BID", | ||
"tags": [], | ||
"url": "http://www.securityfocus.com/bid/20303" | ||
}, | ||
{ | ||
"name": "ADV-2006-3863", | ||
"refsource": "VUPEN", | ||
"tags": [], | ||
"url": "http://www.vupen.com/english/advisories/2006/3863" | ||
}, | ||
{ | ||
"name": "allmyguests-signin-file-include(29064)", | ||
"refsource": "XF", | ||
"tags": [], | ||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29064" | ||
}, | ||
{ | ||
"name": "2405", | ||
"refsource": "EXPLOIT-DB", | ||
"tags": [], | ||
"url": "https://www.exploit-db.com/exploits/2405" | ||
} | ||
] | ||
} | ||
}, | ||
"impact": { | ||
"baseMetricV2": { | ||
"cvssV2": { | ||
"accessComplexity": "LOW", | ||
"accessVector": "NETWORK", | ||
"authentication": "NONE", | ||
"availabilityImpact": "PARTIAL", | ||
"baseScore": 7.5, | ||
"confidentialityImpact": "PARTIAL", | ||
"integrityImpact": "PARTIAL", | ||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", | ||
"version": "2.0" | ||
"published": "2006-09-26T02:07:00.000", | ||
"references": [ | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Broken Link" | ||
], | ||
"url": "http://secunia.com/advisories/22095" | ||
}, | ||
"exploitabilityScore": 10.0, | ||
"impactScore": 6.4, | ||
"obtainAllPrivilege": false, | ||
"obtainOtherPrivilege": true, | ||
"obtainUserPrivilege": false, | ||
"severity": "HIGH", | ||
"userInteractionRequired": false | ||
} | ||
}, | ||
"lastModifiedDate": "2017-10-19T01:29Z", | ||
"publishedDate": "2006-09-26T02:07Z" | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Third Party Advisory", | ||
"VDB Entry" | ||
], | ||
"url": "http://www.securityfocus.com/bid/20303" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Permissions Required" | ||
], | ||
"url": "http://www.vupen.com/english/advisories/2006/3863" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"VDB Entry" | ||
], | ||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29064" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Third Party Advisory", | ||
"VDB Entry" | ||
], | ||
"url": "https://www.exploit-db.com/exploits/2405" | ||
} | ||
], | ||
"sourceIdentifier": "[email protected]", | ||
"vulnStatus": "Analyzed", | ||
"weaknesses": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "NVD-CWE-Other" | ||
} | ||
], | ||
"source": "[email protected]", | ||
"type": "Primary" | ||
} | ||
] | ||
} | ||
} | ||
} | ||
} |
Oops, something went wrong.