Hanno Böck commited on 2019-12-11 18:39:41
Zeige 32 geänderte Dateien mit 2186 Einfügungen und 1362 Löschungen.
| ... | ... |
@@ -1,132 +0,0 @@ |
| 1 |
-[phpBB] |
|
| 2 |
-url=https://www.phpbb.com |
|
| 3 |
-safe=3.2.8 |
|
| 4 |
-vuln=CVE-2019-16108 |
|
| 5 |
-file=CHANGELOG.html |
|
| 6 |
-variable=Changes since |
|
| 7 |
-add_minor=1 |
|
| 8 |
-subdir=1 |
|
| 9 |
- |
|
| 10 |
-[DeluxeBB] |
|
| 11 |
-url=http://www.deluxebb.com/ |
|
| 12 |
-safe= |
|
| 13 |
-vuln=CVE-2010-4151 |
|
| 14 |
-file=header.php |
|
| 15 |
-variable=$versionname |
|
| 16 |
-subdir=0 |
|
| 17 |
-extra_match=DeluxeBB |
|
| 18 |
- |
|
| 19 |
-[PunBB] |
|
| 20 |
-url=http://punbb.org/ |
|
| 21 |
-safe=1.4.1 |
|
| 22 |
-vuln=https://secunia.com/advisories/46864 |
|
| 23 |
-file=db_update.php |
|
| 24 |
-variable=UPDATE_TO |
|
| 25 |
-extra_match=@package PunBB |
|
| 26 |
-subdir=0 |
|
| 27 |
- |
|
| 28 |
-[PunBB12] |
|
| 29 |
-url=http://punbb.org/ |
|
| 30 |
-safe=1.4.1 |
|
| 31 |
-vuln=https://secunia.com/advisories/46864 |
|
| 32 |
-file=install.php |
|
| 33 |
-variable=$punbb_version |
|
| 34 |
-subdir=0 |
|
| 35 |
- |
|
| 36 |
-[UseBB] |
|
| 37 |
-url=http://www.usebb.net/ |
|
| 38 |
-safe=1.0.12 |
|
| 39 |
-latest=1.0.16 |
|
| 40 |
-vuln=CVE-2011-3611 |
|
| 41 |
-file=common.php |
|
| 42 |
-variable=USEBB_VERSION |
|
| 43 |
-subdir=1 |
|
| 44 |
- |
|
| 45 |
-[Vanilla] |
|
| 46 |
-url=http://vanillaforums.com/ |
|
| 47 |
-safe=2.1.3 |
|
| 48 |
-vuln=http://vanillaforums.org/discussion/27822/vanilla-2-1-3-security-release |
|
| 49 |
-file=version.php |
|
| 50 |
-variable=APPLICATION_VERSION |
|
| 51 |
-subdir=1 |
|
| 52 |
-extra_match=define('APPLICATION', 'Vanilla');
|
|
| 53 |
- |
|
| 54 |
-[Vanilla2] |
|
| 55 |
-url=http://vanillaforums.com/ |
|
| 56 |
-safe=2.1.3 |
|
| 57 |
-vuln=http://vanillaforums.org/discussion/27822/vanilla-2-1-3-security-release |
|
| 58 |
-file=index.php |
|
| 59 |
-variable=APPLICATION_VERSION |
|
| 60 |
-subdir=0 |
|
| 61 |
-extra_match=define('APPLICATION', 'Vanilla');
|
|
| 62 |
- |
|
| 63 |
-[Simple_Machines_Forum] |
|
| 64 |
-url=http://www.simplemachines.org/ |
|
| 65 |
-safe=2.0.5 |
|
| 66 |
-old_safe=1.1.16 |
|
| 67 |
-vuln=http://www.simplemachines.org/community/index.php?topic=509417.0 |
|
| 68 |
-file=index.php |
|
| 69 |
-variable=$forum_version |
|
| 70 |
-subdir=0 |
|
| 71 |
-extra_match=Simple Machines Forum |
|
| 72 |
- |
|
| 73 |
-[MyBB] |
|
| 74 |
-url=http://www.mybboard.net/ |
|
| 75 |
-safe=1.8.3 |
|
| 76 |
-old_safe=1.6.16 |
|
| 77 |
-vuln=http://blog.mybb.com/2014/11/20/mybb-1-8-3-1-6-16-released-security-releases/ |
|
| 78 |
-file=class_core.php |
|
| 79 |
-variable=$version |
|
| 80 |
-subdir=1 |
|
| 81 |
- |
|
| 82 |
-[Phorum] |
|
| 83 |
-url=http://www.phorum.org/ |
|
| 84 |
-safe=5.2.19 |
|
| 85 |
-latest=5.2.19 |
|
| 86 |
-vuln=http://www.phorum.org/phorum5/read.php?64,151943 |
|
| 87 |
-file=common.php |
|
| 88 |
-variable=define( "PHORUM" |
|
| 89 |
-subdir=0 |
|
| 90 |
- |
|
| 91 |
-[wBB] |
|
| 92 |
-url=http://www.woltlab.com/ |
|
| 93 |
-safe=3.0.9 |
|
| 94 |
-vuln=http://www.securityfocus.com/archive/1/503867/30/60/threaded |
|
| 95 |
-file=config.inc.php |
|
| 96 |
-variable=define('PACKAGE_VERSION',
|
|
| 97 |
-subdir=0 |
|
| 98 |
- |
|
| 99 |
-[WBBLite] |
|
| 100 |
-url=http://wbblite.com/ |
|
| 101 |
-safe=2.1 |
|
| 102 |
-vuln=http://www.securityfocus.com/archive/1/503867/30/60/threaded |
|
| 103 |
-file=package.xml |
|
| 104 |
-variable=<version> |
|
| 105 |
-extra_match=<packagename>WoltLab Burning Board Lite</packagename> |
|
| 106 |
-subdir=0 |
|
| 107 |
- |
|
| 108 |
-[FluxBB12] |
|
| 109 |
-url=https://fluxbb.org/ |
|
| 110 |
-safe=1.5.11 |
|
| 111 |
-vuln=https://fluxbb.org/forums/viewtopic.php?id=9472 |
|
| 112 |
-file=install.php |
|
| 113 |
-variable=$fluxbb_version |
|
| 114 |
-subdir=1 |
|
| 115 |
- |
|
| 116 |
-[FluxBB] |
|
| 117 |
-url=https://fluxbb.org/ |
|
| 118 |
-safe=1.5.11 |
|
| 119 |
-vuln=https://fluxbb.org/forums/viewtopic.php?id=9472 |
|
| 120 |
-file=common.php |
|
| 121 |
-variable=FORUM_VERSION |
|
| 122 |
-extra_match=FORUM_DB_REVISION |
|
| 123 |
-subdir=1 |
|
| 124 |
- |
|
| 125 |
-[vBulletin] |
|
| 126 |
-url=https://www.vbulletin.com/ |
|
| 127 |
-safe=4.2.2 |
|
| 128 |
-vuln=CVE-2013-6129 |
|
| 129 |
-file=class_core.php |
|
| 130 |
-variable=define('FILE_VERSION'
|
|
| 131 |
-subdir=1 |
|
| 132 |
-extra_match=vBulletin |
| ... | ... |
@@ -0,0 +1,210 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "phpBB", |
|
| 4 |
+ "url": "https://www.phpbb.com", |
|
| 5 |
+ "safe": "3.2.8", |
|
| 6 |
+ "vuln": "CVE-2019-16108", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "CHANGELOG.html", |
|
| 10 |
+ "variable": "Changes since", |
|
| 11 |
+ "subdir": 1, |
|
| 12 |
+ "add_minor": "1" |
|
| 13 |
+ } |
|
| 14 |
+ ] |
|
| 15 |
+ }, |
|
| 16 |
+ {
|
|
| 17 |
+ "name": "DeluxeBB", |
|
| 18 |
+ "url": "http://www.deluxebb.com/", |
|
| 19 |
+ "safe": "", |
|
| 20 |
+ "vuln": "CVE-2010-4151", |
|
| 21 |
+ "detection": [ |
|
| 22 |
+ {
|
|
| 23 |
+ "file": "header.php", |
|
| 24 |
+ "variable": "$versionname", |
|
| 25 |
+ "subdir": 0, |
|
| 26 |
+ "extra_match": "DeluxeBB" |
|
| 27 |
+ } |
|
| 28 |
+ ] |
|
| 29 |
+ }, |
|
| 30 |
+ {
|
|
| 31 |
+ "name": "PunBB", |
|
| 32 |
+ "url": "http://punbb.org/", |
|
| 33 |
+ "safe": "1.4.1", |
|
| 34 |
+ "vuln": "https://secunia.com/advisories/46864", |
|
| 35 |
+ "detection": [ |
|
| 36 |
+ {
|
|
| 37 |
+ "file": "db_update.php", |
|
| 38 |
+ "variable": "UPDATE_TO", |
|
| 39 |
+ "subdir": 0, |
|
| 40 |
+ "extra_match": "@package PunBB" |
|
| 41 |
+ } |
|
| 42 |
+ ] |
|
| 43 |
+ }, |
|
| 44 |
+ {
|
|
| 45 |
+ "name": "PunBB12", |
|
| 46 |
+ "url": "http://punbb.org/", |
|
| 47 |
+ "safe": "1.4.1", |
|
| 48 |
+ "vuln": "https://secunia.com/advisories/46864", |
|
| 49 |
+ "detection": [ |
|
| 50 |
+ {
|
|
| 51 |
+ "file": "install.php", |
|
| 52 |
+ "variable": "$punbb_version", |
|
| 53 |
+ "subdir": 0 |
|
| 54 |
+ } |
|
| 55 |
+ ] |
|
| 56 |
+ }, |
|
| 57 |
+ {
|
|
| 58 |
+ "name": "UseBB", |
|
| 59 |
+ "url": "http://www.usebb.net/", |
|
| 60 |
+ "safe": "1.0.12", |
|
| 61 |
+ "vuln": "CVE-2011-3611", |
|
| 62 |
+ "latest": "1.0.16", |
|
| 63 |
+ "detection": [ |
|
| 64 |
+ {
|
|
| 65 |
+ "file": "common.php", |
|
| 66 |
+ "variable": "USEBB_VERSION", |
|
| 67 |
+ "subdir": 1 |
|
| 68 |
+ } |
|
| 69 |
+ ] |
|
| 70 |
+ }, |
|
| 71 |
+ {
|
|
| 72 |
+ "name": "Vanilla", |
|
| 73 |
+ "url": "http://vanillaforums.com/", |
|
| 74 |
+ "safe": "2.1.3", |
|
| 75 |
+ "vuln": "http://vanillaforums.org/discussion/27822/vanilla-2-1-3-security-release", |
|
| 76 |
+ "detection": [ |
|
| 77 |
+ {
|
|
| 78 |
+ "file": "version.php", |
|
| 79 |
+ "variable": "APPLICATION_VERSION", |
|
| 80 |
+ "subdir": 1, |
|
| 81 |
+ "extra_match": "define('APPLICATION', 'Vanilla');"
|
|
| 82 |
+ } |
|
| 83 |
+ ] |
|
| 84 |
+ }, |
|
| 85 |
+ {
|
|
| 86 |
+ "name": "Vanilla2", |
|
| 87 |
+ "url": "http://vanillaforums.com/", |
|
| 88 |
+ "safe": "2.1.3", |
|
| 89 |
+ "vuln": "http://vanillaforums.org/discussion/27822/vanilla-2-1-3-security-release", |
|
| 90 |
+ "detection": [ |
|
| 91 |
+ {
|
|
| 92 |
+ "file": "index.php", |
|
| 93 |
+ "variable": "APPLICATION_VERSION", |
|
| 94 |
+ "subdir": 0, |
|
| 95 |
+ "extra_match": "define('APPLICATION', 'Vanilla');"
|
|
| 96 |
+ } |
|
| 97 |
+ ] |
|
| 98 |
+ }, |
|
| 99 |
+ {
|
|
| 100 |
+ "name": "Simple_Machines_Forum", |
|
| 101 |
+ "url": "http://www.simplemachines.org/", |
|
| 102 |
+ "safe": "2.0.5", |
|
| 103 |
+ "old_safe": "1.1.16", |
|
| 104 |
+ "vuln": "http://www.simplemachines.org/community/index.php?topic=509417.0", |
|
| 105 |
+ "detection": [ |
|
| 106 |
+ {
|
|
| 107 |
+ "file": "index.php", |
|
| 108 |
+ "variable": "$forum_version", |
|
| 109 |
+ "subdir": 0, |
|
| 110 |
+ "extra_match": "Simple Machines Forum" |
|
| 111 |
+ } |
|
| 112 |
+ ] |
|
| 113 |
+ }, |
|
| 114 |
+ {
|
|
| 115 |
+ "name": "MyBB", |
|
| 116 |
+ "url": "http://www.mybboard.net/", |
|
| 117 |
+ "safe": "1.8.3", |
|
| 118 |
+ "old_safe": "1.6.16", |
|
| 119 |
+ "vuln": "http://blog.mybb.com/2014/11/20/mybb-1-8-3-1-6-16-released-security-releases/", |
|
| 120 |
+ "detection": [ |
|
| 121 |
+ {
|
|
| 122 |
+ "file": "class_core.php", |
|
| 123 |
+ "variable": "$version", |
|
| 124 |
+ "subdir": 1 |
|
| 125 |
+ } |
|
| 126 |
+ ] |
|
| 127 |
+ }, |
|
| 128 |
+ {
|
|
| 129 |
+ "name": "Phorum", |
|
| 130 |
+ "url": "http://www.phorum.org/", |
|
| 131 |
+ "safe": "5.2.19", |
|
| 132 |
+ "vuln": "http://www.phorum.org/phorum5/read.php?64,151943", |
|
| 133 |
+ "latest": "5.2.19", |
|
| 134 |
+ "detection": [ |
|
| 135 |
+ {
|
|
| 136 |
+ "file": "common.php", |
|
| 137 |
+ "variable": "define( \"PHORUM\"", |
|
| 138 |
+ "subdir": 0 |
|
| 139 |
+ } |
|
| 140 |
+ ] |
|
| 141 |
+ }, |
|
| 142 |
+ {
|
|
| 143 |
+ "name": "wBB", |
|
| 144 |
+ "url": "http://www.woltlab.com/", |
|
| 145 |
+ "safe": "3.0.9", |
|
| 146 |
+ "vuln": "http://www.securityfocus.com/archive/1/503867/30/60/threaded", |
|
| 147 |
+ "detection": [ |
|
| 148 |
+ {
|
|
| 149 |
+ "file": "config.inc.php", |
|
| 150 |
+ "variable": "define('PACKAGE_VERSION',",
|
|
| 151 |
+ "subdir": 0 |
|
| 152 |
+ } |
|
| 153 |
+ ] |
|
| 154 |
+ }, |
|
| 155 |
+ {
|
|
| 156 |
+ "name": "WBBLite", |
|
| 157 |
+ "url": "http://wbblite.com/", |
|
| 158 |
+ "safe": "2.1", |
|
| 159 |
+ "vuln": "http://www.securityfocus.com/archive/1/503867/30/60/threaded", |
|
| 160 |
+ "detection": [ |
|
| 161 |
+ {
|
|
| 162 |
+ "file": "package.xml", |
|
| 163 |
+ "variable": "<version>", |
|
| 164 |
+ "subdir": 0, |
|
| 165 |
+ "extra_match": "<packagename>WoltLab Burning Board Lite</packagename>" |
|
| 166 |
+ } |
|
| 167 |
+ ] |
|
| 168 |
+ }, |
|
| 169 |
+ {
|
|
| 170 |
+ "name": "FluxBB12", |
|
| 171 |
+ "url": "https://fluxbb.org/", |
|
| 172 |
+ "safe": "1.5.11", |
|
| 173 |
+ "vuln": "https://fluxbb.org/forums/viewtopic.php?id=9472", |
|
| 174 |
+ "detection": [ |
|
| 175 |
+ {
|
|
| 176 |
+ "file": "install.php", |
|
| 177 |
+ "variable": "$fluxbb_version", |
|
| 178 |
+ "subdir": 1 |
|
| 179 |
+ } |
|
| 180 |
+ ] |
|
| 181 |
+ }, |
|
| 182 |
+ {
|
|
| 183 |
+ "name": "FluxBB", |
|
| 184 |
+ "url": "https://fluxbb.org/", |
|
| 185 |
+ "safe": "1.5.11", |
|
| 186 |
+ "vuln": "https://fluxbb.org/forums/viewtopic.php?id=9472", |
|
| 187 |
+ "detection": [ |
|
| 188 |
+ {
|
|
| 189 |
+ "file": "common.php", |
|
| 190 |
+ "variable": "FORUM_VERSION", |
|
| 191 |
+ "subdir": 1, |
|
| 192 |
+ "extra_match": "FORUM_DB_REVISION" |
|
| 193 |
+ } |
|
| 194 |
+ ] |
|
| 195 |
+ }, |
|
| 196 |
+ {
|
|
| 197 |
+ "name": "vBulletin", |
|
| 198 |
+ "url": "https://www.vbulletin.com/", |
|
| 199 |
+ "safe": "4.2.2", |
|
| 200 |
+ "vuln": "CVE-2013-6129", |
|
| 201 |
+ "detection": [ |
|
| 202 |
+ {
|
|
| 203 |
+ "file": "class_core.php", |
|
| 204 |
+ "variable": "define('FILE_VERSION'",
|
|
| 205 |
+ "subdir": 1, |
|
| 206 |
+ "extra_match": "vBulletin" |
|
| 207 |
+ } |
|
| 208 |
+ ] |
|
| 209 |
+ } |
|
| 210 |
+] |
|
| 0 | 211 |
\ No newline at end of file |
| ... | ... |
@@ -1,80 +0,0 @@ |
| 1 |
-[Serendipity] |
|
| 2 |
-url=https://docs.s9y.org/ |
|
| 3 |
-safe=2.3.2 |
|
| 4 |
-vuln=https://blog.s9y.org/archives/287-Serendipity-2.3.2-released-security-update.html |
|
| 5 |
-file=serendipity_config.inc.php |
|
| 6 |
-variable=$serendipity['version'] |
|
| 7 |
-subdir=0 |
|
| 8 |
- |
|
| 9 |
-[Wordpress] |
|
| 10 |
-url=https://wordpress.org/ |
|
| 11 |
-safe=5.2.4 |
|
| 12 |
-old_safe=5.1.4,5.1.3,5.0.8,5.0.7,4.9.13,4.9.12,4.8.12,4.8.11,4.7.16,4.7.15,4.6.17,4.6.16,4.5.20,4.5.19,4.4.21,4.4.20,4.3.22,4.3.21,4.2.26,4.2.25,4.1.29,4.1.28,4.0.29,4.0.28,3.9.30,3.9.29,3.8.32,3.8.31,3.7.32,3.7.31 |
|
| 13 |
-vuln=CVE-2019-17672 |
|
| 14 |
-file=version.php |
|
| 15 |
-variable=$wp_version |
|
| 16 |
-subdir=1 |
|
| 17 |
-extra_match=The WordPress version string |
|
| 18 |
- |
|
| 19 |
-[SimplePHPBlog] |
|
| 20 |
-url=http://www.simplephpblog.com/ |
|
| 21 |
-safe=0.5.1 |
|
| 22 |
-vuln=CVE-2007-5071 |
|
| 23 |
-file=sb_functions.php |
|
| 24 |
-variable=$sb_info[ 'version' ] |
|
| 25 |
-subdir=1 |
|
| 26 |
- |
|
| 27 |
-[b2evolution] |
|
| 28 |
-url=https://b2evolution.net/ |
|
| 29 |
-safe=1.9.2 |
|
| 30 |
-old_safe=1.8.7 |
|
| 31 |
-vuln=CVE-2007-0175 |
|
| 32 |
-file=_application.php |
|
| 33 |
-variable=$app_version |
|
| 34 |
-extra_match=This is b2evolution |
|
| 35 |
-subdir=2 |
|
| 36 |
- |
|
| 37 |
-[nucleuscms] |
|
| 38 |
-url=http://www.nucleuscms.org/ |
|
| 39 |
-safe=3.40 |
|
| 40 |
-vuln=CVE-2009-0929 |
|
| 41 |
-file=globalfunctions.php |
|
| 42 |
-variable=$nucleus['version'] |
|
| 43 |
-subdir=2 |
|
| 44 |
- |
|
| 45 |
-[sBlog] |
|
| 46 |
-url=https://web.archive.org/web/20080908094255/http://sblog.se/wiki/Main_Page |
|
| 47 |
-safe= |
|
| 48 |
-latest=0.7.3 |
|
| 49 |
-vuln=CVE-2007-1801 |
|
| 50 |
-file=version.ini |
|
| 51 |
-variable=conf_current_version |
|
| 52 |
-subdir=1 |
|
| 53 |
-extra_match=[sblog_version_info] |
|
| 54 |
- |
|
| 55 |
-[Movable_Type] |
|
| 56 |
-url=https://movabletype.com/ |
|
| 57 |
-# only 5.x public |
|
| 58 |
-safe=7.1.4 |
|
| 59 |
-old_safe=6.5.2,6.3.10 |
|
| 60 |
-vuln=https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html |
|
| 61 |
-file=mt.php |
|
| 62 |
-variable=VERSION_ID |
|
| 63 |
-subdir=1 |
|
| 64 |
- |
|
| 65 |
-[artmedic_weblog] |
|
| 66 |
-url=http://www.artmedic-phpscripts.de/ |
|
| 67 |
-safe= |
|
| 68 |
-latest=1.0 |
|
| 69 |
-vuln=CVE-2008-0798 |
|
| 70 |
-file=artmedic_index.php |
|
| 71 |
-variable=# artmedic weblog |
|
| 72 |
-subdir=0 |
|
| 73 |
- |
|
| 74 |
-[DotClear] |
|
| 75 |
-url=http://www.dotclear.net/ |
|
| 76 |
-safe=2.2.3 |
|
| 77 |
-vuln=CVE-2011-1584 |
|
| 78 |
-file=LISEZMOI.txt |
|
| 79 |
-variable=DotClear |
|
| 80 |
-subdir=0 |
| ... | ... |
@@ -0,0 +1,128 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "Serendipity", |
|
| 4 |
+ "url": "https://docs.s9y.org/", |
|
| 5 |
+ "safe": "2.3.2", |
|
| 6 |
+ "vuln": "https://blog.s9y.org/archives/287-Serendipity-2.3.2-released-security-update.html", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "serendipity_config.inc.php", |
|
| 10 |
+ "variable": "$serendipity['version']", |
|
| 11 |
+ "subdir": 0 |
|
| 12 |
+ } |
|
| 13 |
+ ] |
|
| 14 |
+ }, |
|
| 15 |
+ {
|
|
| 16 |
+ "name": "Wordpress", |
|
| 17 |
+ "url": "https://wordpress.org/", |
|
| 18 |
+ "safe": "5.2.4", |
|
| 19 |
+ "old_safe": "5.1.4,5.1.3,5.0.8,5.0.7,4.9.13,4.9.12,4.8.12,4.8.11,4.7.16,4.7.15,4.6.17,4.6.16,4.5.20,4.5.19,4.4.21,4.4.20,4.3.22,4.3.21,4.2.26,4.2.25,4.1.29,4.1.28,4.0.29,4.0.28,3.9.30,3.9.29,3.8.32,3.8.31,3.7.32,3.7.31", |
|
| 20 |
+ "vuln": "CVE-2019-17672", |
|
| 21 |
+ "detection": [ |
|
| 22 |
+ {
|
|
| 23 |
+ "file": "version.php", |
|
| 24 |
+ "variable": "$wp_version", |
|
| 25 |
+ "subdir": 1, |
|
| 26 |
+ "extra_match": "The WordPress version string" |
|
| 27 |
+ } |
|
| 28 |
+ ] |
|
| 29 |
+ }, |
|
| 30 |
+ {
|
|
| 31 |
+ "name": "SimplePHPBlog", |
|
| 32 |
+ "url": "http://www.simplephpblog.com/", |
|
| 33 |
+ "safe": "0.5.1", |
|
| 34 |
+ "vuln": "CVE-2007-5071", |
|
| 35 |
+ "detection": [ |
|
| 36 |
+ {
|
|
| 37 |
+ "file": "sb_functions.php", |
|
| 38 |
+ "variable": "$sb_info[ 'version' ]", |
|
| 39 |
+ "subdir": 1 |
|
| 40 |
+ } |
|
| 41 |
+ ] |
|
| 42 |
+ }, |
|
| 43 |
+ {
|
|
| 44 |
+ "name": "b2evolution", |
|
| 45 |
+ "url": "https://b2evolution.net/", |
|
| 46 |
+ "safe": "1.9.2", |
|
| 47 |
+ "old_safe": "1.8.7", |
|
| 48 |
+ "vuln": "CVE-2007-0175", |
|
| 49 |
+ "detection": [ |
|
| 50 |
+ {
|
|
| 51 |
+ "file": "_application.php", |
|
| 52 |
+ "variable": "$app_version", |
|
| 53 |
+ "subdir": 2, |
|
| 54 |
+ "extra_match": "This is b2evolution" |
|
| 55 |
+ } |
|
| 56 |
+ ] |
|
| 57 |
+ }, |
|
| 58 |
+ {
|
|
| 59 |
+ "name": "nucleuscms", |
|
| 60 |
+ "url": "http://www.nucleuscms.org/", |
|
| 61 |
+ "safe": "3.40", |
|
| 62 |
+ "vuln": "CVE-2009-0929", |
|
| 63 |
+ "detection": [ |
|
| 64 |
+ {
|
|
| 65 |
+ "file": "globalfunctions.php", |
|
| 66 |
+ "variable": "$nucleus['version']", |
|
| 67 |
+ "subdir": 2 |
|
| 68 |
+ } |
|
| 69 |
+ ] |
|
| 70 |
+ }, |
|
| 71 |
+ {
|
|
| 72 |
+ "name": "sBlog", |
|
| 73 |
+ "url": "https://web.archive.org/web/20080908094255/http://sblog.se/wiki/Main_Page", |
|
| 74 |
+ "safe": "", |
|
| 75 |
+ "vuln": "CVE-2007-1801", |
|
| 76 |
+ "latest": "0.7.3", |
|
| 77 |
+ "detection": [ |
|
| 78 |
+ {
|
|
| 79 |
+ "file": "version.ini", |
|
| 80 |
+ "variable": "conf_current_version", |
|
| 81 |
+ "subdir": 1, |
|
| 82 |
+ "extra_match": "[sblog_version_info]" |
|
| 83 |
+ } |
|
| 84 |
+ ] |
|
| 85 |
+ }, |
|
| 86 |
+ {
|
|
| 87 |
+ "name": "Movable_Type", |
|
| 88 |
+ "url": "https://movabletype.com/", |
|
| 89 |
+ "safe": "7.1.4", |
|
| 90 |
+ "old_safe": "6.5.2,6.3.10", |
|
| 91 |
+ "vuln": "https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html", |
|
| 92 |
+ "note": "only 5.x public", |
|
| 93 |
+ "detection": [ |
|
| 94 |
+ {
|
|
| 95 |
+ "file": "mt.php", |
|
| 96 |
+ "variable": "VERSION_ID", |
|
| 97 |
+ "subdir": 1 |
|
| 98 |
+ } |
|
| 99 |
+ ] |
|
| 100 |
+ }, |
|
| 101 |
+ {
|
|
| 102 |
+ "name": "artmedic_weblog", |
|
| 103 |
+ "url": "http://www.artmedic-phpscripts.de/", |
|
| 104 |
+ "safe": "", |
|
| 105 |
+ "vuln": "CVE-2008-0798", |
|
| 106 |
+ "latest": "1.0", |
|
| 107 |
+ "detection": [ |
|
| 108 |
+ {
|
|
| 109 |
+ "file": "artmedic_index.php", |
|
| 110 |
+ "variable": "# artmedic weblog", |
|
| 111 |
+ "subdir": 0 |
|
| 112 |
+ } |
|
| 113 |
+ ] |
|
| 114 |
+ }, |
|
| 115 |
+ {
|
|
| 116 |
+ "name": "DotClear", |
|
| 117 |
+ "url": "http://www.dotclear.net/", |
|
| 118 |
+ "safe": "2.2.3", |
|
| 119 |
+ "vuln": "CVE-2011-1584", |
|
| 120 |
+ "detection": [ |
|
| 121 |
+ {
|
|
| 122 |
+ "file": "LISEZMOI.txt", |
|
| 123 |
+ "variable": "DotClear", |
|
| 124 |
+ "subdir": 0 |
|
| 125 |
+ } |
|
| 126 |
+ ] |
|
| 127 |
+ } |
|
| 128 |
+] |
|
| 0 | 129 |
\ No newline at end of file |
| ... | ... |
@@ -1,251 +0,0 @@ |
| 1 |
-[WebsiteBaker] |
|
| 2 |
-url=https://websitebaker.org/ |
|
| 3 |
-safe=2.8.4 |
|
| 4 |
-vuln=CVE-2015-0553 |
|
| 5 |
-file=version.php |
|
| 6 |
-variable=VERSION |
|
| 7 |
-extra_match=Website Baker Project |
|
| 8 |
-subdir=3 |
|
| 9 |
- |
|
| 10 |
-[WebsiteBaker28] |
|
| 11 |
-url=https://websitebaker.org/ |
|
| 12 |
-safe=2.8.4 |
|
| 13 |
-vuln=CVE-2015-0553 |
|
| 14 |
-file=info.php |
|
| 15 |
-variable=$template_platform |
|
| 16 |
-extra_match=wb_theme |
|
| 17 |
-subdir=3 |
|
| 18 |
- |
|
| 19 |
-[toendaCMS] |
|
| 20 |
-url=http://www.toendacms.com/ |
|
| 21 |
-safe= |
|
| 22 |
-vuln=CVE-2007-1872 |
|
| 23 |
-file=tcms_version.xml |
|
| 24 |
-variable=release |
|
| 25 |
-subdir=2 |
|
| 26 |
- |
|
| 27 |
-[Drupal6] |
|
| 28 |
-url=https://www.drupal.org/ |
|
| 29 |
-safe=7.67 |
|
| 30 |
-latest=7.67 |
|
| 31 |
-vuln=https://www.drupal.org/sa-core-2019-007 |
|
| 32 |
-file=system.module |
|
| 33 |
-variable=define('VERSION'
|
|
| 34 |
-subdir=2 |
|
| 35 |
- |
|
| 36 |
-[Drupal7] |
|
| 37 |
-url=https://www.drupal.org/ |
|
| 38 |
-safe=7.67 |
|
| 39 |
-latest=7.67 |
|
| 40 |
-vuln=https://www.drupal.org/sa-core-2019-007 |
|
| 41 |
-file=bootstrap.inc |
|
| 42 |
-variable=define('VERSION'
|
|
| 43 |
-subdir=1 |
|
| 44 |
- |
|
| 45 |
-[Drupal8] |
|
| 46 |
-url=https://www.drupal.org/ |
|
| 47 |
-safe=8.7.1 |
|
| 48 |
-old_safe=8.6.16 |
|
| 49 |
-latest=8.7.1 |
|
| 50 |
-vuln=https://www.drupal.org/sa-core-2019-007 |
|
| 51 |
-file=Drupal.php |
|
| 52 |
-variable=const VERSION |
|
| 53 |
-subdir=2 |
|
| 54 |
- |
|
| 55 |
-[PHPNuke] |
|
| 56 |
-url=https://www.phpnuke.org/ |
|
| 57 |
-# I'm not really sure about that, but 8.0 is at least vulnerable |
|
| 58 |
-# Versions pre 8.0 aren't easily detectable |
|
| 59 |
-safe=8.1 |
|
| 60 |
-vuln=CVE-2007-1519 |
|
| 61 |
-file=version.php |
|
| 62 |
-variable=$version_number |
|
| 63 |
-extra_match=PHP-Nuke $version_number |
|
| 64 |
-subdir=2 |
|
| 65 |
- |
|
| 66 |
-[Typo3] |
|
| 67 |
-url=https://typo3.org/ |
|
| 68 |
-safe=9.5.6 |
|
| 69 |
-old_safe=8.7.25 |
|
| 70 |
-vuln=https://typo3.org/article/typo3-956-and-8725-security-releases-published/ |
|
| 71 |
-file=config_default.php |
|
| 72 |
-variable=$TYPO_VERSION |
|
| 73 |
-subdir=1 |
|
| 74 |
- |
|
| 75 |
-[typo3-6] |
|
| 76 |
-url=https://typo3.org/ |
|
| 77 |
-safe=9.5.6 |
|
| 78 |
-old_safe=8.7.25 |
|
| 79 |
-vuln=https://typo3.org/article/typo3-956-and-8725-security-releases-published/ |
|
| 80 |
-file=SystemEnvironmentBuilder.php |
|
| 81 |
-variable=define('TYPO3_version
|
|
| 82 |
-subdir=4 |
|
| 83 |
- |
|
| 84 |
-[Joomla-1] |
|
| 85 |
-url=https://www.joomla.org/ |
|
| 86 |
-safe=3.9.13 |
|
| 87 |
-vuln=CVE-2019-18674 |
|
| 88 |
-file=CHANGELOG.php |
|
| 89 |
-variable=--------------- |
|
| 90 |
-extra_match=Joomla! is free software. |
|
| 91 |
-subdir=0 |
|
| 92 |
- |
|
| 93 |
-[Joomla] |
|
| 94 |
-url=https://www.joomla.org/ |
|
| 95 |
-safe=3.9.13 |
|
| 96 |
-vuln=CVE-2019-18674 |
|
| 97 |
-file=joomla.xml |
|
| 98 |
-variable=<version> |
|
| 99 |
-extra_match=FILES_JOOMLA_XML_DESCRIPTION |
|
| 100 |
-path_match=administrator/manifests/files |
|
| 101 |
-subdir=3 |
|
| 102 |
- |
|
| 103 |
-[Mambo] |
|
| 104 |
-url=http://www.source.mambo-foundation.org/ |
|
| 105 |
-safe= |
|
| 106 |
-vuln=CVE-2008-2905 |
|
| 107 |
-file=version.php |
|
| 108 |
-variable=var $RELEASE,var $DEV_LEVEL |
|
| 109 |
-extra_match=@package Mambo |
|
| 110 |
-subdir=1 |
|
| 111 |
- |
|
| 112 |
-[w-Agora] |
|
| 113 |
-url=http://www.w-agora.net/ |
|
| 114 |
-safe= |
|
| 115 |
-latest=4.2.1 |
|
| 116 |
-vuln=CVE-2007-0607 |
|
| 117 |
-file=misc_func.php |
|
| 118 |
-variable=$v = |
|
| 119 |
-subdir=1 |
|
| 120 |
-extra_match=w-agora version $v |
|
| 121 |
- |
|
| 122 |
-[MODx] |
|
| 123 |
-url=https://modx.com/ |
|
| 124 |
-safe=1.0.15 |
|
| 125 |
-vuln=http://forums.modx.com/thread/94952/multiple-vulnerabilities-xss-remote-command-injection |
|
| 126 |
-file=version.inc.php |
|
| 127 |
-variable=$version |
|
| 128 |
-subdir=2 |
|
| 129 |
-extra_match=$full_appname = 'MODx' |
|
| 130 |
- |
|
| 131 |
-[MODX-1.x] |
|
| 132 |
-url=https://modx.com/ |
|
| 133 |
-safe=1.0.15 |
|
| 134 |
-vuln=http://forums.modx.com/thread/94952/multiple-vulnerabilities-xss-remote-command-injection |
|
| 135 |
-file=version.inc.php |
|
| 136 |
-variable=$modx_version |
|
| 137 |
-subdir=2 |
|
| 138 |
- |
|
| 139 |
-[MODX-2.x] |
|
| 140 |
-url=https://modx.com/ |
|
| 141 |
-safe=2.2.11 |
|
| 142 |
-vuln=http://modx.com/blog/2014/07/15/revolution-2.2.15/ |
|
| 143 |
-file=changelog.txt |
|
| 144 |
-variable=MODX Revolution |
|
| 145 |
-subdir=2 |
|
| 146 |
-extra_match=MODX |
|
| 147 |
- |
|
| 148 |
-[PostNuke] |
|
| 149 |
-# This one is a hell to detect, not sure for how many versions this works |
|
| 150 |
-url=http://www.postnuke.com |
|
| 151 |
-# 0.764 last stable in 2006-11-20, 0.8.0.0 rcs available |
|
| 152 |
-safe= |
|
| 153 |
-vuln=CVE-2007-0385 |
|
| 154 |
-file=global.php |
|
| 155 |
-variable=_MESSAGE_00_a |
|
| 156 |
-subdir=2 |
|
| 157 |
-extra_match=http://www.pn-cms.de |
|
| 158 |
- |
|
| 159 |
-[Contenido] |
|
| 160 |
-url=https://www.contenido.org/ |
|
| 161 |
-safe=4.8.15 |
|
| 162 |
-latest=4.8.15 |
|
| 163 |
-vuln=http://www.contenido.org/de/front_content.php?idcat=107&idart=1789&client=6&lang=3 |
|
| 164 |
-file=config.misc.php |
|
| 165 |
-variable=$cfg['version'] |
|
| 166 |
-subdir=1 |
|
| 167 |
-extra_match=Contenido Misc Configurations |
|
| 168 |
- |
|
| 169 |
-[SilverStripe] |
|
| 170 |
-url=https://www.silverstripe.com |
|
| 171 |
-safe=2.4.7 |
|
| 172 |
-vuln=CVE-2012-0976 |
|
| 173 |
-file=silverstripe_version |
|
| 174 |
-variable=/open/modules/cms/ |
|
| 175 |
-subdir=1 |
|
| 176 |
-extra_match=/open/modules/cms/ |
|
| 177 |
- |
|
| 178 |
-[CMSMadeSimple] |
|
| 179 |
-url=https://www.cmsmadesimple.org/ |
|
| 180 |
-safe=1.11.13 |
|
| 181 |
-vuln=http://www.cmsmadesimple.org/2015/02/Announcing-CMS-Made-Simple-1-11-13-Security-Release/ |
|
| 182 |
-file=version.php |
|
| 183 |
-variable=$CMS_VERSION |
|
| 184 |
-subdir=0 |
|
| 185 |
- |
|
| 186 |
-[e107] |
|
| 187 |
-url=https://e107.org/ |
|
| 188 |
-safe=1.0.0 |
|
| 189 |
-vuln=CVE-2011-4920 |
|
| 190 |
-file=ver.php |
|
| 191 |
-variable=$e107info['e107_version'] |
|
| 192 |
-subdir=0 |
|
| 193 |
- |
|
| 194 |
-[SPIP] |
|
| 195 |
-url=https://www.spip.net/ |
|
| 196 |
-safe=2.1.13 |
|
| 197 |
-old_safe=2.0.18 |
|
| 198 |
-vuln=http://archives.rezo.net/archives/spip-en.mbox/U5QUZ6WJRAJC7H5BR7W5SQG6WCD3PXL7/ |
|
| 199 |
-file=inc_version.php |
|
| 200 |
-variable=$spip_version_branche |
|
| 201 |
-subdir=1 |
|
| 202 |
- |
|
| 203 |
-[contao] |
|
| 204 |
-url=https://contao.org/ |
|
| 205 |
-safe=3.2.5 |
|
| 206 |
-old_safe=2.11.14 |
|
| 207 |
-vuln=CVE-2014-1860 |
|
| 208 |
-latest=3.2.5 |
|
| 209 |
-file=CHANGELOG.md |
|
| 210 |
-variable=Version |
|
| 211 |
-extra_match=Contao Open Source CMS |
|
| 212 |
-subdir=0 |
|
| 213 |
- |
|
| 214 |
-[contao-old] |
|
| 215 |
-url=https://contao.org/ |
|
| 216 |
-safe=3.2.5 |
|
| 217 |
-old_safe=2.11.14 |
|
| 218 |
-vuln=CVE-2014-1860 |
|
| 219 |
-latest=3.2.5 |
|
| 220 |
-file=CHANGELOG.txt |
|
| 221 |
-variable=Version |
|
| 222 |
-extra_match=Contao Open Source CMS Changelog |
|
| 223 |
-subdir=0 |
|
| 224 |
- |
|
| 225 |
-[redaxo] |
|
| 226 |
-url=https://redaxo.org/ |
|
| 227 |
-safe=4.5 |
|
| 228 |
-vuln=CVE-2012-3869 |
|
| 229 |
-latest=4.5 |
|
| 230 |
-file=en_gb.lang |
|
| 231 |
-variable=setup_037 |
|
| 232 |
-subdir=3 |
|
| 233 |
- |
|
| 234 |
-[textpattern] |
|
| 235 |
-url=https://textpattern.com/ |
|
| 236 |
-safe=4.7.0 |
|
| 237 |
-vuln=CVE-2018-7474 |
|
| 238 |
-latest=4.7.3 |
|
| 239 |
-file=index.php |
|
| 240 |
-subdir=1 |
|
| 241 |
-variable=$thisversion |
|
| 242 |
- |
|
| 243 |
-[bolt] |
|
| 244 |
-url=https://bolt.cm/ |
|
| 245 |
-safe=3.5.3 |
|
| 246 |
-latest=3.5.3 |
|
| 247 |
-file=Version.php |
|
| 248 |
-variable=const VERSION |
|
| 249 |
-vuln=https://github.com/bolt/bolt/blob/v3.5.4/changelog.md#bolt-353 |
|
| 250 |
-extra_match=Bolt's |
|
| 251 |
-subdir=4 |
| ... | ... |
@@ -0,0 +1,387 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "WebsiteBaker", |
|
| 4 |
+ "url": "https://websitebaker.org/", |
|
| 5 |
+ "safe": "2.8.4", |
|
| 6 |
+ "vuln": "CVE-2015-0553", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "version.php", |
|
| 10 |
+ "variable": "VERSION", |
|
| 11 |
+ "subdir": 3, |
|
| 12 |
+ "extra_match": "Website Baker Project" |
|
| 13 |
+ } |
|
| 14 |
+ ] |
|
| 15 |
+ }, |
|
| 16 |
+ {
|
|
| 17 |
+ "name": "WebsiteBaker28", |
|
| 18 |
+ "url": "https://websitebaker.org/", |
|
| 19 |
+ "safe": "2.8.4", |
|
| 20 |
+ "vuln": "CVE-2015-0553", |
|
| 21 |
+ "detection": [ |
|
| 22 |
+ {
|
|
| 23 |
+ "file": "info.php", |
|
| 24 |
+ "variable": "$template_platform", |
|
| 25 |
+ "subdir": 3, |
|
| 26 |
+ "extra_match": "wb_theme" |
|
| 27 |
+ } |
|
| 28 |
+ ] |
|
| 29 |
+ }, |
|
| 30 |
+ {
|
|
| 31 |
+ "name": "toendaCMS", |
|
| 32 |
+ "url": "http://www.toendacms.com/", |
|
| 33 |
+ "safe": "", |
|
| 34 |
+ "vuln": "CVE-2007-1872", |
|
| 35 |
+ "detection": [ |
|
| 36 |
+ {
|
|
| 37 |
+ "file": "tcms_version.xml", |
|
| 38 |
+ "variable": "release", |
|
| 39 |
+ "subdir": 2 |
|
| 40 |
+ } |
|
| 41 |
+ ] |
|
| 42 |
+ }, |
|
| 43 |
+ {
|
|
| 44 |
+ "name": "Drupal6", |
|
| 45 |
+ "url": "https://www.drupal.org/", |
|
| 46 |
+ "safe": "7.67", |
|
| 47 |
+ "vuln": "https://www.drupal.org/sa-core-2019-007", |
|
| 48 |
+ "latest": "7.67", |
|
| 49 |
+ "detection": [ |
|
| 50 |
+ {
|
|
| 51 |
+ "file": "system.module", |
|
| 52 |
+ "variable": "define('VERSION'",
|
|
| 53 |
+ "subdir": 2 |
|
| 54 |
+ } |
|
| 55 |
+ ] |
|
| 56 |
+ }, |
|
| 57 |
+ {
|
|
| 58 |
+ "name": "Drupal7", |
|
| 59 |
+ "url": "https://www.drupal.org/", |
|
| 60 |
+ "safe": "7.67", |
|
| 61 |
+ "vuln": "https://www.drupal.org/sa-core-2019-007", |
|
| 62 |
+ "latest": "7.67", |
|
| 63 |
+ "detection": [ |
|
| 64 |
+ {
|
|
| 65 |
+ "file": "bootstrap.inc", |
|
| 66 |
+ "variable": "define('VERSION'",
|
|
| 67 |
+ "subdir": 1 |
|
| 68 |
+ } |
|
| 69 |
+ ] |
|
| 70 |
+ }, |
|
| 71 |
+ {
|
|
| 72 |
+ "name": "Drupal8", |
|
| 73 |
+ "url": "https://www.drupal.org/", |
|
| 74 |
+ "safe": "8.7.1", |
|
| 75 |
+ "old_safe": "8.6.16", |
|
| 76 |
+ "vuln": "https://www.drupal.org/sa-core-2019-007", |
|
| 77 |
+ "latest": "8.7.1", |
|
| 78 |
+ "detection": [ |
|
| 79 |
+ {
|
|
| 80 |
+ "file": "Drupal.php", |
|
| 81 |
+ "variable": "const VERSION", |
|
| 82 |
+ "subdir": 2 |
|
| 83 |
+ } |
|
| 84 |
+ ] |
|
| 85 |
+ }, |
|
| 86 |
+ {
|
|
| 87 |
+ "name": "PHPNuke", |
|
| 88 |
+ "url": "https://www.phpnuke.org/", |
|
| 89 |
+ "safe": "8.1", |
|
| 90 |
+ "vuln": "CVE-2007-1519", |
|
| 91 |
+ "note": "I'm not really sure about that, but 8.0 is at least vulnerable, pre 8.0 aren't easily detectable", |
|
| 92 |
+ "detection": [ |
|
| 93 |
+ {
|
|
| 94 |
+ "file": "version.php", |
|
| 95 |
+ "variable": "$version_number", |
|
| 96 |
+ "subdir": 2, |
|
| 97 |
+ "extra_match": "PHP-Nuke $version_number" |
|
| 98 |
+ } |
|
| 99 |
+ ] |
|
| 100 |
+ }, |
|
| 101 |
+ {
|
|
| 102 |
+ "name": "Typo3", |
|
| 103 |
+ "url": "https://typo3.org/", |
|
| 104 |
+ "safe": "9.5.6", |
|
| 105 |
+ "old_safe": "8.7.25", |
|
| 106 |
+ "vuln": "https://typo3.org/article/typo3-956-and-8725-security-releases-published/", |
|
| 107 |
+ "detection": [ |
|
| 108 |
+ {
|
|
| 109 |
+ "file": "config_default.php", |
|
| 110 |
+ "variable": "$TYPO_VERSION", |
|
| 111 |
+ "subdir": 1 |
|
| 112 |
+ } |
|
| 113 |
+ ] |
|
| 114 |
+ }, |
|
| 115 |
+ {
|
|
| 116 |
+ "name": "typo3-6", |
|
| 117 |
+ "url": "https://typo3.org/", |
|
| 118 |
+ "safe": "9.5.6", |
|
| 119 |
+ "old_safe": "8.7.25", |
|
| 120 |
+ "vuln": "https://typo3.org/article/typo3-956-and-8725-security-releases-published/", |
|
| 121 |
+ "detection": [ |
|
| 122 |
+ {
|
|
| 123 |
+ "file": "SystemEnvironmentBuilder.php", |
|
| 124 |
+ "variable": "define('TYPO3_version",
|
|
| 125 |
+ "subdir": 4 |
|
| 126 |
+ } |
|
| 127 |
+ ] |
|
| 128 |
+ }, |
|
| 129 |
+ {
|
|
| 130 |
+ "name": "Joomla-1", |
|
| 131 |
+ "url": "https://www.joomla.org/", |
|
| 132 |
+ "safe": "3.9.13", |
|
| 133 |
+ "vuln": "CVE-2019-18674", |
|
| 134 |
+ "detection": [ |
|
| 135 |
+ {
|
|
| 136 |
+ "file": "CHANGELOG.php", |
|
| 137 |
+ "variable": "---------------", |
|
| 138 |
+ "subdir": 0, |
|
| 139 |
+ "extra_match": "Joomla! is free software." |
|
| 140 |
+ } |
|
| 141 |
+ ] |
|
| 142 |
+ }, |
|
| 143 |
+ {
|
|
| 144 |
+ "name": "Joomla", |
|
| 145 |
+ "url": "https://www.joomla.org/", |
|
| 146 |
+ "safe": "3.9.13", |
|
| 147 |
+ "vuln": "CVE-2019-18674", |
|
| 148 |
+ "detection": [ |
|
| 149 |
+ {
|
|
| 150 |
+ "file": "joomla.xml", |
|
| 151 |
+ "variable": "<version>", |
|
| 152 |
+ "subdir": 3, |
|
| 153 |
+ "extra_match": "FILES_JOOMLA_XML_DESCRIPTION", |
|
| 154 |
+ "path_match": "administrator/manifests/files" |
|
| 155 |
+ } |
|
| 156 |
+ ] |
|
| 157 |
+ }, |
|
| 158 |
+ {
|
|
| 159 |
+ "name": "Mambo", |
|
| 160 |
+ "url": "http://www.source.mambo-foundation.org/", |
|
| 161 |
+ "safe": "", |
|
| 162 |
+ "vuln": "CVE-2008-2905", |
|
| 163 |
+ "detection": [ |
|
| 164 |
+ {
|
|
| 165 |
+ "file": "version.php", |
|
| 166 |
+ "variable": "var $RELEASE,var $DEV_LEVEL", |
|
| 167 |
+ "subdir": 1, |
|
| 168 |
+ "extra_match": "@package Mambo" |
|
| 169 |
+ } |
|
| 170 |
+ ] |
|
| 171 |
+ }, |
|
| 172 |
+ {
|
|
| 173 |
+ "name": "w-Agora", |
|
| 174 |
+ "url": "http://www.w-agora.net/", |
|
| 175 |
+ "safe": "", |
|
| 176 |
+ "vuln": "CVE-2007-0607", |
|
| 177 |
+ "latest": "4.2.1", |
|
| 178 |
+ "detection": [ |
|
| 179 |
+ {
|
|
| 180 |
+ "file": "misc_func.php", |
|
| 181 |
+ "variable": "$v =", |
|
| 182 |
+ "subdir": 1, |
|
| 183 |
+ "extra_match": "w-agora version $v" |
|
| 184 |
+ } |
|
| 185 |
+ ] |
|
| 186 |
+ }, |
|
| 187 |
+ {
|
|
| 188 |
+ "name": "MODx", |
|
| 189 |
+ "url": "https://modx.com/", |
|
| 190 |
+ "safe": "1.0.15", |
|
| 191 |
+ "vuln": "http://forums.modx.com/thread/94952/multiple-vulnerabilities-xss-remote-command-injection", |
|
| 192 |
+ "detection": [ |
|
| 193 |
+ {
|
|
| 194 |
+ "file": "version.inc.php", |
|
| 195 |
+ "variable": "$version", |
|
| 196 |
+ "subdir": 2, |
|
| 197 |
+ "extra_match": "$full_appname = 'MODx'" |
|
| 198 |
+ } |
|
| 199 |
+ ] |
|
| 200 |
+ }, |
|
| 201 |
+ {
|
|
| 202 |
+ "name": "MODX-1.x", |
|
| 203 |
+ "url": "https://modx.com/", |
|
| 204 |
+ "safe": "1.0.15", |
|
| 205 |
+ "vuln": "http://forums.modx.com/thread/94952/multiple-vulnerabilities-xss-remote-command-injection", |
|
| 206 |
+ "detection": [ |
|
| 207 |
+ {
|
|
| 208 |
+ "file": "version.inc.php", |
|
| 209 |
+ "variable": "$modx_version", |
|
| 210 |
+ "subdir": 2 |
|
| 211 |
+ } |
|
| 212 |
+ ] |
|
| 213 |
+ }, |
|
| 214 |
+ {
|
|
| 215 |
+ "name": "MODX-2.x", |
|
| 216 |
+ "url": "https://modx.com/", |
|
| 217 |
+ "safe": "2.2.11", |
|
| 218 |
+ "vuln": "http://modx.com/blog/2014/07/15/revolution-2.2.15/", |
|
| 219 |
+ "detection": [ |
|
| 220 |
+ {
|
|
| 221 |
+ "file": "changelog.txt", |
|
| 222 |
+ "variable": "MODX Revolution", |
|
| 223 |
+ "subdir": 2, |
|
| 224 |
+ "extra_match": "MODX" |
|
| 225 |
+ } |
|
| 226 |
+ ] |
|
| 227 |
+ }, |
|
| 228 |
+ {
|
|
| 229 |
+ "name": "PostNuke", |
|
| 230 |
+ "url": "http://www.postnuke.com", |
|
| 231 |
+ "safe": "", |
|
| 232 |
+ "vuln": "CVE-2007-0385", |
|
| 233 |
+ "latest": "0.764", |
|
| 234 |
+ "detection": [ |
|
| 235 |
+ {
|
|
| 236 |
+ "file": "global.php", |
|
| 237 |
+ "variable": "_MESSAGE_00_a", |
|
| 238 |
+ "subdir": 2, |
|
| 239 |
+ "extra_match": "http://www.pn-cms.de" |
|
| 240 |
+ } |
|
| 241 |
+ ] |
|
| 242 |
+ }, |
|
| 243 |
+ {
|
|
| 244 |
+ "name": "Contenido", |
|
| 245 |
+ "url": "https://www.contenido.org/", |
|
| 246 |
+ "safe": "4.8.15", |
|
| 247 |
+ "vuln": "http://www.contenido.org/de/front_content.php?idcat=107&idart=1789&client=6&lang=3", |
|
| 248 |
+ "latest": "4.8.15", |
|
| 249 |
+ "detection": [ |
|
| 250 |
+ {
|
|
| 251 |
+ "file": "config.misc.php", |
|
| 252 |
+ "variable": "$cfg['version']", |
|
| 253 |
+ "subdir": 1, |
|
| 254 |
+ "extra_match": "Contenido Misc Configurations" |
|
| 255 |
+ } |
|
| 256 |
+ ] |
|
| 257 |
+ }, |
|
| 258 |
+ {
|
|
| 259 |
+ "name": "SilverStripe", |
|
| 260 |
+ "url": "https://www.silverstripe.com", |
|
| 261 |
+ "safe": "2.4.7", |
|
| 262 |
+ "vuln": "CVE-2012-0976", |
|
| 263 |
+ "detection": [ |
|
| 264 |
+ {
|
|
| 265 |
+ "file": "silverstripe_version", |
|
| 266 |
+ "variable": "/open/modules/cms/", |
|
| 267 |
+ "subdir": 1, |
|
| 268 |
+ "extra_match": "/open/modules/cms/" |
|
| 269 |
+ } |
|
| 270 |
+ ] |
|
| 271 |
+ }, |
|
| 272 |
+ {
|
|
| 273 |
+ "name": "CMSMadeSimple", |
|
| 274 |
+ "url": "https://www.cmsmadesimple.org/", |
|
| 275 |
+ "safe": "1.11.13", |
|
| 276 |
+ "vuln": "http://www.cmsmadesimple.org/2015/02/Announcing-CMS-Made-Simple-1-11-13-Security-Release/", |
|
| 277 |
+ "detection": [ |
|
| 278 |
+ {
|
|
| 279 |
+ "file": "version.php", |
|
| 280 |
+ "variable": "$CMS_VERSION", |
|
| 281 |
+ "subdir": 0 |
|
| 282 |
+ } |
|
| 283 |
+ ] |
|
| 284 |
+ }, |
|
| 285 |
+ {
|
|
| 286 |
+ "name": "e107", |
|
| 287 |
+ "url": "https://e107.org/", |
|
| 288 |
+ "safe": "1.0.0", |
|
| 289 |
+ "vuln": "CVE-2011-4920", |
|
| 290 |
+ "detection": [ |
|
| 291 |
+ {
|
|
| 292 |
+ "file": "ver.php", |
|
| 293 |
+ "variable": "$e107info['e107_version']", |
|
| 294 |
+ "subdir": 0 |
|
| 295 |
+ } |
|
| 296 |
+ ] |
|
| 297 |
+ }, |
|
| 298 |
+ {
|
|
| 299 |
+ "name": "SPIP", |
|
| 300 |
+ "url": "https://www.spip.net/", |
|
| 301 |
+ "safe": "2.1.13", |
|
| 302 |
+ "old_safe": "2.0.18", |
|
| 303 |
+ "vuln": "http://archives.rezo.net/archives/spip-en.mbox/U5QUZ6WJRAJC7H5BR7W5SQG6WCD3PXL7/", |
|
| 304 |
+ "detection": [ |
|
| 305 |
+ {
|
|
| 306 |
+ "file": "inc_version.php", |
|
| 307 |
+ "variable": "$spip_version_branche", |
|
| 308 |
+ "subdir": 1 |
|
| 309 |
+ } |
|
| 310 |
+ ] |
|
| 311 |
+ }, |
|
| 312 |
+ {
|
|
| 313 |
+ "name": "contao", |
|
| 314 |
+ "url": "https://contao.org/", |
|
| 315 |
+ "safe": "3.2.5", |
|
| 316 |
+ "old_safe": "2.11.14", |
|
| 317 |
+ "vuln": "CVE-2014-1860", |
|
| 318 |
+ "latest": "3.2.5", |
|
| 319 |
+ "detection": [ |
|
| 320 |
+ {
|
|
| 321 |
+ "file": "CHANGELOG.md", |
|
| 322 |
+ "variable": "Version", |
|
| 323 |
+ "subdir": 0, |
|
| 324 |
+ "extra_match": "Contao Open Source CMS" |
|
| 325 |
+ } |
|
| 326 |
+ ] |
|
| 327 |
+ }, |
|
| 328 |
+ {
|
|
| 329 |
+ "name": "contao-old", |
|
| 330 |
+ "url": "https://contao.org/", |
|
| 331 |
+ "safe": "3.2.5", |
|
| 332 |
+ "old_safe": "2.11.14", |
|
| 333 |
+ "vuln": "CVE-2014-1860", |
|
| 334 |
+ "latest": "3.2.5", |
|
| 335 |
+ "detection": [ |
|
| 336 |
+ {
|
|
| 337 |
+ "file": "CHANGELOG.txt", |
|
| 338 |
+ "variable": "Version", |
|
| 339 |
+ "subdir": 0, |
|
| 340 |
+ "extra_match": "Contao Open Source CMS Changelog" |
|
| 341 |
+ } |
|
| 342 |
+ ] |
|
| 343 |
+ }, |
|
| 344 |
+ {
|
|
| 345 |
+ "name": "redaxo", |
|
| 346 |
+ "url": "https://redaxo.org/", |
|
| 347 |
+ "safe": "4.5", |
|
| 348 |
+ "vuln": "CVE-2012-3869", |
|
| 349 |
+ "latest": "4.5", |
|
| 350 |
+ "detection": [ |
|
| 351 |
+ {
|
|
| 352 |
+ "file": "en_gb.lang", |
|
| 353 |
+ "variable": "setup_037", |
|
| 354 |
+ "subdir": 3 |
|
| 355 |
+ } |
|
| 356 |
+ ] |
|
| 357 |
+ }, |
|
| 358 |
+ {
|
|
| 359 |
+ "name": "textpattern", |
|
| 360 |
+ "url": "https://textpattern.com/", |
|
| 361 |
+ "safe": "4.7.0", |
|
| 362 |
+ "vuln": "CVE-2018-7474", |
|
| 363 |
+ "latest": "4.7.3", |
|
| 364 |
+ "detection": [ |
|
| 365 |
+ {
|
|
| 366 |
+ "file": "index.php", |
|
| 367 |
+ "variable": "$thisversion", |
|
| 368 |
+ "subdir": 1 |
|
| 369 |
+ } |
|
| 370 |
+ ] |
|
| 371 |
+ }, |
|
| 372 |
+ {
|
|
| 373 |
+ "name": "bolt", |
|
| 374 |
+ "url": "https://bolt.cm/", |
|
| 375 |
+ "safe": "3.5.3", |
|
| 376 |
+ "vuln": "https://github.com/bolt/bolt/blob/v3.5.4/changelog.md#bolt-353", |
|
| 377 |
+ "latest": "3.5.3", |
|
| 378 |
+ "detection": [ |
|
| 379 |
+ {
|
|
| 380 |
+ "file": "Version.php", |
|
| 381 |
+ "variable": "const VERSION", |
|
| 382 |
+ "subdir": 4, |
|
| 383 |
+ "extra_match": "Bolt's" |
|
| 384 |
+ } |
|
| 385 |
+ ] |
|
| 386 |
+ } |
|
| 387 |
+] |
|
| 0 | 388 |
\ No newline at end of file |
| ... | ... |
@@ -0,0 +1,15 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "vtigerCRM", |
|
| 4 |
+ "url": "http://www.vtiger.de", |
|
| 5 |
+ "safe": "5.3.0", |
|
| 6 |
+ "vuln": "CVE-2011-4670", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "vtigerversion.php", |
|
| 10 |
+ "variable": "$vtiger_current_version", |
|
| 11 |
+ "subdir": 0 |
|
| 12 |
+ } |
|
| 13 |
+ ] |
|
| 14 |
+ } |
|
| 15 |
+] |
|
| 0 | 16 |
\ No newline at end of file |
| ... | ... |
@@ -1,65 +0,0 @@ |
| 1 |
-[Phormer] |
|
| 2 |
-url=http://p.horm.org/er/ |
|
| 3 |
-safe= |
|
| 4 |
-vuln=CVE-2007-5013 |
|
| 5 |
-file=funcs.php |
|
| 6 |
-variable=PHORMER_VERSION |
|
| 7 |
-subdir=0 |
|
| 8 |
- |
|
| 9 |
-[Gallery2] |
|
| 10 |
-url=http://gallery.menalto.com/ |
|
| 11 |
-safe=2.3.2 |
|
| 12 |
-vuln=CVE-2012-1113 |
|
| 13 |
-file=module.inc |
|
| 14 |
-variable=setGalleryVersion |
|
| 15 |
-subdir=2 |
|
| 16 |
- |
|
| 17 |
-[Gallery3] |
|
| 18 |
-url=http://gallery.menalto.com/ |
|
| 19 |
-safe=3.0.9 |
|
| 20 |
-vuln=http://galleryproject.org/gallery_3_0_9 |
|
| 21 |
-file=gallery.php |
|
| 22 |
-variable=const VERSION |
|
| 23 |
-subdir=3 |
|
| 24 |
- |
|
| 25 |
-[Coppermine] |
|
| 26 |
-url=http://coppermine-gallery.net/ |
|
| 27 |
-safe=1.5.28 |
|
| 28 |
-vuln=CVE-2014-4612 |
|
| 29 |
-file=versioncheck.php |
|
| 30 |
-variable=Coppermine version |
|
| 31 |
-subdir=0 |
|
| 32 |
- |
|
| 33 |
-[Piwigo/PhpWebGallery] |
|
| 34 |
-url=http://www.phpwebgallery.net/ |
|
| 35 |
-safe=2.6.3 |
|
| 36 |
-vuln=CVE-2014-4648 |
|
| 37 |
-file=constants.php |
|
| 38 |
-variable=PHPWG_VERSION |
|
| 39 |
-subdir=1 |
|
| 40 |
- |
|
| 41 |
-[LinPHA] |
|
| 42 |
-url=http://linpha.sourceforge.net |
|
| 43 |
-safe=1.3.4 |
|
| 44 |
-vuln=CVE-2008-1856 |
|
| 45 |
-file=upgrade.php |
|
| 46 |
-variable=$version |
|
| 47 |
-subdir=1 |
|
| 48 |
-extra_match=$inst_linpha_not_work_correctly |
|
| 49 |
- |
|
| 50 |
-[mig] |
|
| 51 |
-url=http://mig.sourceforge.net/ |
|
| 52 |
-safe=1.5.0 |
|
| 53 |
-vuln=CVE-2005-2603 |
|
| 54 |
-file=index.php |
|
| 55 |
-variable=$version |
|
| 56 |
-subdir=0 |
|
| 57 |
-extra_match=Mig - A general purpose photo gallery management system. |
|
| 58 |
- |
|
| 59 |
-[zenphoto] |
|
| 60 |
-url=http://www.zenphoto.org/ |
|
| 61 |
-safe=1.4.5.4 |
|
| 62 |
-vuln=CVE-2013-7242 |
|
| 63 |
-file=version.php |
|
| 64 |
-variable=define('ZENPHOTO_VERSION'
|
|
| 65 |
-subdir=1 |
| ... | ... |
@@ -0,0 +1,108 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "Phormer", |
|
| 4 |
+ "url": "http://p.horm.org/er/", |
|
| 5 |
+ "safe": "", |
|
| 6 |
+ "vuln": "CVE-2007-5013", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "funcs.php", |
|
| 10 |
+ "variable": "PHORMER_VERSION", |
|
| 11 |
+ "subdir": 0 |
|
| 12 |
+ } |
|
| 13 |
+ ] |
|
| 14 |
+ }, |
|
| 15 |
+ {
|
|
| 16 |
+ "name": "Gallery2", |
|
| 17 |
+ "url": "http://gallery.menalto.com/", |
|
| 18 |
+ "safe": "2.3.2", |
|
| 19 |
+ "vuln": "CVE-2012-1113", |
|
| 20 |
+ "detection": [ |
|
| 21 |
+ {
|
|
| 22 |
+ "file": "module.inc", |
|
| 23 |
+ "variable": "setGalleryVersion", |
|
| 24 |
+ "subdir": 2 |
|
| 25 |
+ } |
|
| 26 |
+ ] |
|
| 27 |
+ }, |
|
| 28 |
+ {
|
|
| 29 |
+ "name": "Gallery3", |
|
| 30 |
+ "url": "http://gallery.menalto.com/", |
|
| 31 |
+ "safe": "3.0.9", |
|
| 32 |
+ "vuln": "http://galleryproject.org/gallery_3_0_9", |
|
| 33 |
+ "detection": [ |
|
| 34 |
+ {
|
|
| 35 |
+ "file": "gallery.php", |
|
| 36 |
+ "variable": "const VERSION", |
|
| 37 |
+ "subdir": 3 |
|
| 38 |
+ } |
|
| 39 |
+ ] |
|
| 40 |
+ }, |
|
| 41 |
+ {
|
|
| 42 |
+ "name": "Coppermine", |
|
| 43 |
+ "url": "http://coppermine-gallery.net/", |
|
| 44 |
+ "safe": "1.5.28", |
|
| 45 |
+ "vuln": "CVE-2014-4612", |
|
| 46 |
+ "detection": [ |
|
| 47 |
+ {
|
|
| 48 |
+ "file": "versioncheck.php", |
|
| 49 |
+ "variable": "Coppermine version", |
|
| 50 |
+ "subdir": 0 |
|
| 51 |
+ } |
|
| 52 |
+ ] |
|
| 53 |
+ }, |
|
| 54 |
+ {
|
|
| 55 |
+ "name": "Piwigo/PhpWebGallery", |
|
| 56 |
+ "url": "http://www.phpwebgallery.net/", |
|
| 57 |
+ "safe": "2.6.3", |
|
| 58 |
+ "vuln": "CVE-2014-4648", |
|
| 59 |
+ "detection": [ |
|
| 60 |
+ {
|
|
| 61 |
+ "file": "constants.php", |
|
| 62 |
+ "variable": "PHPWG_VERSION", |
|
| 63 |
+ "subdir": 1 |
|
| 64 |
+ } |
|
| 65 |
+ ] |
|
| 66 |
+ }, |
|
| 67 |
+ {
|
|
| 68 |
+ "name": "LinPHA", |
|
| 69 |
+ "url": "http://linpha.sourceforge.net", |
|
| 70 |
+ "safe": "1.3.4", |
|
| 71 |
+ "vuln": "CVE-2008-1856", |
|
| 72 |
+ "detection": [ |
|
| 73 |
+ {
|
|
| 74 |
+ "file": "upgrade.php", |
|
| 75 |
+ "variable": "$version", |
|
| 76 |
+ "subdir": 1, |
|
| 77 |
+ "extra_match": "$inst_linpha_not_work_correctly" |
|
| 78 |
+ } |
|
| 79 |
+ ] |
|
| 80 |
+ }, |
|
| 81 |
+ {
|
|
| 82 |
+ "name": "mig", |
|
| 83 |
+ "url": "http://mig.sourceforge.net/", |
|
| 84 |
+ "safe": "1.5.0", |
|
| 85 |
+ "vuln": "CVE-2005-2603", |
|
| 86 |
+ "detection": [ |
|
| 87 |
+ {
|
|
| 88 |
+ "file": "index.php", |
|
| 89 |
+ "variable": "$version", |
|
| 90 |
+ "subdir": 0, |
|
| 91 |
+ "extra_match": "Mig - A general purpose photo gallery management system." |
|
| 92 |
+ } |
|
| 93 |
+ ] |
|
| 94 |
+ }, |
|
| 95 |
+ {
|
|
| 96 |
+ "name": "zenphoto", |
|
| 97 |
+ "url": "http://www.zenphoto.org/", |
|
| 98 |
+ "safe": "1.4.5.4", |
|
| 99 |
+ "vuln": "CVE-2013-7242", |
|
| 100 |
+ "detection": [ |
|
| 101 |
+ {
|
|
| 102 |
+ "file": "version.php", |
|
| 103 |
+ "variable": "define('ZENPHOTO_VERSION'",
|
|
| 104 |
+ "subdir": 1 |
|
| 105 |
+ } |
|
| 106 |
+ ] |
|
| 107 |
+ } |
|
| 108 |
+] |
|
| 0 | 109 |
\ No newline at end of file |
| ... | ... |
@@ -0,0 +1,17 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "NetRisk", |
|
| 4 |
+ "url": "http://phprisk.org/", |
|
| 5 |
+ "safe": "", |
|
| 6 |
+ "vuln": "CVE-2008-0144", |
|
| 7 |
+ "latest": "1.9.7", |
|
| 8 |
+ "detection": [ |
|
| 9 |
+ {
|
|
| 10 |
+ "file": "install.php", |
|
| 11 |
+ "variable": "$version", |
|
| 12 |
+ "subdir": 0, |
|
| 13 |
+ "extra_match": "NetRisk - Setup" |
|
| 14 |
+ } |
|
| 15 |
+ ] |
|
| 16 |
+ } |
|
| 17 |
+] |
|
| 0 | 18 |
\ No newline at end of file |
| ... | ... |
@@ -1,33 +0,0 @@ |
| 1 |
-[Horde-groupware] |
|
| 2 |
-url=http://www.horde.org/ |
|
| 3 |
-file=bundle.php |
|
| 4 |
-variable=BUNDLE_VERSION |
|
| 5 |
-extra_match='Horde Groupware' |
|
| 6 |
-safe=1.2.5 |
|
| 7 |
-vuln=CVE-2009-3701 |
|
| 8 |
-subdir=1 |
|
| 9 |
- |
|
| 10 |
-[eGroupWare] |
|
| 11 |
-url=http://www.egroupware.org/ |
|
| 12 |
-safe=1.8.006 |
|
| 13 |
-vuln=CVE-2014-2027 |
|
| 14 |
-file=setup.inc.php |
|
| 15 |
-variable=$setup_info['phpgwapi']['version'] |
|
| 16 |
-subdir=2 |
|
| 17 |
- |
|
| 18 |
-[more.groupware] |
|
| 19 |
-url=http://www.moregroupware.com/ |
|
| 20 |
-safe= |
|
| 21 |
-vuln=CVE-2006-4906 |
|
| 22 |
-file=version.inc.php |
|
| 23 |
-variable=$gwversion_number |
|
| 24 |
-subdir=1 |
|
| 25 |
- |
|
| 26 |
-[SimpleGroupware] |
|
| 27 |
-url=http://www.simple-groupware.de/ |
|
| 28 |
-safe=0.607 |
|
| 29 |
-latest=0.724 |
|
| 30 |
-vuln=http://www.simple-groupware.de/cms/Release-0-607 |
|
| 31 |
-file=setup.php |
|
| 32 |
-variable=define("CORE_VERSION_STRING"
|
|
| 33 |
-subdir=2 |
| ... | ... |
@@ -0,0 +1,56 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "Horde-groupware", |
|
| 4 |
+ "url": "http://www.horde.org/", |
|
| 5 |
+ "safe": "1.2.5", |
|
| 6 |
+ "vuln": "CVE-2009-3701", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "bundle.php", |
|
| 10 |
+ "variable": "BUNDLE_VERSION", |
|
| 11 |
+ "subdir": 1, |
|
| 12 |
+ "extra_match": "'Horde Groupware'" |
|
| 13 |
+ } |
|
| 14 |
+ ] |
|
| 15 |
+ }, |
|
| 16 |
+ {
|
|
| 17 |
+ "name": "eGroupWare", |
|
| 18 |
+ "url": "http://www.egroupware.org/", |
|
| 19 |
+ "safe": "1.8.006", |
|
| 20 |
+ "vuln": "CVE-2014-2027", |
|
| 21 |
+ "detection": [ |
|
| 22 |
+ {
|
|
| 23 |
+ "file": "setup.inc.php", |
|
| 24 |
+ "variable": "$setup_info['phpgwapi']['version']", |
|
| 25 |
+ "subdir": 2 |
|
| 26 |
+ } |
|
| 27 |
+ ] |
|
| 28 |
+ }, |
|
| 29 |
+ {
|
|
| 30 |
+ "name": "more.groupware", |
|
| 31 |
+ "url": "http://www.moregroupware.com/", |
|
| 32 |
+ "safe": "", |
|
| 33 |
+ "vuln": "CVE-2006-4906", |
|
| 34 |
+ "detection": [ |
|
| 35 |
+ {
|
|
| 36 |
+ "file": "version.inc.php", |
|
| 37 |
+ "variable": "$gwversion_number", |
|
| 38 |
+ "subdir": 1 |
|
| 39 |
+ } |
|
| 40 |
+ ] |
|
| 41 |
+ }, |
|
| 42 |
+ {
|
|
| 43 |
+ "name": "SimpleGroupware", |
|
| 44 |
+ "url": "http://www.simple-groupware.de/", |
|
| 45 |
+ "safe": "0.607", |
|
| 46 |
+ "vuln": "http://www.simple-groupware.de/cms/Release-0-607", |
|
| 47 |
+ "latest": "0.724", |
|
| 48 |
+ "detection": [ |
|
| 49 |
+ {
|
|
| 50 |
+ "file": "setup.php", |
|
| 51 |
+ "variable": "define(\"CORE_VERSION_STRING\"", |
|
| 52 |
+ "subdir": 2 |
|
| 53 |
+ } |
|
| 54 |
+ ] |
|
| 55 |
+ } |
|
| 56 |
+] |
|
| 0 | 57 |
\ No newline at end of file |
| ... | ... |
@@ -1,17 +0,0 @@ |
| 1 |
-[DRBGuestbook] |
|
| 2 |
-url=http://www.dbscripts.net/guestbook/ |
|
| 3 |
-safe=1.1.14 |
|
| 4 |
-vuln=CVE-2007-5218 |
|
| 5 |
-file=README.txt |
|
| 6 |
-variable=Version |
|
| 7 |
-extra_match=DRBGuestbook |
|
| 8 |
-subdir=0 |
|
| 9 |
- |
|
| 10 |
-[SimpGB] |
|
| 11 |
-url=http://www.boesch-it.de/ |
|
| 12 |
-safe=1.47.0 |
|
| 13 |
-vuln=CVE-2007-5127 |
|
| 14 |
-file=global.inc.php |
|
| 15 |
-variable=$version |
|
| 16 |
-subdir=1 |
|
| 17 |
-extra_match=$path_simpgb |
| ... | ... |
@@ -0,0 +1,30 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "DRBGuestbook", |
|
| 4 |
+ "url": "http://www.dbscripts.net/guestbook/", |
|
| 5 |
+ "safe": "1.1.14", |
|
| 6 |
+ "vuln": "CVE-2007-5218", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "README.txt", |
|
| 10 |
+ "variable": "Version", |
|
| 11 |
+ "subdir": 0, |
|
| 12 |
+ "extra_match": "DRBGuestbook" |
|
| 13 |
+ } |
|
| 14 |
+ ] |
|
| 15 |
+ }, |
|
| 16 |
+ {
|
|
| 17 |
+ "name": "SimpGB", |
|
| 18 |
+ "url": "http://www.boesch-it.de/", |
|
| 19 |
+ "safe": "1.47.0", |
|
| 20 |
+ "vuln": "CVE-2007-5127", |
|
| 21 |
+ "detection": [ |
|
| 22 |
+ {
|
|
| 23 |
+ "file": "global.inc.php", |
|
| 24 |
+ "variable": "$version", |
|
| 25 |
+ "subdir": 1, |
|
| 26 |
+ "extra_match": "$path_simpgb" |
|
| 27 |
+ } |
|
| 28 |
+ ] |
|
| 29 |
+ } |
|
| 30 |
+] |
|
| 0 | 31 |
\ No newline at end of file |
| ... | ... |
@@ -1,30 +0,0 @@ |
| 1 |
-[jquery-min] |
|
| 2 |
-url=https://jquery.com/ |
|
| 3 |
-safe=3.4.0 |
|
| 4 |
-vuln=CVE-2019-11358 |
|
| 5 |
-latest=3.4.1 |
|
| 6 |
-file=jquery.min.js |
|
| 7 |
-subdir=0 |
|
| 8 |
-variable=/*! jQuery |
|
| 9 |
-thirdparty=yes |
|
| 10 |
- |
|
| 11 |
-[jquery] |
|
| 12 |
-url=https://jquery.com/ |
|
| 13 |
-safe=3.4.0 |
|
| 14 |
-vuln=CVE-2019-11358 |
|
| 15 |
-latest=3.4.1 |
|
| 16 |
-file=jquery.js |
|
| 17 |
-subdir=0 |
|
| 18 |
-variable=/*! jQuery |
|
| 19 |
-thirdparty=yes |
|
| 20 |
- |
|
| 21 |
-[bootstrap] |
|
| 22 |
-url=https://getbootstrap.com/ |
|
| 23 |
-safe=4.3.1 |
|
| 24 |
-old_safe=3.4.1 |
|
| 25 |
-vuln=CVE-2019-8331 |
|
| 26 |
-latest=3.4.1 |
|
| 27 |
-file=bootstrap.min.css |
|
| 28 |
-subdir=0 |
|
| 29 |
-variable=* Bootstrap v |
|
| 30 |
-thirdparty=yes |
| ... | ... |
@@ -0,0 +1,48 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "jquery-min", |
|
| 4 |
+ "url": "https://jquery.com/", |
|
| 5 |
+ "safe": "3.4.0", |
|
| 6 |
+ "vuln": "CVE-2019-11358", |
|
| 7 |
+ "latest": "3.4.1", |
|
| 8 |
+ "thirdparty": "yes", |
|
| 9 |
+ "detection": [ |
|
| 10 |
+ {
|
|
| 11 |
+ "file": "jquery.min.js", |
|
| 12 |
+ "variable": "/*! jQuery", |
|
| 13 |
+ "subdir": 0 |
|
| 14 |
+ } |
|
| 15 |
+ ] |
|
| 16 |
+ }, |
|
| 17 |
+ {
|
|
| 18 |
+ "name": "jquery", |
|
| 19 |
+ "url": "https://jquery.com/", |
|
| 20 |
+ "safe": "3.4.0", |
|
| 21 |
+ "vuln": "CVE-2019-11358", |
|
| 22 |
+ "latest": "3.4.1", |
|
| 23 |
+ "thirdparty": "yes", |
|
| 24 |
+ "detection": [ |
|
| 25 |
+ {
|
|
| 26 |
+ "file": "jquery.js", |
|
| 27 |
+ "variable": "/*! jQuery", |
|
| 28 |
+ "subdir": 0 |
|
| 29 |
+ } |
|
| 30 |
+ ] |
|
| 31 |
+ }, |
|
| 32 |
+ {
|
|
| 33 |
+ "name": "bootstrap", |
|
| 34 |
+ "url": "https://getbootstrap.com/", |
|
| 35 |
+ "safe": "4.3.1", |
|
| 36 |
+ "old_safe": "3.4.1", |
|
| 37 |
+ "vuln": "CVE-2019-8331", |
|
| 38 |
+ "latest": "3.4.1", |
|
| 39 |
+ "thirdparty": "yes", |
|
| 40 |
+ "detection": [ |
|
| 41 |
+ {
|
|
| 42 |
+ "file": "bootstrap.min.css", |
|
| 43 |
+ "variable": "* Bootstrap v", |
|
| 44 |
+ "subdir": 0 |
|
| 45 |
+ } |
|
| 46 |
+ ] |
|
| 47 |
+ } |
|
| 48 |
+] |
|
| 0 | 49 |
\ No newline at end of file |
| ... | ... |
@@ -0,0 +1,16 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "cpDynaLinks", |
|
| 4 |
+ "url": "https://web.archive.org/web/20160423004721/http://www.cplinks.com/cpdynalinks/", |
|
| 5 |
+ "safe": "", |
|
| 6 |
+ "vuln": "CVE-2007-5408", |
|
| 7 |
+ "latest": "1.02", |
|
| 8 |
+ "detection": [ |
|
| 9 |
+ {
|
|
| 10 |
+ "file": "version.php", |
|
| 11 |
+ "variable": "$cplinks_version", |
|
| 12 |
+ "subdir": 0 |
|
| 13 |
+ } |
|
| 14 |
+ ] |
|
| 15 |
+ } |
|
| 16 |
+] |
|
| 0 | 17 |
\ No newline at end of file |
| ... | ... |
@@ -1,418 +0,0 @@ |
| 1 |
-[phpMyAdmin-veryold] |
|
| 2 |
-url=https://www.phpmyadmin.net/ |
|
| 3 |
-safe=4.9.2 |
|
| 4 |
-vuln=CVE-2019-18622 |
|
| 5 |
-file=Config.class.php |
|
| 6 |
-variable=PMA_VERSION |
|
| 7 |
-subdir=1 |
|
| 8 |
- |
|
| 9 |
-[phpMyAdmin-old] |
|
| 10 |
-url=https://www.phpmyadmin.net/ |
|
| 11 |
-safe=4.9.2 |
|
| 12 |
-vuln=CVE-2019-18622 |
|
| 13 |
-file=Config.php |
|
| 14 |
-variable=PMA_VERSION |
|
| 15 |
-subdir=1 |
|
| 16 |
-extra_match=namespace PMA\libraries; |
|
| 17 |
- |
|
| 18 |
-[phpMyAdmin] |
|
| 19 |
-url=https://www.phpmyadmin.net/ |
|
| 20 |
-safe=4.9.2 |
|
| 21 |
-vuln=CVE-2019-18622 |
|
| 22 |
-file=Config.php |
|
| 23 |
-variable=PMA_VERSION |
|
| 24 |
-subdir=2 |
|
| 25 |
-extra_match=namespace PhpMyAdmin; |
|
| 26 |
- |
|
| 27 |
-[SquirrelMail] |
|
| 28 |
-url=https://squirrelmail.org/ |
|
| 29 |
-safe=1.4.22 |
|
| 30 |
-vuln=CVE-2010-4554 |
|
| 31 |
-file=strings.php |
|
| 32 |
-variable=$version |
|
| 33 |
-extra_match=SquirrelMail version number |
|
| 34 |
-subdir=1 |
|
| 35 |
- |
|
| 36 |
-[Mantis-deprecated] |
|
| 37 |
-url=https://mantisbt.org/ |
|
| 38 |
-safe=2.22.1 |
|
| 39 |
-vuln=CVE-2019-15715 |
|
| 40 |
-file=config_defaults_inc.php |
|
| 41 |
-variable=$g_mantis_version |
|
| 42 |
-subdir=0 |
|
| 43 |
- |
|
| 44 |
-[Mantis] |
|
| 45 |
-url=https://mantisbt.org/ |
|
| 46 |
-safe=2.22.1 |
|
| 47 |
-vuln=CVE-2019-15715 |
|
| 48 |
-file=constant_inc.php |
|
| 49 |
-variable=MANTIS_VERSION |
|
| 50 |
-subdir=1 |
|
| 51 |
- |
|
| 52 |
-[Bugzilla3] |
|
| 53 |
-url=https://www.bugzilla.org/ |
|
| 54 |
-safe=4.4.7 |
|
| 55 |
-old_safe=4.2.12,4.0.16 |
|
| 56 |
-vuln=CVE-2011-2379 |
|
| 57 |
-file=Constants.pm |
|
| 58 |
-variable=BUGZILLA_VERSION |
|
| 59 |
-subdir=1 |
|
| 60 |
- |
|
| 61 |
-[Bugzilla2] |
|
| 62 |
-url=https://www.bugzilla.org/ |
|
| 63 |
-safe=4.4.7 |
|
| 64 |
-old_safe=4.2.12,4.0.16 |
|
| 65 |
-vuln=CVE-2011-2379 |
|
| 66 |
-file=Config.pm |
|
| 67 |
-variable=$Bugzilla::Config::VERSION |
|
| 68 |
-subdir=1 |
|
| 69 |
- |
|
| 70 |
-[SimpNews] |
|
| 71 |
-url=http://www.boesch-it.de |
|
| 72 |
-safe=2.48 |
|
| 73 |
-vuln=CVE-2010-2858 |
|
| 74 |
-file=global.inc.php |
|
| 75 |
-variable=$version |
|
| 76 |
-subdir=1 |
|
| 77 |
-extra_match=$path_simpnews |
|
| 78 |
- |
|
| 79 |
-[calendarix] |
|
| 80 |
-url=http://www.calendarix.com/ |
|
| 81 |
-safe= |
|
| 82 |
-vuln=CVE-2007-3183 |
|
| 83 |
-file=cal_config.inc.php |
|
| 84 |
-variable=$version |
|
| 85 |
-subdir=0 |
|
| 86 |
- |
|
| 87 |
-[myEvent] |
|
| 88 |
-url=http://mywebland.com/ |
|
| 89 |
-safe= |
|
| 90 |
-vuln=CVE-2007-0690 |
|
| 91 |
-file=config.php |
|
| 92 |
-variable=$version |
|
| 93 |
-extra_match=$eventbgcolor |
|
| 94 |
-subdir=0 |
|
| 95 |
- |
|
| 96 |
-[php-stats] |
|
| 97 |
-url=http://php-stats.com/ |
|
| 98 |
-safe= |
|
| 99 |
-vuln=CVE-2007-5453 |
|
| 100 |
-file=update.php |
|
| 101 |
-variable=$version |
|
| 102 |
-extra_match=http://php-stats.com/ |
|
| 103 |
-subdir=0 |
|
| 104 |
- |
|
| 105 |
-[Ampache] |
|
| 106 |
-url=http://ampache.org/ |
|
| 107 |
-safe=3.5.3 |
|
| 108 |
-vuln=http://ampache.org/2009/12/20/3-5-3-security-release/ |
|
| 109 |
-file=init.php |
|
| 110 |
-variable=$results['version'] |
|
| 111 |
-subdir=1 |
|
| 112 |
-extra_match=$ampache_path |
|
| 113 |
- |
|
| 114 |
-[SiteBar] |
|
| 115 |
-url=http://sitebar.org/ |
|
| 116 |
-safe=3.3.9 |
|
| 117 |
-vuln=CVE-2007-5492 |
|
| 118 |
-file=database.inc.php |
|
| 119 |
-variable=SB_CURRENT_RELEASE |
|
| 120 |
-subdir=1 |
|
| 121 |
- |
|
| 122 |
-[phpPgAdmin] |
|
| 123 |
-url=http://phppgadmin.sourceforge.net/ |
|
| 124 |
-safe=5.0.4 |
|
| 125 |
-vuln=CVE-2012-1600 |
|
| 126 |
-file=lib.inc.php |
|
| 127 |
-variable=$appVersion |
|
| 128 |
-subdir=1 |
|
| 129 |
-extra_match=phpPgAdmin |
|
| 130 |
- |
|
| 131 |
-[FTP Admin] |
|
| 132 |
-url=http://ftpadmin.sourceforge.net/ |
|
| 133 |
-safe= |
|
| 134 |
-vuln=CVE-2007-6234 |
|
| 135 |
-file=session_start.php |
|
| 136 |
-variable=VERSION |
|
| 137 |
-subdir=0 |
|
| 138 |
-extra_match=define("TITLE", "FTP Admin");
|
|
| 139 |
- |
|
| 140 |
-[RoundCube-deprecated] |
|
| 141 |
-url=https://roundcube.net |
|
| 142 |
-safe=1.3.10 |
|
| 143 |
-vuln=CVE-2019-10740 |
|
| 144 |
-file=index.php |
|
| 145 |
-variable=RCMAIL_VERSION |
|
| 146 |
-subdir=0 |
|
| 147 |
- |
|
| 148 |
-[RoundCube] |
|
| 149 |
-url=https://roundcube.net |
|
| 150 |
-safe=1.3.10 |
|
| 151 |
-vuln=CVE-2019-10740 |
|
| 152 |
-file=iniset.php |
|
| 153 |
-variable=RCMAIL_VERSION |
|
| 154 |
-subdir=2 |
|
| 155 |
- |
|
| 156 |
-[Moodle] |
|
| 157 |
-url=https://moodle.org/ |
|
| 158 |
-safe=3.2.2 |
|
| 159 |
-old_safe=3.1.5,3.0.9,2.7.19 |
|
| 160 |
-vuln=CVE-2017-2641 |
|
| 161 |
-file=version.php |
|
| 162 |
-variable=$release |
|
| 163 |
-subdir=0 |
|
| 164 |
-extra_match=MOODLE VERSION INFORMATION |
|
| 165 |
- |
|
| 166 |
-[cacti] |
|
| 167 |
-url=http://www.cacti.net/ |
|
| 168 |
-safe=0.8.7 |
|
| 169 |
-vuln=CVE-2007-6035 |
|
| 170 |
-file=global.php |
|
| 171 |
-variable=$config["cacti_version"] |
|
| 172 |
-subdir=1 |
|
| 173 |
- |
|
| 174 |
-[gnopaste] |
|
| 175 |
-url=http://gnopaste.sf.net/ |
|
| 176 |
-safe=0.5.4 |
|
| 177 |
-vuln=CVE-2006-2834 |
|
| 178 |
-file=install.php |
|
| 179 |
-variable=$_SESSION['page_title'] = 'gnopaste |
|
| 180 |
-subdir=0 |
|
| 181 |
- |
|
| 182 |
-[Flyspray] |
|
| 183 |
-url=http://www.flyspray.org/ |
|
| 184 |
-safe=0.9.9.7 |
|
| 185 |
-vuln=CVE-2012-1058 |
|
| 186 |
-file=class.flyspray.php |
|
| 187 |
-variable=var $version |
|
| 188 |
-subdir=1 |
|
| 189 |
- |
|
| 190 |
-[phpMyID] |
|
| 191 |
-url=http://siege.org/projects/phpMyID |
|
| 192 |
-safe= |
|
| 193 |
-vuln=CVE-2008-4730 |
|
| 194 |
-file=MyID.php |
|
| 195 |
-variable=@version |
|
| 196 |
-subdir=0 |
|
| 197 |
- |
|
| 198 |
-[phplist-old] |
|
| 199 |
-url=http://www.phplist.com/ |
|
| 200 |
-safe=3.2.7 |
|
| 201 |
-vuln=CVE-2016-10045 |
|
| 202 |
-file=connect.php |
|
| 203 |
-variable=define("VERSION"
|
|
| 204 |
-subdir=1 |
|
| 205 |
- |
|
| 206 |
-[phplist] |
|
| 207 |
-url=http://www.phplist.com/ |
|
| 208 |
-safe=3.2.7 |
|
| 209 |
-vuln=CVE-2016-10045 |
|
| 210 |
-file=init.php |
|
| 211 |
-variable=define("VERSION"
|
|
| 212 |
-subdir=1 |
|
| 213 |
- |
|
| 214 |
-[Piwik] |
|
| 215 |
-url=https://matomo.org/ |
|
| 216 |
-safe=3.12.0 |
|
| 217 |
-vuln=https://matomo.org/changelog/matomo-3-12-0/ |
|
| 218 |
-file=Version.php |
|
| 219 |
-variable=const VERSION |
|
| 220 |
-subdir=1 |
|
| 221 |
-extra_match=@link http://piwik.org |
|
| 222 |
- |
|
| 223 |
-[Matomo] |
|
| 224 |
-url=https://matomo.org/ |
|
| 225 |
-safe=3.12.0 |
|
| 226 |
-latest=3.13.0 |
|
| 227 |
-vuln=https://matomo.org/changelog/matomo-3-12-0/ |
|
| 228 |
-file=Version.php |
|
| 229 |
-variable=const VERSION |
|
| 230 |
-subdir=1 |
|
| 231 |
-extra_match=@link https://matomo.org |
|
| 232 |
- |
|
| 233 |
-[phpWishlist] |
|
| 234 |
-url=http://phpwishlist.sourceforge.net/ |
|
| 235 |
-safe=0.1.15 |
|
| 236 |
-vuln=CVE-2005-2203 |
|
| 237 |
-file=header.inc.php |
|
| 238 |
-variable=$version |
|
| 239 |
-subdir=1 |
|
| 240 |
-extra_match=* Wishlist - |
|
| 241 |
- |
|
| 242 |
-[awstats] |
|
| 243 |
-url=http://awstats.sourceforge.net/ |
|
| 244 |
-safe=7.1 |
|
| 245 |
-vuln=CVE-2012-4547 |
|
| 246 |
-file=awstats.pl |
|
| 247 |
-variable=$VERSION = |
|
| 248 |
-subdir=0 |
|
| 249 |
- |
|
| 250 |
-[phpMyFAQ] |
|
| 251 |
-url=http://www.phpmyfaq.de/ |
|
| 252 |
-safe=2.5.5 |
|
| 253 |
-vuln=http://www.phpmyfaq.de/advisory_2009-12-01.php |
|
| 254 |
-file=phpmyfaq.spec |
|
| 255 |
-variable=version |
|
| 256 |
-subdir=1 |
|
| 257 |
- |
|
| 258 |
-[Horde-webmail] |
|
| 259 |
-url=http://www.horde.org/ |
|
| 260 |
-file=bundle.php |
|
| 261 |
-variable=BUNDLE_VERSION |
|
| 262 |
-extra_match='Horde Groupware Webmail Edition' |
|
| 263 |
-safe=1.2.7 |
|
| 264 |
-vuln=http://secunia.com/advisories/39860 |
|
| 265 |
-subdir=1 |
|
| 266 |
- |
|
| 267 |
-[ResourceSpace] |
|
| 268 |
-url=http://www.resourcespace.org/ |
|
| 269 |
-file=version.php |
|
| 270 |
-variable=$productname='ResourceSpace';$productversion |
|
| 271 |
-safe=4.2.2833 |
|
| 272 |
-latest=4.3.2912 |
|
| 273 |
-vuln=CVE-2011-4311 |
|
| 274 |
-subdir=1 |
|
| 275 |
- |
|
| 276 |
-[apc.php] |
|
| 277 |
-url=http://pecl.php.net/package/APC |
|
| 278 |
-file=apc.php |
|
| 279 |
-# this does not contain it's "real" version number, using the CVS id |
|
| 280 |
-# instead - there's been an XSS pre 3.1.4. |
|
| 281 |
-variable=$VERSION='$Id: apc.php |
|
| 282 |
-safe=301867 |
|
| 283 |
-vuln=CVE-2010-3294 |
|
| 284 |
-subdir=0 |
|
| 285 |
- |
|
| 286 |
-[webtrees] |
|
| 287 |
-url=http://webtrees.net/ |
|
| 288 |
-file=session.php |
|
| 289 |
-variable=define('WT_VERSION'
|
|
| 290 |
-safe=1.2.4 |
|
| 291 |
-latest=1.2.4 |
|
| 292 |
-vuln=http://webtrees.net/en/forums/2-open-discussion/16423-webtrees-124 |
|
| 293 |
-subdir=1 |
|
| 294 |
- |
|
| 295 |
-[PhpGedView] |
|
| 296 |
-url=http://phpgedview.sourceforge.net/ |
|
| 297 |
-file=session.php |
|
| 298 |
-variable=define('PGV_VERSION'
|
|
| 299 |
-safe= |
|
| 300 |
-vuln=CVE-2011-0405 |
|
| 301 |
-subdir=1 |
|
| 302 |
- |
|
| 303 |
-[status.net] |
|
| 304 |
-url=http://status.net |
|
| 305 |
-file=common.php |
|
| 306 |
-variable=define('STATUSNET_BASE_VERSION'
|
|
| 307 |
-safe=0.9.9 |
|
| 308 |
-vuln=CVE-2011-3370 |
|
| 309 |
-subdir=1 |
|
| 310 |
- |
|
| 311 |
-[limesurvey18] |
|
| 312 |
-url=http://www.limesurvey.org/ |
|
| 313 |
-file=common.php |
|
| 314 |
-variable=$versionnumber |
|
| 315 |
-extra_match=LimeSurvey |
|
| 316 |
-safe=2.07 |
|
| 317 |
-vuln=CVE-2015-5078 |
|
| 318 |
-subdir=0 |
|
| 319 |
- |
|
| 320 |
-[limesurvey19] |
|
| 321 |
-url=http://www.limesurvey.org/ |
|
| 322 |
-file=version.php |
|
| 323 |
-variable=$versionnumber |
|
| 324 |
-extra_match=$dbversionnumber |
|
| 325 |
-safe=2.07 |
|
| 326 |
-vuln=CVE-2015-5078 |
|
| 327 |
-subdir=0 |
|
| 328 |
- |
|
| 329 |
-[limesurvey] |
|
| 330 |
-url=http://www.limesurvey.org/ |
|
| 331 |
-file=version.php |
|
| 332 |
-variable=$config['versionnumber'] |
|
| 333 |
-extra_match=LimeSurvey |
|
| 334 |
-safe=2.07 |
|
| 335 |
-vuln=CVE-2015-5078 |
|
| 336 |
-subdir=2 |
|
| 337 |
- |
|
| 338 |
-[webcalendar] |
|
| 339 |
-url=http://www.k5n.us/webcalendar.php |
|
| 340 |
-file=config.php |
|
| 341 |
-variable=$PROGRAM_VERSION |
|
| 342 |
-extra_match=@package WebCalendar |
|
| 343 |
-safe=1.2.7 |
|
| 344 |
-vuln=CVE-2013-1422 |
|
| 345 |
-subdir=1 |
|
| 346 |
- |
|
| 347 |
-[nextcloud] |
|
| 348 |
-url=https://nextcloud.com |
|
| 349 |
-file=version.php |
|
| 350 |
-variable=$OC_VersionString |
|
| 351 |
-vuln=CVE-2019-5449 |
|
| 352 |
-safe=15.0.1 |
|
| 353 |
-old_safe=14.0.5,13.0.9 |
|
| 354 |
-subdir=0 |
|
| 355 |
-extra_match=$vendor = 'nextcloud'; |
|
| 356 |
- |
|
| 357 |
-[owncloud] |
|
| 358 |
-url=https://owncloud.org/ |
|
| 359 |
-file=version.php |
|
| 360 |
-variable=$OC_VersionString |
|
| 361 |
-subdir=0 |
|
| 362 |
-extra_nomatch=nextcloud |
|
| 363 |
-vuln=https://owncloud.org/security/advisories/possibility-to-extend-internal-share-permissions-using-the-api/ |
|
| 364 |
-safe=10.2.1 |
|
| 365 |
- |
|
| 366 |
-[owncloud5] |
|
| 367 |
-url=https://owncloud.org/ |
|
| 368 |
-file=util.php |
|
| 369 |
-variable=return ' |
|
| 370 |
-subdir=1 |
|
| 371 |
-extra_match=class OC_Util |
|
| 372 |
-vuln=https://owncloud.org/security/advisories/possibility-to-extend-internal-share-permissions-using-the-api/ |
|
| 373 |
-safe=10.2.1 |
|
| 374 |
- |
|
| 375 |
-[videodb] |
|
| 376 |
-url=http://www.videodb.net/ |
|
| 377 |
-file=constants.php |
|
| 378 |
-variable=('VERSION',
|
|
| 379 |
-extra_match=TBL_ |
|
| 380 |
-safe=4.0 |
|
| 381 |
-vuln=http://www.exploit-db.com/exploits/17660/ |
|
| 382 |
-subdir=1 |
|
| 383 |
- |
|
| 384 |
-[OpenX] |
|
| 385 |
-url=http://www.openx.com/ |
|
| 386 |
-file=constants.php |
|
| 387 |
-variable=OA_VERSION |
|
| 388 |
-extra_match=OpenX |
|
| 389 |
-safe= |
|
| 390 |
-vuln=http://www.kreativrauschen.com/blog/2013/12/18/zero-day-vulnerability-in-openx-source-2-8-11-and-revive-adserver-3-0-1/ |
|
| 391 |
-subdir=0 |
|
| 392 |
- |
|
| 393 |
-[revive] |
|
| 394 |
-url=http://www.revive-adserver.com/ |
|
| 395 |
-file=constants.php |
|
| 396 |
-variable=VERSION |
|
| 397 |
-extra_match=Revive Adserver |
|
| 398 |
-safe=3.0.5 |
|
| 399 |
-vuln=CVE-2013-5954 |
|
| 400 |
-subdir=0 |
|
| 401 |
- |
|
| 402 |
-[osTicket] |
|
| 403 |
-url=http://osticket.com/ |
|
| 404 |
-file=bootstrap.php |
|
| 405 |
-variable=define('THIS_VERSION',
|
|
| 406 |
-safe=1.8.12 |
|
| 407 |
-latest=1.9.12 |
|
| 408 |
-vuln=https://github.com/osTicket/osTicket-1.8/releases/tag/v1.8.12 |
|
| 409 |
-subdir=0 |
|
| 410 |
- |
|
| 411 |
-[Gitlist] |
|
| 412 |
-url=https://gitlist.org/ |
|
| 413 |
-file=footer.twig |
|
| 414 |
-variable=Powered by |
|
| 415 |
-safe=0.7.0 |
|
| 416 |
-latest=1.0.2 |
|
| 417 |
-vuln=CVE-2018-1000533 |
|
| 418 |
-subdir=3 |
| ... | ... |
@@ -0,0 +1,660 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "phpMyAdmin-veryold", |
|
| 4 |
+ "url": "https://www.phpmyadmin.net/", |
|
| 5 |
+ "safe": "4.9.2", |
|
| 6 |
+ "vuln": "CVE-2019-18622", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "Config.class.php", |
|
| 10 |
+ "variable": "PMA_VERSION", |
|
| 11 |
+ "subdir": 1 |
|
| 12 |
+ } |
|
| 13 |
+ ] |
|
| 14 |
+ }, |
|
| 15 |
+ {
|
|
| 16 |
+ "name": "phpMyAdmin-old", |
|
| 17 |
+ "url": "https://www.phpmyadmin.net/", |
|
| 18 |
+ "safe": "4.9.2", |
|
| 19 |
+ "vuln": "CVE-2019-18622", |
|
| 20 |
+ "detection": [ |
|
| 21 |
+ {
|
|
| 22 |
+ "file": "Config.php", |
|
| 23 |
+ "variable": "PMA_VERSION", |
|
| 24 |
+ "subdir": 1, |
|
| 25 |
+ "extra_match": "namespace PMA\\libraries;" |
|
| 26 |
+ } |
|
| 27 |
+ ] |
|
| 28 |
+ }, |
|
| 29 |
+ {
|
|
| 30 |
+ "name": "phpMyAdmin", |
|
| 31 |
+ "url": "https://www.phpmyadmin.net/", |
|
| 32 |
+ "safe": "4.9.2", |
|
| 33 |
+ "vuln": "CVE-2019-18622", |
|
| 34 |
+ "detection": [ |
|
| 35 |
+ {
|
|
| 36 |
+ "file": "Config.php", |
|
| 37 |
+ "variable": "PMA_VERSION", |
|
| 38 |
+ "subdir": 2, |
|
| 39 |
+ "extra_match": "namespace PhpMyAdmin;" |
|
| 40 |
+ } |
|
| 41 |
+ ] |
|
| 42 |
+ }, |
|
| 43 |
+ {
|
|
| 44 |
+ "name": "SquirrelMail", |
|
| 45 |
+ "url": "https://squirrelmail.org/", |
|
| 46 |
+ "safe": "1.4.22", |
|
| 47 |
+ "vuln": "CVE-2010-4554", |
|
| 48 |
+ "detection": [ |
|
| 49 |
+ {
|
|
| 50 |
+ "file": "strings.php", |
|
| 51 |
+ "variable": "$version", |
|
| 52 |
+ "subdir": 1, |
|
| 53 |
+ "extra_match": "SquirrelMail version number" |
|
| 54 |
+ } |
|
| 55 |
+ ] |
|
| 56 |
+ }, |
|
| 57 |
+ {
|
|
| 58 |
+ "name": "Mantis-deprecated", |
|
| 59 |
+ "url": "https://mantisbt.org/", |
|
| 60 |
+ "safe": "2.22.1", |
|
| 61 |
+ "vuln": "CVE-2019-15715", |
|
| 62 |
+ "detection": [ |
|
| 63 |
+ {
|
|
| 64 |
+ "file": "config_defaults_inc.php", |
|
| 65 |
+ "variable": "$g_mantis_version", |
|
| 66 |
+ "subdir": 0 |
|
| 67 |
+ } |
|
| 68 |
+ ] |
|
| 69 |
+ }, |
|
| 70 |
+ {
|
|
| 71 |
+ "name": "Mantis", |
|
| 72 |
+ "url": "https://mantisbt.org/", |
|
| 73 |
+ "safe": "2.22.1", |
|
| 74 |
+ "vuln": "CVE-2019-15715", |
|
| 75 |
+ "detection": [ |
|
| 76 |
+ {
|
|
| 77 |
+ "file": "constant_inc.php", |
|
| 78 |
+ "variable": "MANTIS_VERSION", |
|
| 79 |
+ "subdir": 1 |
|
| 80 |
+ } |
|
| 81 |
+ ] |
|
| 82 |
+ }, |
|
| 83 |
+ {
|
|
| 84 |
+ "name": "Bugzilla3", |
|
| 85 |
+ "url": "https://www.bugzilla.org/", |
|
| 86 |
+ "safe": "4.4.7", |
|
| 87 |
+ "old_safe": "4.2.12,4.0.16", |
|
| 88 |
+ "vuln": "CVE-2011-2379", |
|
| 89 |
+ "detection": [ |
|
| 90 |
+ {
|
|
| 91 |
+ "file": "Constants.pm", |
|
| 92 |
+ "variable": "BUGZILLA_VERSION", |
|
| 93 |
+ "subdir": 1 |
|
| 94 |
+ } |
|
| 95 |
+ ] |
|
| 96 |
+ }, |
|
| 97 |
+ {
|
|
| 98 |
+ "name": "Bugzilla2", |
|
| 99 |
+ "url": "https://www.bugzilla.org/", |
|
| 100 |
+ "safe": "4.4.7", |
|
| 101 |
+ "old_safe": "4.2.12,4.0.16", |
|
| 102 |
+ "vuln": "CVE-2011-2379", |
|
| 103 |
+ "detection": [ |
|
| 104 |
+ {
|
|
| 105 |
+ "file": "Config.pm", |
|
| 106 |
+ "variable": "$Bugzilla::Config::VERSION", |
|
| 107 |
+ "subdir": 1 |
|
| 108 |
+ } |
|
| 109 |
+ ] |
|
| 110 |
+ }, |
|
| 111 |
+ {
|
|
| 112 |
+ "name": "SimpNews", |
|
| 113 |
+ "url": "http://www.boesch-it.de", |
|
| 114 |
+ "safe": "2.48", |
|
| 115 |
+ "vuln": "CVE-2010-2858", |
|
| 116 |
+ "detection": [ |
|
| 117 |
+ {
|
|
| 118 |
+ "file": "global.inc.php", |
|
| 119 |
+ "variable": "$version", |
|
| 120 |
+ "subdir": 1, |
|
| 121 |
+ "extra_match": "$path_simpnews" |
|
| 122 |
+ } |
|
| 123 |
+ ] |
|
| 124 |
+ }, |
|
| 125 |
+ {
|
|
| 126 |
+ "name": "calendarix", |
|
| 127 |
+ "url": "http://www.calendarix.com/", |
|
| 128 |
+ "safe": "", |
|
| 129 |
+ "vuln": "CVE-2007-3183", |
|
| 130 |
+ "detection": [ |
|
| 131 |
+ {
|
|
| 132 |
+ "file": "cal_config.inc.php", |
|
| 133 |
+ "variable": "$version", |
|
| 134 |
+ "subdir": 0 |
|
| 135 |
+ } |
|
| 136 |
+ ] |
|
| 137 |
+ }, |
|
| 138 |
+ {
|
|
| 139 |
+ "name": "myEvent", |
|
| 140 |
+ "url": "http://mywebland.com/", |
|
| 141 |
+ "safe": "", |
|
| 142 |
+ "vuln": "CVE-2007-0690", |
|
| 143 |
+ "detection": [ |
|
| 144 |
+ {
|
|
| 145 |
+ "file": "config.php", |
|
| 146 |
+ "variable": "$version", |
|
| 147 |
+ "subdir": 0, |
|
| 148 |
+ "extra_match": "$eventbgcolor" |
|
| 149 |
+ } |
|
| 150 |
+ ] |
|
| 151 |
+ }, |
|
| 152 |
+ {
|
|
| 153 |
+ "name": "php-stats", |
|
| 154 |
+ "url": "http://php-stats.com/", |
|
| 155 |
+ "safe": "", |
|
| 156 |
+ "vuln": "CVE-2007-5453", |
|
| 157 |
+ "detection": [ |
|
| 158 |
+ {
|
|
| 159 |
+ "file": "update.php", |
|
| 160 |
+ "variable": "$version", |
|
| 161 |
+ "subdir": 0, |
|
| 162 |
+ "extra_match": "http://php-stats.com/" |
|
| 163 |
+ } |
|
| 164 |
+ ] |
|
| 165 |
+ }, |
|
| 166 |
+ {
|
|
| 167 |
+ "name": "Ampache", |
|
| 168 |
+ "url": "http://ampache.org/", |
|
| 169 |
+ "safe": "3.5.3", |
|
| 170 |
+ "vuln": "http://ampache.org/2009/12/20/3-5-3-security-release/", |
|
| 171 |
+ "detection": [ |
|
| 172 |
+ {
|
|
| 173 |
+ "file": "init.php", |
|
| 174 |
+ "variable": "$results['version']", |
|
| 175 |
+ "subdir": 1, |
|
| 176 |
+ "extra_match": "$ampache_path" |
|
| 177 |
+ } |
|
| 178 |
+ ] |
|
| 179 |
+ }, |
|
| 180 |
+ {
|
|
| 181 |
+ "name": "SiteBar", |
|
| 182 |
+ "url": "http://sitebar.org/", |
|
| 183 |
+ "safe": "3.3.9", |
|
| 184 |
+ "vuln": "CVE-2007-5492", |
|
| 185 |
+ "detection": [ |
|
| 186 |
+ {
|
|
| 187 |
+ "file": "database.inc.php", |
|
| 188 |
+ "variable": "SB_CURRENT_RELEASE", |
|
| 189 |
+ "subdir": 1 |
|
| 190 |
+ } |
|
| 191 |
+ ] |
|
| 192 |
+ }, |
|
| 193 |
+ {
|
|
| 194 |
+ "name": "phpPgAdmin", |
|
| 195 |
+ "url": "http://phppgadmin.sourceforge.net/", |
|
| 196 |
+ "safe": "5.0.4", |
|
| 197 |
+ "vuln": "CVE-2012-1600", |
|
| 198 |
+ "detection": [ |
|
| 199 |
+ {
|
|
| 200 |
+ "file": "lib.inc.php", |
|
| 201 |
+ "variable": "$appVersion", |
|
| 202 |
+ "subdir": 1, |
|
| 203 |
+ "extra_match": "phpPgAdmin" |
|
| 204 |
+ } |
|
| 205 |
+ ] |
|
| 206 |
+ }, |
|
| 207 |
+ {
|
|
| 208 |
+ "name": "FTP Admin", |
|
| 209 |
+ "url": "http://ftpadmin.sourceforge.net/", |
|
| 210 |
+ "safe": "", |
|
| 211 |
+ "vuln": "CVE-2007-6234", |
|
| 212 |
+ "detection": [ |
|
| 213 |
+ {
|
|
| 214 |
+ "file": "session_start.php", |
|
| 215 |
+ "variable": "VERSION", |
|
| 216 |
+ "subdir": 0, |
|
| 217 |
+ "extra_match": "define(\"TITLE\", \"FTP Admin\");" |
|
| 218 |
+ } |
|
| 219 |
+ ] |
|
| 220 |
+ }, |
|
| 221 |
+ {
|
|
| 222 |
+ "name": "RoundCube-deprecated", |
|
| 223 |
+ "url": "https://roundcube.net", |
|
| 224 |
+ "safe": "1.3.10", |
|
| 225 |
+ "vuln": "CVE-2019-10740", |
|
| 226 |
+ "detection": [ |
|
| 227 |
+ {
|
|
| 228 |
+ "file": "index.php", |
|
| 229 |
+ "variable": "RCMAIL_VERSION", |
|
| 230 |
+ "subdir": 0 |
|
| 231 |
+ } |
|
| 232 |
+ ] |
|
| 233 |
+ }, |
|
| 234 |
+ {
|
|
| 235 |
+ "name": "RoundCube", |
|
| 236 |
+ "url": "https://roundcube.net", |
|
| 237 |
+ "safe": "1.3.10", |
|
| 238 |
+ "vuln": "CVE-2019-10740", |
|
| 239 |
+ "detection": [ |
|
| 240 |
+ {
|
|
| 241 |
+ "file": "iniset.php", |
|
| 242 |
+ "variable": "RCMAIL_VERSION", |
|
| 243 |
+ "subdir": 2 |
|
| 244 |
+ } |
|
| 245 |
+ ] |
|
| 246 |
+ }, |
|
| 247 |
+ {
|
|
| 248 |
+ "name": "Moodle", |
|
| 249 |
+ "url": "https://moodle.org/", |
|
| 250 |
+ "safe": "3.2.2", |
|
| 251 |
+ "old_safe": "3.1.5,3.0.9,2.7.19", |
|
| 252 |
+ "vuln": "CVE-2017-2641", |
|
| 253 |
+ "detection": [ |
|
| 254 |
+ {
|
|
| 255 |
+ "file": "version.php", |
|
| 256 |
+ "variable": "$release", |
|
| 257 |
+ "subdir": 0, |
|
| 258 |
+ "extra_match": "MOODLE VERSION INFORMATION" |
|
| 259 |
+ } |
|
| 260 |
+ ] |
|
| 261 |
+ }, |
|
| 262 |
+ {
|
|
| 263 |
+ "name": "cacti", |
|
| 264 |
+ "url": "http://www.cacti.net/", |
|
| 265 |
+ "safe": "0.8.7", |
|
| 266 |
+ "vuln": "CVE-2007-6035", |
|
| 267 |
+ "detection": [ |
|
| 268 |
+ {
|
|
| 269 |
+ "file": "global.php", |
|
| 270 |
+ "variable": "$config[\"cacti_version\"]", |
|
| 271 |
+ "subdir": 1 |
|
| 272 |
+ } |
|
| 273 |
+ ] |
|
| 274 |
+ }, |
|
| 275 |
+ {
|
|
| 276 |
+ "name": "gnopaste", |
|
| 277 |
+ "url": "http://gnopaste.sf.net/", |
|
| 278 |
+ "safe": "0.5.4", |
|
| 279 |
+ "vuln": "CVE-2006-2834", |
|
| 280 |
+ "detection": [ |
|
| 281 |
+ {
|
|
| 282 |
+ "file": "install.php", |
|
| 283 |
+ "variable": "$_SESSION['page_title'] = 'gnopaste", |
|
| 284 |
+ "subdir": 0 |
|
| 285 |
+ } |
|
| 286 |
+ ] |
|
| 287 |
+ }, |
|
| 288 |
+ {
|
|
| 289 |
+ "name": "Flyspray", |
|
| 290 |
+ "url": "http://www.flyspray.org/", |
|
| 291 |
+ "safe": "0.9.9.7", |
|
| 292 |
+ "vuln": "CVE-2012-1058", |
|
| 293 |
+ "detection": [ |
|
| 294 |
+ {
|
|
| 295 |
+ "file": "class.flyspray.php", |
|
| 296 |
+ "variable": "var $version", |
|
| 297 |
+ "subdir": 1 |
|
| 298 |
+ } |
|
| 299 |
+ ] |
|
| 300 |
+ }, |
|
| 301 |
+ {
|
|
| 302 |
+ "name": "phpMyID", |
|
| 303 |
+ "url": "http://siege.org/projects/phpMyID", |
|
| 304 |
+ "safe": "", |
|
| 305 |
+ "vuln": "CVE-2008-4730", |
|
| 306 |
+ "detection": [ |
|
| 307 |
+ {
|
|
| 308 |
+ "file": "MyID.php", |
|
| 309 |
+ "variable": "@version", |
|
| 310 |
+ "subdir": 0 |
|
| 311 |
+ } |
|
| 312 |
+ ] |
|
| 313 |
+ }, |
|
| 314 |
+ {
|
|
| 315 |
+ "name": "phplist-old", |
|
| 316 |
+ "url": "http://www.phplist.com/", |
|
| 317 |
+ "safe": "3.2.7", |
|
| 318 |
+ "vuln": "CVE-2016-10045", |
|
| 319 |
+ "detection": [ |
|
| 320 |
+ {
|
|
| 321 |
+ "file": "connect.php", |
|
| 322 |
+ "variable": "define(\"VERSION\"", |
|
| 323 |
+ "subdir": 1 |
|
| 324 |
+ } |
|
| 325 |
+ ] |
|
| 326 |
+ }, |
|
| 327 |
+ {
|
|
| 328 |
+ "name": "phplist", |
|
| 329 |
+ "url": "http://www.phplist.com/", |
|
| 330 |
+ "safe": "3.2.7", |
|
| 331 |
+ "vuln": "CVE-2016-10045", |
|
| 332 |
+ "detection": [ |
|
| 333 |
+ {
|
|
| 334 |
+ "file": "init.php", |
|
| 335 |
+ "variable": "define(\"VERSION\"", |
|
| 336 |
+ "subdir": 1 |
|
| 337 |
+ } |
|
| 338 |
+ ] |
|
| 339 |
+ }, |
|
| 340 |
+ {
|
|
| 341 |
+ "name": "Piwik", |
|
| 342 |
+ "url": "https://matomo.org/", |
|
| 343 |
+ "safe": "3.12.0", |
|
| 344 |
+ "vuln": "https://matomo.org/changelog/matomo-3-12-0/", |
|
| 345 |
+ "detection": [ |
|
| 346 |
+ {
|
|
| 347 |
+ "file": "Version.php", |
|
| 348 |
+ "variable": "const VERSION", |
|
| 349 |
+ "subdir": 1, |
|
| 350 |
+ "extra_match": "@link http://piwik.org" |
|
| 351 |
+ } |
|
| 352 |
+ ] |
|
| 353 |
+ }, |
|
| 354 |
+ {
|
|
| 355 |
+ "name": "Matomo", |
|
| 356 |
+ "url": "https://matomo.org/", |
|
| 357 |
+ "safe": "3.12.0", |
|
| 358 |
+ "vuln": "https://matomo.org/changelog/matomo-3-12-0/", |
|
| 359 |
+ "latest": "3.13.0", |
|
| 360 |
+ "detection": [ |
|
| 361 |
+ {
|
|
| 362 |
+ "file": "Version.php", |
|
| 363 |
+ "variable": "const VERSION", |
|
| 364 |
+ "subdir": 1, |
|
| 365 |
+ "extra_match": "@link https://matomo.org" |
|
| 366 |
+ } |
|
| 367 |
+ ] |
|
| 368 |
+ }, |
|
| 369 |
+ {
|
|
| 370 |
+ "name": "phpWishlist", |
|
| 371 |
+ "url": "http://phpwishlist.sourceforge.net/", |
|
| 372 |
+ "safe": "0.1.15", |
|
| 373 |
+ "vuln": "CVE-2005-2203", |
|
| 374 |
+ "detection": [ |
|
| 375 |
+ {
|
|
| 376 |
+ "file": "header.inc.php", |
|
| 377 |
+ "variable": "$version", |
|
| 378 |
+ "subdir": 1, |
|
| 379 |
+ "extra_match": "* Wishlist -" |
|
| 380 |
+ } |
|
| 381 |
+ ] |
|
| 382 |
+ }, |
|
| 383 |
+ {
|
|
| 384 |
+ "name": "awstats", |
|
| 385 |
+ "url": "http://awstats.sourceforge.net/", |
|
| 386 |
+ "safe": "7.1", |
|
| 387 |
+ "vuln": "CVE-2012-4547", |
|
| 388 |
+ "detection": [ |
|
| 389 |
+ {
|
|
| 390 |
+ "file": "awstats.pl", |
|
| 391 |
+ "variable": "$VERSION =", |
|
| 392 |
+ "subdir": 0 |
|
| 393 |
+ } |
|
| 394 |
+ ] |
|
| 395 |
+ }, |
|
| 396 |
+ {
|
|
| 397 |
+ "name": "phpMyFAQ", |
|
| 398 |
+ "url": "http://www.phpmyfaq.de/", |
|
| 399 |
+ "safe": "2.5.5", |
|
| 400 |
+ "vuln": "http://www.phpmyfaq.de/advisory_2009-12-01.php", |
|
| 401 |
+ "detection": [ |
|
| 402 |
+ {
|
|
| 403 |
+ "file": "phpmyfaq.spec", |
|
| 404 |
+ "variable": "version", |
|
| 405 |
+ "subdir": 1 |
|
| 406 |
+ } |
|
| 407 |
+ ] |
|
| 408 |
+ }, |
|
| 409 |
+ {
|
|
| 410 |
+ "name": "Horde-webmail", |
|
| 411 |
+ "url": "http://www.horde.org/", |
|
| 412 |
+ "safe": "1.2.7", |
|
| 413 |
+ "vuln": "http://secunia.com/advisories/39860", |
|
| 414 |
+ "detection": [ |
|
| 415 |
+ {
|
|
| 416 |
+ "file": "bundle.php", |
|
| 417 |
+ "variable": "BUNDLE_VERSION", |
|
| 418 |
+ "subdir": 1, |
|
| 419 |
+ "extra_match": "'Horde Groupware Webmail Edition'" |
|
| 420 |
+ } |
|
| 421 |
+ ] |
|
| 422 |
+ }, |
|
| 423 |
+ {
|
|
| 424 |
+ "name": "ResourceSpace", |
|
| 425 |
+ "url": "http://www.resourcespace.org/", |
|
| 426 |
+ "safe": "4.2.2833", |
|
| 427 |
+ "vuln": "CVE-2011-4311", |
|
| 428 |
+ "latest": "4.3.2912", |
|
| 429 |
+ "detection": [ |
|
| 430 |
+ {
|
|
| 431 |
+ "file": "version.php", |
|
| 432 |
+ "variable": "$productname='ResourceSpace';$productversion", |
|
| 433 |
+ "subdir": 1 |
|
| 434 |
+ } |
|
| 435 |
+ ] |
|
| 436 |
+ }, |
|
| 437 |
+ {
|
|
| 438 |
+ "name": "apc.php", |
|
| 439 |
+ "url": "http://pecl.php.net/package/APC", |
|
| 440 |
+ "safe": "301867", |
|
| 441 |
+ "vuln": "CVE-2010-3294", |
|
| 442 |
+ "note": "this does not contain it's \"real\" version number, using the CVS id instead - there's been an XSS pre 3.1.4.", |
|
| 443 |
+ "detection": [ |
|
| 444 |
+ {
|
|
| 445 |
+ "file": "apc.php", |
|
| 446 |
+ "variable": "$VERSION='$Id: apc.php", |
|
| 447 |
+ "subdir": 0 |
|
| 448 |
+ } |
|
| 449 |
+ ] |
|
| 450 |
+ }, |
|
| 451 |
+ {
|
|
| 452 |
+ "name": "webtrees", |
|
| 453 |
+ "url": "http://webtrees.net/", |
|
| 454 |
+ "safe": "1.2.4", |
|
| 455 |
+ "vuln": "http://webtrees.net/en/forums/2-open-discussion/16423-webtrees-124", |
|
| 456 |
+ "latest": "1.2.4", |
|
| 457 |
+ "detection": [ |
|
| 458 |
+ {
|
|
| 459 |
+ "file": "session.php", |
|
| 460 |
+ "variable": "define('WT_VERSION'",
|
|
| 461 |
+ "subdir": 1 |
|
| 462 |
+ } |
|
| 463 |
+ ] |
|
| 464 |
+ }, |
|
| 465 |
+ {
|
|
| 466 |
+ "name": "PhpGedView", |
|
| 467 |
+ "url": "http://phpgedview.sourceforge.net/", |
|
| 468 |
+ "safe": "", |
|
| 469 |
+ "vuln": "CVE-2011-0405", |
|
| 470 |
+ "detection": [ |
|
| 471 |
+ {
|
|
| 472 |
+ "file": "session.php", |
|
| 473 |
+ "variable": "define('PGV_VERSION'",
|
|
| 474 |
+ "subdir": 1 |
|
| 475 |
+ } |
|
| 476 |
+ ] |
|
| 477 |
+ }, |
|
| 478 |
+ {
|
|
| 479 |
+ "name": "status.net", |
|
| 480 |
+ "url": "http://status.net", |
|
| 481 |
+ "safe": "0.9.9", |
|
| 482 |
+ "vuln": "CVE-2011-3370", |
|
| 483 |
+ "detection": [ |
|
| 484 |
+ {
|
|
| 485 |
+ "file": "common.php", |
|
| 486 |
+ "variable": "define('STATUSNET_BASE_VERSION'",
|
|
| 487 |
+ "subdir": 1 |
|
| 488 |
+ } |
|
| 489 |
+ ] |
|
| 490 |
+ }, |
|
| 491 |
+ {
|
|
| 492 |
+ "name": "limesurvey18", |
|
| 493 |
+ "url": "http://www.limesurvey.org/", |
|
| 494 |
+ "safe": "2.07", |
|
| 495 |
+ "vuln": "CVE-2015-5078", |
|
| 496 |
+ "detection": [ |
|
| 497 |
+ {
|
|
| 498 |
+ "file": "common.php", |
|
| 499 |
+ "variable": "$versionnumber", |
|
| 500 |
+ "subdir": 0, |
|
| 501 |
+ "extra_match": "LimeSurvey" |
|
| 502 |
+ } |
|
| 503 |
+ ] |
|
| 504 |
+ }, |
|
| 505 |
+ {
|
|
| 506 |
+ "name": "limesurvey19", |
|
| 507 |
+ "url": "http://www.limesurvey.org/", |
|
| 508 |
+ "safe": "2.07", |
|
| 509 |
+ "vuln": "CVE-2015-5078", |
|
| 510 |
+ "detection": [ |
|
| 511 |
+ {
|
|
| 512 |
+ "file": "version.php", |
|
| 513 |
+ "variable": "$versionnumber", |
|
| 514 |
+ "subdir": 0, |
|
| 515 |
+ "extra_match": "$dbversionnumber" |
|
| 516 |
+ } |
|
| 517 |
+ ] |
|
| 518 |
+ }, |
|
| 519 |
+ {
|
|
| 520 |
+ "name": "limesurvey", |
|
| 521 |
+ "url": "http://www.limesurvey.org/", |
|
| 522 |
+ "safe": "2.07", |
|
| 523 |
+ "vuln": "CVE-2015-5078", |
|
| 524 |
+ "detection": [ |
|
| 525 |
+ {
|
|
| 526 |
+ "file": "version.php", |
|
| 527 |
+ "variable": "$config['versionnumber']", |
|
| 528 |
+ "subdir": 2, |
|
| 529 |
+ "extra_match": "LimeSurvey" |
|
| 530 |
+ } |
|
| 531 |
+ ] |
|
| 532 |
+ }, |
|
| 533 |
+ {
|
|
| 534 |
+ "name": "webcalendar", |
|
| 535 |
+ "url": "http://www.k5n.us/webcalendar.php", |
|
| 536 |
+ "safe": "1.2.7", |
|
| 537 |
+ "vuln": "CVE-2013-1422", |
|
| 538 |
+ "detection": [ |
|
| 539 |
+ {
|
|
| 540 |
+ "file": "config.php", |
|
| 541 |
+ "variable": "$PROGRAM_VERSION", |
|
| 542 |
+ "subdir": 1, |
|
| 543 |
+ "extra_match": "@package WebCalendar" |
|
| 544 |
+ } |
|
| 545 |
+ ] |
|
| 546 |
+ }, |
|
| 547 |
+ {
|
|
| 548 |
+ "name": "nextcloud", |
|
| 549 |
+ "url": "https://nextcloud.com", |
|
| 550 |
+ "safe": "15.0.1", |
|
| 551 |
+ "old_safe": "14.0.5,13.0.9", |
|
| 552 |
+ "vuln": "CVE-2019-5449", |
|
| 553 |
+ "detection": [ |
|
| 554 |
+ {
|
|
| 555 |
+ "file": "version.php", |
|
| 556 |
+ "variable": "$OC_VersionString", |
|
| 557 |
+ "subdir": 0, |
|
| 558 |
+ "extra_match": "$vendor = 'nextcloud';" |
|
| 559 |
+ } |
|
| 560 |
+ ] |
|
| 561 |
+ }, |
|
| 562 |
+ {
|
|
| 563 |
+ "name": "owncloud", |
|
| 564 |
+ "url": "https://owncloud.org/", |
|
| 565 |
+ "safe": "10.2.1", |
|
| 566 |
+ "vuln": "https://owncloud.org/security/advisories/possibility-to-extend-internal-share-permissions-using-the-api/", |
|
| 567 |
+ "detection": [ |
|
| 568 |
+ {
|
|
| 569 |
+ "file": "version.php", |
|
| 570 |
+ "variable": "$OC_VersionString", |
|
| 571 |
+ "subdir": 0, |
|
| 572 |
+ "extra_nomatch": "nextcloud" |
|
| 573 |
+ } |
|
| 574 |
+ ] |
|
| 575 |
+ }, |
|
| 576 |
+ {
|
|
| 577 |
+ "name": "owncloud5", |
|
| 578 |
+ "url": "https://owncloud.org/", |
|
| 579 |
+ "safe": "10.2.1", |
|
| 580 |
+ "vuln": "https://owncloud.org/security/advisories/possibility-to-extend-internal-share-permissions-using-the-api/", |
|
| 581 |
+ "detection": [ |
|
| 582 |
+ {
|
|
| 583 |
+ "file": "util.php", |
|
| 584 |
+ "variable": "return '", |
|
| 585 |
+ "subdir": 1, |
|
| 586 |
+ "extra_match": "class OC_Util" |
|
| 587 |
+ } |
|
| 588 |
+ ] |
|
| 589 |
+ }, |
|
| 590 |
+ {
|
|
| 591 |
+ "name": "videodb", |
|
| 592 |
+ "url": "http://www.videodb.net/", |
|
| 593 |
+ "safe": "4.0", |
|
| 594 |
+ "vuln": "http://www.exploit-db.com/exploits/17660/", |
|
| 595 |
+ "detection": [ |
|
| 596 |
+ {
|
|
| 597 |
+ "file": "constants.php", |
|
| 598 |
+ "variable": "('VERSION',",
|
|
| 599 |
+ "subdir": 1, |
|
| 600 |
+ "extra_match": "TBL_" |
|
| 601 |
+ } |
|
| 602 |
+ ] |
|
| 603 |
+ }, |
|
| 604 |
+ {
|
|
| 605 |
+ "name": "OpenX", |
|
| 606 |
+ "url": "http://www.openx.com/", |
|
| 607 |
+ "safe": "", |
|
| 608 |
+ "vuln": "http://www.kreativrauschen.com/blog/2013/12/18/zero-day-vulnerability-in-openx-source-2-8-11-and-revive-adserver-3-0-1/", |
|
| 609 |
+ "detection": [ |
|
| 610 |
+ {
|
|
| 611 |
+ "file": "constants.php", |
|
| 612 |
+ "variable": "OA_VERSION", |
|
| 613 |
+ "subdir": 0, |
|
| 614 |
+ "extra_match": "OpenX" |
|
| 615 |
+ } |
|
| 616 |
+ ] |
|
| 617 |
+ }, |
|
| 618 |
+ {
|
|
| 619 |
+ "name": "revive", |
|
| 620 |
+ "url": "http://www.revive-adserver.com/", |
|
| 621 |
+ "safe": "3.0.5", |
|
| 622 |
+ "vuln": "CVE-2013-5954", |
|
| 623 |
+ "detection": [ |
|
| 624 |
+ {
|
|
| 625 |
+ "file": "constants.php", |
|
| 626 |
+ "variable": "VERSION", |
|
| 627 |
+ "subdir": 0, |
|
| 628 |
+ "extra_match": "Revive Adserver" |
|
| 629 |
+ } |
|
| 630 |
+ ] |
|
| 631 |
+ }, |
|
| 632 |
+ {
|
|
| 633 |
+ "name": "osTicket", |
|
| 634 |
+ "url": "http://osticket.com/", |
|
| 635 |
+ "safe": "1.8.12", |
|
| 636 |
+ "vuln": "https://github.com/osTicket/osTicket-1.8/releases/tag/v1.8.12", |
|
| 637 |
+ "latest": "1.9.12", |
|
| 638 |
+ "detection": [ |
|
| 639 |
+ {
|
|
| 640 |
+ "file": "bootstrap.php", |
|
| 641 |
+ "variable": "define('THIS_VERSION',",
|
|
| 642 |
+ "subdir": 0 |
|
| 643 |
+ } |
|
| 644 |
+ ] |
|
| 645 |
+ }, |
|
| 646 |
+ {
|
|
| 647 |
+ "name": "Gitlist", |
|
| 648 |
+ "url": "https://gitlist.org/", |
|
| 649 |
+ "safe": "0.7.0", |
|
| 650 |
+ "vuln": "CVE-2018-1000533", |
|
| 651 |
+ "latest": "1.0.2", |
|
| 652 |
+ "detection": [ |
|
| 653 |
+ {
|
|
| 654 |
+ "file": "footer.twig", |
|
| 655 |
+ "variable": "Powered by", |
|
| 656 |
+ "subdir": 3 |
|
| 657 |
+ } |
|
| 658 |
+ ] |
|
| 659 |
+ } |
|
| 660 |
+] |
|
| 0 | 661 |
\ No newline at end of file |
| ... | ... |
@@ -0,0 +1,17 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "smarty", |
|
| 4 |
+ "url": "https://www.smarty.net/", |
|
| 5 |
+ "safe": "3.1.33", |
|
| 6 |
+ "vuln": "CVE-2018-16831", |
|
| 7 |
+ "latest": "3.1.33", |
|
| 8 |
+ "thirdparty": "yes", |
|
| 9 |
+ "detection": [ |
|
| 10 |
+ {
|
|
| 11 |
+ "file": "Smarty.class.php", |
|
| 12 |
+ "variable": "@version", |
|
| 13 |
+ "subdir": 1 |
|
| 14 |
+ } |
|
| 15 |
+ ] |
|
| 16 |
+ } |
|
| 17 |
+] |
|
| 0 | 18 |
\ No newline at end of file |
| ... | ... |
@@ -1,191 +0,0 @@ |
| 1 |
-[Serendipity-mycalendar] |
|
| 2 |
-url=https://s9y.org |
|
| 3 |
-safe=0.13 |
|
| 4 |
-vuln=CVE-2007-6390 |
|
| 5 |
-file=serendipity_event_mycalendar.php |
|
| 6 |
-variable=$propbag->add('version'
|
|
| 7 |
-subdir=0 |
|
| 8 |
- |
|
| 9 |
-[Serendipity-freetag] |
|
| 10 |
-url=https://s9y.org |
|
| 11 |
-safe=3.69 |
|
| 12 |
-vuln=https://github.com/s9y/additional_plugins/commit/3edecdb7eccc24e0d5c63a3d5702dba54599bda3 |
|
| 13 |
-file=serendipity_event_freetag.php |
|
| 14 |
-variable=$propbag->add('version'
|
|
| 15 |
-subdir=0 |
|
| 16 |
- |
|
| 17 |
-[SquirrelMail-gpg] |
|
| 18 |
-url=https://squirrelmail.org/plugin_view.php?id=153 |
|
| 19 |
-safe=2.1 |
|
| 20 |
-vuln=CVE-2007-3779 |
|
| 21 |
-file=gpg_pref_functions.php |
|
| 22 |
-variable=$GPG_VERSION |
|
| 23 |
-subdir=0 |
|
| 24 |
- |
|
| 25 |
-[Drupal-Views] |
|
| 26 |
-url=https://www.drupal.org/project/views |
|
| 27 |
-safe=2.13 |
|
| 28 |
-vuln=CVE-2011-4113 |
|
| 29 |
-file=views.info |
|
| 30 |
-variable=version = "6.x |
|
| 31 |
-subdir=0 |
|
| 32 |
- |
|
| 33 |
-[Wordpress-timthumb] |
|
| 34 |
-url=https://github.com/GabrielGil/TimThumb |
|
| 35 |
-safe=2.8.14 |
|
| 36 |
-vuln=CVE-2014-4663 |
|
| 37 |
-file=timthumb.php |
|
| 38 |
-variable=('VERSION',
|
|
| 39 |
-extra_match=TimThumb |
|
| 40 |
-subdir=0 |
|
| 41 |
- |
|
| 42 |
-[Wordpress-timthumb-renamed] |
|
| 43 |
-url=https://github.com/GabrielGil/TimThumb |
|
| 44 |
-safe=2.8.14 |
|
| 45 |
-vuln=CVE-2014-4663 |
|
| 46 |
-file=thumb.php |
|
| 47 |
-variable=('VERSION',
|
|
| 48 |
-extra_match=TimThumb |
|
| 49 |
-subdir=0 |
|
| 50 |
- |
|
| 51 |
-[Joomla-JCE] |
|
| 52 |
-url=https://www.joomlacontenteditor.net/ |
|
| 53 |
-safe=2.1 |
|
| 54 |
-vuln=CVE-2012-2902 |
|
| 55 |
-file=editor.php |
|
| 56 |
-variable=$_version |
|
| 57 |
-extra_match=JCE class |
|
| 58 |
-subdir=3 |
|
| 59 |
- |
|
| 60 |
-[WP Super Cache] |
|
| 61 |
-url=https://wordpress.org/plugins/wp-super-cache/ |
|
| 62 |
-safe=1.6.9 |
|
| 63 |
-latest=1.7.0 |
|
| 64 |
-vuln=https://odd.blog/2019/07/25/wp-super-cache-1-6-9-security-update/ |
|
| 65 |
-file=wp-cache.php |
|
| 66 |
-variable=Version: |
|
| 67 |
-extra_match=Plugin Name: WP Super Cache |
|
| 68 |
-subdir=0 |
|
| 69 |
- |
|
| 70 |
-[W3 Total Cache] |
|
| 71 |
-url=https://wordpress.org/plugins/w3-total-cache/ |
|
| 72 |
-safe=0.9.7.4 |
|
| 73 |
-vuln=https://www.cybersecurity-help.cz/vdb/SB2019050701 |
|
| 74 |
-file=w3-total-cache.php |
|
| 75 |
-variable=Version: |
|
| 76 |
-extra_match=Plugin Name: W3 Total Cache |
|
| 77 |
-subdir=0 |
|
| 78 |
- |
|
| 79 |
-[phpThumb] |
|
| 80 |
-url=http://phpthumb.sourceforge.net/ |
|
| 81 |
-safe=1.7.10 |
|
| 82 |
-vuln=CVE-2010-1598 |
|
| 83 |
-file=phpthumb.class.php |
|
| 84 |
-variable=$phpthumb_version |
|
| 85 |
-subdir=0 |
|
| 86 |
- |
|
| 87 |
-[Wordpress-Jetpack] |
|
| 88 |
-url=https://jetpack.com/ |
|
| 89 |
-safe=7.9.1 |
|
| 90 |
-vuln=https://jetpack.com/2019/11/19/jetpack-7-9-1-maintenance-security/ |
|
| 91 |
-file=jetpack.php |
|
| 92 |
-variable=JETPACK__VERSION |
|
| 93 |
-subdir=0 |
|
| 94 |
- |
|
| 95 |
-[Wordpress-MailPoet] |
|
| 96 |
-url=https://www.mailpoet.com/ |
|
| 97 |
-safe=2.6.8 |
|
| 98 |
-vuln=CVE-2014-4726 |
|
| 99 |
-file=base.php |
|
| 100 |
-variable=static $version |
|
| 101 |
-extra_match=WYSIJA_object |
|
| 102 |
-subdir=0 |
|
| 103 |
- |
|
| 104 |
-[Wordpress-CustomContact] |
|
| 105 |
-url=https://wordpress.org/plugins/custom-contact-forms/ |
|
| 106 |
-safe=5.1.0.4 |
|
| 107 |
-vuln=http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html |
|
| 108 |
-file=custom-contact-forms.php |
|
| 109 |
-variable=Version |
|
| 110 |
-subdir=0 |
|
| 111 |
- |
|
| 112 |
-[Wordpress-SliderRevolution] |
|
| 113 |
-url=https://revolution.themepunch.com/ |
|
| 114 |
-# unclear about exact version |
|
| 115 |
-safe=4.2.3 |
|
| 116 |
-vuln=CVE-2015-5151 |
|
| 117 |
-file=revslider.php |
|
| 118 |
-variable=$revSliderVersion |
|
| 119 |
-subdir=0 |
|
| 120 |
- |
|
| 121 |
-[Wordpress-NextGEN] |
|
| 122 |
-url=https://wordpress.org/plugins/nextgen-gallery/ |
|
| 123 |
-safe=3.2.11 |
|
| 124 |
-vuln=CVE-2019-14314 |
|
| 125 |
-file=nggallery.php |
|
| 126 |
-variable=NGG_PLUGIN_VERSION |
|
| 127 |
-subdir=0 |
|
| 128 |
- |
|
| 129 |
-[Wordpress-Akismet] |
|
| 130 |
-url=https://wordpress.org/plugins/akismet/ |
|
| 131 |
-safe=3.1.5 |
|
| 132 |
-vuln=CVE-2015-9357 |
|
| 133 |
-file=akismet.php |
|
| 134 |
-variable=AKISMET_VERSION |
|
| 135 |
-subdir=0 |
|
| 136 |
- |
|
| 137 |
-[Wordpress-AllInOneSEO] |
|
| 138 |
-url=https://semperplugins.com/all-in-one-seo-pack-changelog/ |
|
| 139 |
-safe=3.2.7 |
|
| 140 |
-vuln=CVE-2019-16520 |
|
| 141 |
-file=all_in_one_seo_pack.php |
|
| 142 |
-variable=define( 'AIOSEOP_VERSION' |
|
| 143 |
-subdir=0 |
|
| 144 |
- |
|
| 145 |
-[Wordpress-DownloadManager] |
|
| 146 |
-url=https://wordpress.org/plugins/download-manager/ |
|
| 147 |
-safe=2.7.5 |
|
| 148 |
-vuln=http://blog.sucuri.net/2014/12/security-advisory-high-severity-wordpress-download-manager.html |
|
| 149 |
-file=download-manager.php |
|
| 150 |
-variable=define('WPDM_Version'
|
|
| 151 |
-subdir=0 |
|
| 152 |
- |
|
| 153 |
-[Wordpress-Fancybox] |
|
| 154 |
-url=https://wordpress.org/plugins/fancybox-for-wordpress/ |
|
| 155 |
-safe=3.0.4 |
|
| 156 |
-vuln=CVE-2015-1494 |
|
| 157 |
-file=fancybox.php |
|
| 158 |
-variable=FBFW_VERSION |
|
| 159 |
-subdir=0 |
|
| 160 |
- |
|
| 161 |
-[Joomla-Googlemaps] |
|
| 162 |
-url=http://joomlacode.org/gf/project/mambot_google1/ |
|
| 163 |
-safe=3.1 |
|
| 164 |
-vuln=http://joomlacode.org/gf/project/mambot_google1/news/?id=4119 |
|
| 165 |
-file=plugin_googlemap3.perm |
|
| 166 |
-variable=<version> |
|
| 167 |
-subdir=0 |
|
| 168 |
- |
|
| 169 |
-[Wordpress-SEObyYoast] |
|
| 170 |
-url=https://wordpress.org/plugins/wordpress-seo/ |
|
| 171 |
-safe=11.6.0 |
|
| 172 |
-vuln=CVE-2019-13478 |
|
| 173 |
-file=wp-seo-main.php |
|
| 174 |
-variable=WPSEO_VERSION |
|
| 175 |
-subdir=0 |
|
| 176 |
- |
|
| 177 |
-[Wordpress-GoogleAnalyticsbyMonsterInsights] |
|
| 178 |
-url=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/ |
|
| 179 |
-safe=5.4.5 |
|
| 180 |
-vuln=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/ |
|
| 181 |
-file=googleanalytics.php |
|
| 182 |
-variable=GAWP_VERSION |
|
| 183 |
-subdir=0 |
|
| 184 |
- |
|
| 185 |
-[Wordpress-Captcha] |
|
| 186 |
-url=https://wordpress.org/plugins/captcha/ |
|
| 187 |
-safe=4.4.5 |
|
| 188 |
-vuln=https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/ |
|
| 189 |
-file=captcha.php |
|
| 190 |
-variable=Version: |
|
| 191 |
-subdir=0 |
| ... | ... |
@@ -0,0 +1,309 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "Serendipity-mycalendar", |
|
| 4 |
+ "url": "https://s9y.org", |
|
| 5 |
+ "safe": "0.13", |
|
| 6 |
+ "vuln": "CVE-2007-6390", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "serendipity_event_mycalendar.php", |
|
| 10 |
+ "variable": "$propbag->add('version'",
|
|
| 11 |
+ "subdir": 0 |
|
| 12 |
+ } |
|
| 13 |
+ ] |
|
| 14 |
+ }, |
|
| 15 |
+ {
|
|
| 16 |
+ "name": "Serendipity-freetag", |
|
| 17 |
+ "url": "https://s9y.org", |
|
| 18 |
+ "safe": "3.69", |
|
| 19 |
+ "vuln": "https://github.com/s9y/additional_plugins/commit/3edecdb7eccc24e0d5c63a3d5702dba54599bda3", |
|
| 20 |
+ "detection": [ |
|
| 21 |
+ {
|
|
| 22 |
+ "file": "serendipity_event_freetag.php", |
|
| 23 |
+ "variable": "$propbag->add('version'",
|
|
| 24 |
+ "subdir": 0 |
|
| 25 |
+ } |
|
| 26 |
+ ] |
|
| 27 |
+ }, |
|
| 28 |
+ {
|
|
| 29 |
+ "name": "SquirrelMail-gpg", |
|
| 30 |
+ "url": "https://squirrelmail.org/plugin_view.php?id=153", |
|
| 31 |
+ "safe": "2.1", |
|
| 32 |
+ "vuln": "CVE-2007-3779", |
|
| 33 |
+ "detection": [ |
|
| 34 |
+ {
|
|
| 35 |
+ "file": "gpg_pref_functions.php", |
|
| 36 |
+ "variable": "$GPG_VERSION", |
|
| 37 |
+ "subdir": 0 |
|
| 38 |
+ } |
|
| 39 |
+ ] |
|
| 40 |
+ }, |
|
| 41 |
+ {
|
|
| 42 |
+ "name": "Drupal-Views", |
|
| 43 |
+ "url": "https://www.drupal.org/project/views", |
|
| 44 |
+ "safe": "2.13", |
|
| 45 |
+ "vuln": "CVE-2011-4113", |
|
| 46 |
+ "detection": [ |
|
| 47 |
+ {
|
|
| 48 |
+ "file": "views.info", |
|
| 49 |
+ "variable": "version = \"6.x", |
|
| 50 |
+ "subdir": 0 |
|
| 51 |
+ } |
|
| 52 |
+ ] |
|
| 53 |
+ }, |
|
| 54 |
+ {
|
|
| 55 |
+ "name": "Wordpress-timthumb", |
|
| 56 |
+ "url": "https://github.com/GabrielGil/TimThumb", |
|
| 57 |
+ "safe": "2.8.14", |
|
| 58 |
+ "vuln": "CVE-2014-4663", |
|
| 59 |
+ "detection": [ |
|
| 60 |
+ {
|
|
| 61 |
+ "file": "timthumb.php", |
|
| 62 |
+ "variable": "('VERSION',",
|
|
| 63 |
+ "subdir": 0, |
|
| 64 |
+ "extra_match": "TimThumb" |
|
| 65 |
+ } |
|
| 66 |
+ ] |
|
| 67 |
+ }, |
|
| 68 |
+ {
|
|
| 69 |
+ "name": "Wordpress-timthumb-renamed", |
|
| 70 |
+ "url": "https://github.com/GabrielGil/TimThumb", |
|
| 71 |
+ "safe": "2.8.14", |
|
| 72 |
+ "vuln": "CVE-2014-4663", |
|
| 73 |
+ "detection": [ |
|
| 74 |
+ {
|
|
| 75 |
+ "file": "thumb.php", |
|
| 76 |
+ "variable": "('VERSION',",
|
|
| 77 |
+ "subdir": 0, |
|
| 78 |
+ "extra_match": "TimThumb" |
|
| 79 |
+ } |
|
| 80 |
+ ] |
|
| 81 |
+ }, |
|
| 82 |
+ {
|
|
| 83 |
+ "name": "Joomla-JCE", |
|
| 84 |
+ "url": "https://www.joomlacontenteditor.net/", |
|
| 85 |
+ "safe": "2.1", |
|
| 86 |
+ "vuln": "CVE-2012-2902", |
|
| 87 |
+ "detection": [ |
|
| 88 |
+ {
|
|
| 89 |
+ "file": "editor.php", |
|
| 90 |
+ "variable": "$_version", |
|
| 91 |
+ "subdir": 3, |
|
| 92 |
+ "extra_match": "JCE class" |
|
| 93 |
+ } |
|
| 94 |
+ ] |
|
| 95 |
+ }, |
|
| 96 |
+ {
|
|
| 97 |
+ "name": "WP Super Cache", |
|
| 98 |
+ "url": "https://wordpress.org/plugins/wp-super-cache/", |
|
| 99 |
+ "safe": "1.6.9", |
|
| 100 |
+ "vuln": "https://odd.blog/2019/07/25/wp-super-cache-1-6-9-security-update/", |
|
| 101 |
+ "latest": "1.7.0", |
|
| 102 |
+ "detection": [ |
|
| 103 |
+ {
|
|
| 104 |
+ "file": "wp-cache.php", |
|
| 105 |
+ "variable": "Version:", |
|
| 106 |
+ "subdir": 0, |
|
| 107 |
+ "extra_match": "Plugin Name: WP Super Cache" |
|
| 108 |
+ } |
|
| 109 |
+ ] |
|
| 110 |
+ }, |
|
| 111 |
+ {
|
|
| 112 |
+ "name": "W3 Total Cache", |
|
| 113 |
+ "url": "https://wordpress.org/plugins/w3-total-cache/", |
|
| 114 |
+ "safe": "0.9.7.4", |
|
| 115 |
+ "vuln": "https://www.cybersecurity-help.cz/vdb/SB2019050701", |
|
| 116 |
+ "detection": [ |
|
| 117 |
+ {
|
|
| 118 |
+ "file": "w3-total-cache.php", |
|
| 119 |
+ "variable": "Version:", |
|
| 120 |
+ "subdir": 0, |
|
| 121 |
+ "extra_match": "Plugin Name: W3 Total Cache" |
|
| 122 |
+ } |
|
| 123 |
+ ] |
|
| 124 |
+ }, |
|
| 125 |
+ {
|
|
| 126 |
+ "name": "phpThumb", |
|
| 127 |
+ "url": "http://phpthumb.sourceforge.net/", |
|
| 128 |
+ "safe": "1.7.10", |
|
| 129 |
+ "vuln": "CVE-2010-1598", |
|
| 130 |
+ "detection": [ |
|
| 131 |
+ {
|
|
| 132 |
+ "file": "phpthumb.class.php", |
|
| 133 |
+ "variable": "$phpthumb_version", |
|
| 134 |
+ "subdir": 0 |
|
| 135 |
+ } |
|
| 136 |
+ ] |
|
| 137 |
+ }, |
|
| 138 |
+ {
|
|
| 139 |
+ "name": "Wordpress-Jetpack", |
|
| 140 |
+ "url": "https://jetpack.com/", |
|
| 141 |
+ "safe": "7.9.1", |
|
| 142 |
+ "vuln": "https://jetpack.com/2019/11/19/jetpack-7-9-1-maintenance-security/", |
|
| 143 |
+ "detection": [ |
|
| 144 |
+ {
|
|
| 145 |
+ "file": "jetpack.php", |
|
| 146 |
+ "variable": "JETPACK__VERSION", |
|
| 147 |
+ "subdir": 0 |
|
| 148 |
+ } |
|
| 149 |
+ ] |
|
| 150 |
+ }, |
|
| 151 |
+ {
|
|
| 152 |
+ "name": "Wordpress-MailPoet", |
|
| 153 |
+ "url": "https://www.mailpoet.com/", |
|
| 154 |
+ "safe": "2.6.8", |
|
| 155 |
+ "vuln": "CVE-2014-4726", |
|
| 156 |
+ "detection": [ |
|
| 157 |
+ {
|
|
| 158 |
+ "file": "base.php", |
|
| 159 |
+ "variable": "static $version", |
|
| 160 |
+ "subdir": 0, |
|
| 161 |
+ "extra_match": "WYSIJA_object" |
|
| 162 |
+ } |
|
| 163 |
+ ] |
|
| 164 |
+ }, |
|
| 165 |
+ {
|
|
| 166 |
+ "name": "Wordpress-CustomContact", |
|
| 167 |
+ "url": "https://wordpress.org/plugins/custom-contact-forms/", |
|
| 168 |
+ "safe": "5.1.0.4", |
|
| 169 |
+ "vuln": "http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html", |
|
| 170 |
+ "detection": [ |
|
| 171 |
+ {
|
|
| 172 |
+ "file": "custom-contact-forms.php", |
|
| 173 |
+ "variable": "Version", |
|
| 174 |
+ "subdir": 0 |
|
| 175 |
+ } |
|
| 176 |
+ ] |
|
| 177 |
+ }, |
|
| 178 |
+ {
|
|
| 179 |
+ "name": "Wordpress-SliderRevolution", |
|
| 180 |
+ "url": "https://revolution.themepunch.com/", |
|
| 181 |
+ "safe": "4.2.3", |
|
| 182 |
+ "vuln": "CVE-2015-5151", |
|
| 183 |
+ "note": "unclear about exact version", |
|
| 184 |
+ "detection": [ |
|
| 185 |
+ {
|
|
| 186 |
+ "file": "revslider.php", |
|
| 187 |
+ "variable": "$revSliderVersion", |
|
| 188 |
+ "subdir": 0 |
|
| 189 |
+ } |
|
| 190 |
+ ] |
|
| 191 |
+ }, |
|
| 192 |
+ {
|
|
| 193 |
+ "name": "Wordpress-NextGEN", |
|
| 194 |
+ "url": "https://wordpress.org/plugins/nextgen-gallery/", |
|
| 195 |
+ "safe": "3.2.11", |
|
| 196 |
+ "vuln": "CVE-2019-14314", |
|
| 197 |
+ "detection": [ |
|
| 198 |
+ {
|
|
| 199 |
+ "file": "nggallery.php", |
|
| 200 |
+ "variable": "NGG_PLUGIN_VERSION", |
|
| 201 |
+ "subdir": 0 |
|
| 202 |
+ } |
|
| 203 |
+ ] |
|
| 204 |
+ }, |
|
| 205 |
+ {
|
|
| 206 |
+ "name": "Wordpress-Akismet", |
|
| 207 |
+ "url": "https://wordpress.org/plugins/akismet/", |
|
| 208 |
+ "safe": "3.1.5", |
|
| 209 |
+ "vuln": "CVE-2015-9357", |
|
| 210 |
+ "detection": [ |
|
| 211 |
+ {
|
|
| 212 |
+ "file": "akismet.php", |
|
| 213 |
+ "variable": "AKISMET_VERSION", |
|
| 214 |
+ "subdir": 0 |
|
| 215 |
+ } |
|
| 216 |
+ ] |
|
| 217 |
+ }, |
|
| 218 |
+ {
|
|
| 219 |
+ "name": "Wordpress-AllInOneSEO", |
|
| 220 |
+ "url": "https://semperplugins.com/all-in-one-seo-pack-changelog/", |
|
| 221 |
+ "safe": "3.2.7", |
|
| 222 |
+ "vuln": "CVE-2019-16520", |
|
| 223 |
+ "detection": [ |
|
| 224 |
+ {
|
|
| 225 |
+ "file": "all_in_one_seo_pack.php", |
|
| 226 |
+ "variable": "define( 'AIOSEOP_VERSION'", |
|
| 227 |
+ "subdir": 0 |
|
| 228 |
+ } |
|
| 229 |
+ ] |
|
| 230 |
+ }, |
|
| 231 |
+ {
|
|
| 232 |
+ "name": "Wordpress-DownloadManager", |
|
| 233 |
+ "url": "https://wordpress.org/plugins/download-manager/", |
|
| 234 |
+ "safe": "2.7.5", |
|
| 235 |
+ "vuln": "http://blog.sucuri.net/2014/12/security-advisory-high-severity-wordpress-download-manager.html", |
|
| 236 |
+ "detection": [ |
|
| 237 |
+ {
|
|
| 238 |
+ "file": "download-manager.php", |
|
| 239 |
+ "variable": "define('WPDM_Version'",
|
|
| 240 |
+ "subdir": 0 |
|
| 241 |
+ } |
|
| 242 |
+ ] |
|
| 243 |
+ }, |
|
| 244 |
+ {
|
|
| 245 |
+ "name": "Wordpress-Fancybox", |
|
| 246 |
+ "url": "https://wordpress.org/plugins/fancybox-for-wordpress/", |
|
| 247 |
+ "safe": "3.0.4", |
|
| 248 |
+ "vuln": "CVE-2015-1494", |
|
| 249 |
+ "detection": [ |
|
| 250 |
+ {
|
|
| 251 |
+ "file": "fancybox.php", |
|
| 252 |
+ "variable": "FBFW_VERSION", |
|
| 253 |
+ "subdir": 0 |
|
| 254 |
+ } |
|
| 255 |
+ ] |
|
| 256 |
+ }, |
|
| 257 |
+ {
|
|
| 258 |
+ "name": "Joomla-Googlemaps", |
|
| 259 |
+ "url": "http://joomlacode.org/gf/project/mambot_google1/", |
|
| 260 |
+ "safe": "3.1", |
|
| 261 |
+ "vuln": "http://joomlacode.org/gf/project/mambot_google1/news/?id=4119", |
|
| 262 |
+ "detection": [ |
|
| 263 |
+ {
|
|
| 264 |
+ "file": "plugin_googlemap3.perm", |
|
| 265 |
+ "variable": "<version>", |
|
| 266 |
+ "subdir": 0 |
|
| 267 |
+ } |
|
| 268 |
+ ] |
|
| 269 |
+ }, |
|
| 270 |
+ {
|
|
| 271 |
+ "name": "Wordpress-SEObyYoast", |
|
| 272 |
+ "url": "https://wordpress.org/plugins/wordpress-seo/", |
|
| 273 |
+ "safe": "11.6.0", |
|
| 274 |
+ "vuln": "CVE-2019-13478", |
|
| 275 |
+ "detection": [ |
|
| 276 |
+ {
|
|
| 277 |
+ "file": "wp-seo-main.php", |
|
| 278 |
+ "variable": "WPSEO_VERSION", |
|
| 279 |
+ "subdir": 0 |
|
| 280 |
+ } |
|
| 281 |
+ ] |
|
| 282 |
+ }, |
|
| 283 |
+ {
|
|
| 284 |
+ "name": "Wordpress-GoogleAnalyticsbyMonsterInsights", |
|
| 285 |
+ "url": "https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/", |
|
| 286 |
+ "safe": "5.4.5", |
|
| 287 |
+ "vuln": "https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/", |
|
| 288 |
+ "detection": [ |
|
| 289 |
+ {
|
|
| 290 |
+ "file": "googleanalytics.php", |
|
| 291 |
+ "variable": "GAWP_VERSION", |
|
| 292 |
+ "subdir": 0 |
|
| 293 |
+ } |
|
| 294 |
+ ] |
|
| 295 |
+ }, |
|
| 296 |
+ {
|
|
| 297 |
+ "name": "Wordpress-Captcha", |
|
| 298 |
+ "url": "https://wordpress.org/plugins/captcha/", |
|
| 299 |
+ "safe": "4.4.5", |
|
| 300 |
+ "vuln": "https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/", |
|
| 301 |
+ "detection": [ |
|
| 302 |
+ {
|
|
| 303 |
+ "file": "captcha.php", |
|
| 304 |
+ "variable": "Version:", |
|
| 305 |
+ "subdir": 0 |
|
| 306 |
+ } |
|
| 307 |
+ ] |
|
| 308 |
+ } |
|
| 309 |
+] |
|
| 0 | 310 |
\ No newline at end of file |
| ... | ... |
@@ -0,0 +1,16 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "Wordpress-Theme-Twentyfifteen", |
|
| 4 |
+ "url": "http://www.wordpress.org", |
|
| 5 |
+ "safe": "1.2", |
|
| 6 |
+ "vuln": "https://blog.sucuri.net/2015/05/jetpack-and-twentyfifteen-vulnerable-to-dom-based-xss.html", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "style.css", |
|
| 10 |
+ "variable": "Version:", |
|
| 11 |
+ "subdir": 0, |
|
| 12 |
+ "extra_match": "Theme Name: Twenty Fifteen" |
|
| 13 |
+ } |
|
| 14 |
+ ] |
|
| 15 |
+ } |
|
| 16 |
+] |
|
| 0 | 17 |
\ No newline at end of file |
| ... | ... |
@@ -1,33 +0,0 @@ |
| 1 |
-[FreeWebshop] |
|
| 2 |
-url=http://www.freewebshop.org/ |
|
| 3 |
-safe=2.2.7 |
|
| 4 |
-vuln=CVE-2007-6711 |
|
| 5 |
-file=subs.inc.php |
|
| 6 |
-variable=$version |
|
| 7 |
-subdir=1 |
|
| 8 |
- |
|
| 9 |
-[Magento-old] |
|
| 10 |
-url=http://www.magentocommerce.com/ |
|
| 11 |
-safe=1.9.2.2 |
|
| 12 |
-vuln=CVE-2015-5161 |
|
| 13 |
-file=Mage.php |
|
| 14 |
-variable=return ' |
|
| 15 |
-subdir=1 |
|
| 16 |
- |
|
| 17 |
-[Magento] |
|
| 18 |
-url=http://www.magentocommerce.com/ |
|
| 19 |
-safe=1.9.2.2 |
|
| 20 |
-vuln=CVE-2015-5161 |
|
| 21 |
-# This does not reliably give correct version numbers, |
|
| 22 |
-# but it works for the latest versions |
|
| 23 |
-file=RELEASE_NOTES.txt |
|
| 24 |
-variable===== |
|
| 25 |
-subdir=0 |
|
| 26 |
- |
|
| 27 |
-[zencart] |
|
| 28 |
-url=http://www.zen-cart.com/ |
|
| 29 |
-safe=1.3.9 |
|
| 30 |
-vuln=CVE-2009-2254 |
|
| 31 |
-file=paypaldp.php |
|
| 32 |
-variable=$this->codeVersion |
|
| 33 |
-subdir=3 |
| ... | ... |
@@ -0,0 +1,55 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "FreeWebshop", |
|
| 4 |
+ "url": "http://www.freewebshop.org/", |
|
| 5 |
+ "safe": "2.2.7", |
|
| 6 |
+ "vuln": "CVE-2007-6711", |
|
| 7 |
+ "detection": [ |
|
| 8 |
+ {
|
|
| 9 |
+ "file": "subs.inc.php", |
|
| 10 |
+ "variable": "$version", |
|
| 11 |
+ "subdir": 1 |
|
| 12 |
+ } |
|
| 13 |
+ ] |
|
| 14 |
+ }, |
|
| 15 |
+ {
|
|
| 16 |
+ "name": "Magento-old", |
|
| 17 |
+ "url": "http://www.magentocommerce.com/", |
|
| 18 |
+ "safe": "1.9.2.2", |
|
| 19 |
+ "vuln": "CVE-2015-5161", |
|
| 20 |
+ "detection": [ |
|
| 21 |
+ {
|
|
| 22 |
+ "file": "Mage.php", |
|
| 23 |
+ "variable": "return '", |
|
| 24 |
+ "subdir": 1 |
|
| 25 |
+ } |
|
| 26 |
+ ] |
|
| 27 |
+ }, |
|
| 28 |
+ {
|
|
| 29 |
+ "name": "Magento", |
|
| 30 |
+ "url": "http://www.magentocommerce.com/", |
|
| 31 |
+ "safe": "1.9.2.2", |
|
| 32 |
+ "vuln": "CVE-2015-5161", |
|
| 33 |
+ "note": "This does not reliably give correct version numbers, but it works for the latest versions", |
|
| 34 |
+ "detection": [ |
|
| 35 |
+ {
|
|
| 36 |
+ "file": "RELEASE_NOTES.txt", |
|
| 37 |
+ "variable": "====", |
|
| 38 |
+ "subdir": 0 |
|
| 39 |
+ } |
|
| 40 |
+ ] |
|
| 41 |
+ }, |
|
| 42 |
+ {
|
|
| 43 |
+ "name": "zencart", |
|
| 44 |
+ "url": "http://www.zen-cart.com/", |
|
| 45 |
+ "safe": "1.3.9", |
|
| 46 |
+ "vuln": "CVE-2009-2254", |
|
| 47 |
+ "detection": [ |
|
| 48 |
+ {
|
|
| 49 |
+ "file": "paypaldp.php", |
|
| 50 |
+ "variable": "$this->codeVersion", |
|
| 51 |
+ "subdir": 3 |
|
| 52 |
+ } |
|
| 53 |
+ ] |
|
| 54 |
+ } |
|
| 55 |
+] |
|
| 0 | 56 |
\ No newline at end of file |
| ... | ... |
@@ -1,71 +0,0 @@ |
| 1 |
-[MediaWiki] |
|
| 2 |
-url=https://www.mediawiki.org/ |
|
| 3 |
-safe=1.33.1 |
|
| 4 |
-old_safe=1.32.4,1.31.4 |
|
| 5 |
-latest=1.33.1 |
|
| 6 |
-vuln=CVE-2019-16738 |
|
| 7 |
-file=DefaultSettings.php |
|
| 8 |
-variable=$wgVersion |
|
| 9 |
-subdir=1 |
|
| 10 |
- |
|
| 11 |
-[TWiki] |
|
| 12 |
-url=http://twiki.org/ |
|
| 13 |
-safe=5.0.1 |
|
| 14 |
-vuln=CVE-2010-3841 |
|
| 15 |
-file=TWiki.pm |
|
| 16 |
-variable=$RELEASE |
|
| 17 |
-subdir=1 |
|
| 18 |
- |
|
| 19 |
-[PmWiki] |
|
| 20 |
-url=https://pmwiki.org/ |
|
| 21 |
-safe=2.2.96 |
|
| 22 |
-latest=2.2.122 |
|
| 23 |
-vuln=https://pmwiki.org/wiki/PmWiki/ChangeLog#v2296 |
|
| 24 |
-file=version.php |
|
| 25 |
-variable=$Version |
|
| 26 |
-extra_match=pmwiki |
|
| 27 |
-subdir=1 |
|
| 28 |
- |
|
| 29 |
-[TikiWiki] |
|
| 30 |
-url=http://tikiwiki.org/ |
|
| 31 |
-safe=5.3 |
|
| 32 |
-old_safe=3.8 |
|
| 33 |
-vuln=CVE-2010-4239 |
|
| 34 |
-file=twversion.class.php |
|
| 35 |
-variable=$this->version |
|
| 36 |
-subdir=2 |
|
| 37 |
- |
|
| 38 |
-[TikiWiki-old] |
|
| 39 |
-url=http://tikiwiki.org/ |
|
| 40 |
-safe=5.3 |
|
| 41 |
-old_safe=3.8 |
|
| 42 |
-vuln=CVE-2010-4239 |
|
| 43 |
-file=README |
|
| 44 |
-variable=version |
|
| 45 |
-extra_match=Tiki! The wiki |
|
| 46 |
-subdir=0 |
|
| 47 |
- |
|
| 48 |
-[phpwiki] |
|
| 49 |
-url=http://phpwiki.sourceforge.net/ |
|
| 50 |
-safe=1.3.14 |
|
| 51 |
-vuln=CVE-2007-3193 |
|
| 52 |
-file=prepend.php |
|
| 53 |
-variable=PHPWIKI_VERSION |
|
| 54 |
-subdir=1 |
|
| 55 |
- |
|
| 56 |
-[phpwiki-legacy] |
|
| 57 |
-url=http://phpwiki.sourceforge.net/ |
|
| 58 |
-safe=1.3.14 |
|
| 59 |
-vuln=CVE-2007-3193 |
|
| 60 |
-file=config.php |
|
| 61 |
-variable=PHPWIKI_VERSION |
|
| 62 |
-subdir=1 |
|
| 63 |
- |
|
| 64 |
-[etherpad-lite] |
|
| 65 |
-url=https://etherpad.org/ |
|
| 66 |
-safe=1.6.4 |
|
| 67 |
-vuln=CVE-2018-9326 |
|
| 68 |
-file=package.json |
|
| 69 |
-variable=version |
|
| 70 |
-extra_match=ep_etherpad-lite |
|
| 71 |
-subdir=0 |
| ... | ... |
@@ -0,0 +1,114 @@ |
| 1 |
+[ |
|
| 2 |
+ {
|
|
| 3 |
+ "name": "MediaWiki", |
|
| 4 |
+ "url": "https://www.mediawiki.org/", |
|
| 5 |
+ "safe": "1.33.1", |
|
| 6 |
+ "old_safe": "1.32.4,1.31.4", |
|
| 7 |
+ "vuln": "CVE-2019-16738", |
|
| 8 |
+ "latest": "1.33.1", |
|
| 9 |
+ "detection": [ |
|
| 10 |
+ {
|
|
| 11 |
+ "file": "DefaultSettings.php", |
|
| 12 |
+ "variable": "$wgVersion", |
|
| 13 |
+ "subdir": 1 |
|
| 14 |
+ } |
|
| 15 |
+ ] |
|
| 16 |
+ }, |
|
| 17 |
+ {
|
|
| 18 |
+ "name": "TWiki", |
|
| 19 |
+ "url": "http://twiki.org/", |
|
| 20 |
+ "safe": "5.0.1", |
|
| 21 |
+ "vuln": "CVE-2010-3841", |
|
| 22 |
+ "detection": [ |
|
| 23 |
+ {
|
|
| 24 |
+ "file": "TWiki.pm", |
|
| 25 |
+ "variable": "$RELEASE", |
|
| 26 |
+ "subdir": 1 |
|
| 27 |
+ } |
|
| 28 |
+ ] |
|
| 29 |
+ }, |
|
| 30 |
+ {
|
|
| 31 |
+ "name": "PmWiki", |
|
| 32 |
+ "url": "https://pmwiki.org/", |
|
| 33 |
+ "safe": "2.2.96", |
|
| 34 |
+ "vuln": "https://pmwiki.org/wiki/PmWiki/ChangeLog#v2296", |
|
| 35 |
+ "latest": "2.2.122", |
|
| 36 |
+ "detection": [ |
|
| 37 |
+ {
|
|
| 38 |
+ "file": "version.php", |
|
| 39 |
+ "variable": "$Version", |
|
| 40 |
+ "subdir": 1, |
|
| 41 |
+ "extra_match": "pmwiki" |
|
| 42 |
+ } |
|
| 43 |
+ ] |
|
| 44 |
+ }, |
|
| 45 |
+ {
|
|
| 46 |
+ "name": "TikiWiki", |
|
| 47 |
+ "url": "http://tikiwiki.org/", |
|
| 48 |
+ "safe": "5.3", |
|
| 49 |
+ "old_safe": "3.8", |
|
| 50 |
+ "vuln": "CVE-2010-4239", |
|
| 51 |
+ "detection": [ |
|
| 52 |
+ {
|
|
| 53 |
+ "file": "twversion.class.php", |
|
| 54 |
+ "variable": "$this->version", |
|
| 55 |
+ "subdir": 2 |
|
| 56 |
+ } |
|
| 57 |
+ ] |
|
| 58 |
+ }, |
|
| 59 |
+ {
|
|
| 60 |
+ "name": "TikiWiki-old", |
|
| 61 |
+ "url": "http://tikiwiki.org/", |
|
| 62 |
+ "safe": "5.3", |
|
| 63 |
+ "old_safe": "3.8", |
|
| 64 |
+ "vuln": "CVE-2010-4239", |
|
| 65 |
+ "detection": [ |
|
| 66 |
+ {
|
|
| 67 |
+ "file": "README", |
|
| 68 |
+ "variable": "version", |
|
| 69 |
+ "subdir": 0, |
|
| 70 |
+ "extra_match": "Tiki! The wiki" |
|
| 71 |
+ } |
|
| 72 |
+ ] |
|
| 73 |
+ }, |
|
| 74 |
+ {
|
|
| 75 |
+ "name": "phpwiki", |
|
| 76 |
+ "url": "http://phpwiki.sourceforge.net/", |
|
| 77 |
+ "safe": "1.3.14", |
|
| 78 |
+ "vuln": "CVE-2007-3193", |
|
| 79 |
+ "detection": [ |
|
| 80 |
+ {
|
|
| 81 |
+ "file": "prepend.php", |
|
| 82 |
+ "variable": "PHPWIKI_VERSION", |
|
| 83 |
+ "subdir": 1 |
|
| 84 |
+ } |
|
| 85 |
+ ] |
|
| 86 |
+ }, |
|
| 87 |
+ {
|
|
| 88 |
+ "name": "phpwiki-legacy", |
|
| 89 |
+ "url": "http://phpwiki.sourceforge.net/", |
|
| 90 |
+ "safe": "1.3.14", |
|
| 91 |
+ "vuln": "CVE-2007-3193", |
|
| 92 |
+ "detection": [ |
|
| 93 |
+ {
|
|
| 94 |
+ "file": "config.php", |
|
| 95 |
+ "variable": "PHPWIKI_VERSION", |
|
| 96 |
+ "subdir": 1 |
|
| 97 |
+ } |
|
| 98 |
+ ] |
|
| 99 |
+ }, |
|
| 100 |
+ {
|
|
| 101 |
+ "name": "etherpad-lite", |
|
| 102 |
+ "url": "https://etherpad.org/", |
|
| 103 |
+ "safe": "1.6.4", |
|
| 104 |
+ "vuln": "CVE-2018-9326", |
|
| 105 |
+ "detection": [ |
|
| 106 |
+ {
|
|
| 107 |
+ "file": "package.json", |
|
| 108 |
+ "variable": "version", |
|
| 109 |
+ "subdir": 0, |
|
| 110 |
+ "extra_match": "ep_etherpad-lite" |
|
| 111 |
+ } |
|
| 112 |
+ ] |
|
| 113 |
+ } |
|
| 114 |
+] |
|
| 0 | 115 |
\ No newline at end of file |
| 1 | 116 |