Hanno Böck commited on 2019-12-11 18:39:41
Zeige 32 geänderte Dateien mit 2186 Einfügungen und 1362 Löschungen.
... | ... |
@@ -1,132 +0,0 @@ |
1 |
-[phpBB] |
|
2 |
-url=https://www.phpbb.com |
|
3 |
-safe=3.2.8 |
|
4 |
-vuln=CVE-2019-16108 |
|
5 |
-file=CHANGELOG.html |
|
6 |
-variable=Changes since |
|
7 |
-add_minor=1 |
|
8 |
-subdir=1 |
|
9 |
- |
|
10 |
-[DeluxeBB] |
|
11 |
-url=http://www.deluxebb.com/ |
|
12 |
-safe= |
|
13 |
-vuln=CVE-2010-4151 |
|
14 |
-file=header.php |
|
15 |
-variable=$versionname |
|
16 |
-subdir=0 |
|
17 |
-extra_match=DeluxeBB |
|
18 |
- |
|
19 |
-[PunBB] |
|
20 |
-url=http://punbb.org/ |
|
21 |
-safe=1.4.1 |
|
22 |
-vuln=https://secunia.com/advisories/46864 |
|
23 |
-file=db_update.php |
|
24 |
-variable=UPDATE_TO |
|
25 |
-extra_match=@package PunBB |
|
26 |
-subdir=0 |
|
27 |
- |
|
28 |
-[PunBB12] |
|
29 |
-url=http://punbb.org/ |
|
30 |
-safe=1.4.1 |
|
31 |
-vuln=https://secunia.com/advisories/46864 |
|
32 |
-file=install.php |
|
33 |
-variable=$punbb_version |
|
34 |
-subdir=0 |
|
35 |
- |
|
36 |
-[UseBB] |
|
37 |
-url=http://www.usebb.net/ |
|
38 |
-safe=1.0.12 |
|
39 |
-latest=1.0.16 |
|
40 |
-vuln=CVE-2011-3611 |
|
41 |
-file=common.php |
|
42 |
-variable=USEBB_VERSION |
|
43 |
-subdir=1 |
|
44 |
- |
|
45 |
-[Vanilla] |
|
46 |
-url=http://vanillaforums.com/ |
|
47 |
-safe=2.1.3 |
|
48 |
-vuln=http://vanillaforums.org/discussion/27822/vanilla-2-1-3-security-release |
|
49 |
-file=version.php |
|
50 |
-variable=APPLICATION_VERSION |
|
51 |
-subdir=1 |
|
52 |
-extra_match=define('APPLICATION', 'Vanilla'); |
|
53 |
- |
|
54 |
-[Vanilla2] |
|
55 |
-url=http://vanillaforums.com/ |
|
56 |
-safe=2.1.3 |
|
57 |
-vuln=http://vanillaforums.org/discussion/27822/vanilla-2-1-3-security-release |
|
58 |
-file=index.php |
|
59 |
-variable=APPLICATION_VERSION |
|
60 |
-subdir=0 |
|
61 |
-extra_match=define('APPLICATION', 'Vanilla'); |
|
62 |
- |
|
63 |
-[Simple_Machines_Forum] |
|
64 |
-url=http://www.simplemachines.org/ |
|
65 |
-safe=2.0.5 |
|
66 |
-old_safe=1.1.16 |
|
67 |
-vuln=http://www.simplemachines.org/community/index.php?topic=509417.0 |
|
68 |
-file=index.php |
|
69 |
-variable=$forum_version |
|
70 |
-subdir=0 |
|
71 |
-extra_match=Simple Machines Forum |
|
72 |
- |
|
73 |
-[MyBB] |
|
74 |
-url=http://www.mybboard.net/ |
|
75 |
-safe=1.8.3 |
|
76 |
-old_safe=1.6.16 |
|
77 |
-vuln=http://blog.mybb.com/2014/11/20/mybb-1-8-3-1-6-16-released-security-releases/ |
|
78 |
-file=class_core.php |
|
79 |
-variable=$version |
|
80 |
-subdir=1 |
|
81 |
- |
|
82 |
-[Phorum] |
|
83 |
-url=http://www.phorum.org/ |
|
84 |
-safe=5.2.19 |
|
85 |
-latest=5.2.19 |
|
86 |
-vuln=http://www.phorum.org/phorum5/read.php?64,151943 |
|
87 |
-file=common.php |
|
88 |
-variable=define( "PHORUM" |
|
89 |
-subdir=0 |
|
90 |
- |
|
91 |
-[wBB] |
|
92 |
-url=http://www.woltlab.com/ |
|
93 |
-safe=3.0.9 |
|
94 |
-vuln=http://www.securityfocus.com/archive/1/503867/30/60/threaded |
|
95 |
-file=config.inc.php |
|
96 |
-variable=define('PACKAGE_VERSION', |
|
97 |
-subdir=0 |
|
98 |
- |
|
99 |
-[WBBLite] |
|
100 |
-url=http://wbblite.com/ |
|
101 |
-safe=2.1 |
|
102 |
-vuln=http://www.securityfocus.com/archive/1/503867/30/60/threaded |
|
103 |
-file=package.xml |
|
104 |
-variable=<version> |
|
105 |
-extra_match=<packagename>WoltLab Burning Board Lite</packagename> |
|
106 |
-subdir=0 |
|
107 |
- |
|
108 |
-[FluxBB12] |
|
109 |
-url=https://fluxbb.org/ |
|
110 |
-safe=1.5.11 |
|
111 |
-vuln=https://fluxbb.org/forums/viewtopic.php?id=9472 |
|
112 |
-file=install.php |
|
113 |
-variable=$fluxbb_version |
|
114 |
-subdir=1 |
|
115 |
- |
|
116 |
-[FluxBB] |
|
117 |
-url=https://fluxbb.org/ |
|
118 |
-safe=1.5.11 |
|
119 |
-vuln=https://fluxbb.org/forums/viewtopic.php?id=9472 |
|
120 |
-file=common.php |
|
121 |
-variable=FORUM_VERSION |
|
122 |
-extra_match=FORUM_DB_REVISION |
|
123 |
-subdir=1 |
|
124 |
- |
|
125 |
-[vBulletin] |
|
126 |
-url=https://www.vbulletin.com/ |
|
127 |
-safe=4.2.2 |
|
128 |
-vuln=CVE-2013-6129 |
|
129 |
-file=class_core.php |
|
130 |
-variable=define('FILE_VERSION' |
|
131 |
-subdir=1 |
|
132 |
-extra_match=vBulletin |
... | ... |
@@ -0,0 +1,210 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "phpBB", |
|
4 |
+ "url": "https://www.phpbb.com", |
|
5 |
+ "safe": "3.2.8", |
|
6 |
+ "vuln": "CVE-2019-16108", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "CHANGELOG.html", |
|
10 |
+ "variable": "Changes since", |
|
11 |
+ "subdir": 1, |
|
12 |
+ "add_minor": "1" |
|
13 |
+ } |
|
14 |
+ ] |
|
15 |
+ }, |
|
16 |
+ { |
|
17 |
+ "name": "DeluxeBB", |
|
18 |
+ "url": "http://www.deluxebb.com/", |
|
19 |
+ "safe": "", |
|
20 |
+ "vuln": "CVE-2010-4151", |
|
21 |
+ "detection": [ |
|
22 |
+ { |
|
23 |
+ "file": "header.php", |
|
24 |
+ "variable": "$versionname", |
|
25 |
+ "subdir": 0, |
|
26 |
+ "extra_match": "DeluxeBB" |
|
27 |
+ } |
|
28 |
+ ] |
|
29 |
+ }, |
|
30 |
+ { |
|
31 |
+ "name": "PunBB", |
|
32 |
+ "url": "http://punbb.org/", |
|
33 |
+ "safe": "1.4.1", |
|
34 |
+ "vuln": "https://secunia.com/advisories/46864", |
|
35 |
+ "detection": [ |
|
36 |
+ { |
|
37 |
+ "file": "db_update.php", |
|
38 |
+ "variable": "UPDATE_TO", |
|
39 |
+ "subdir": 0, |
|
40 |
+ "extra_match": "@package PunBB" |
|
41 |
+ } |
|
42 |
+ ] |
|
43 |
+ }, |
|
44 |
+ { |
|
45 |
+ "name": "PunBB12", |
|
46 |
+ "url": "http://punbb.org/", |
|
47 |
+ "safe": "1.4.1", |
|
48 |
+ "vuln": "https://secunia.com/advisories/46864", |
|
49 |
+ "detection": [ |
|
50 |
+ { |
|
51 |
+ "file": "install.php", |
|
52 |
+ "variable": "$punbb_version", |
|
53 |
+ "subdir": 0 |
|
54 |
+ } |
|
55 |
+ ] |
|
56 |
+ }, |
|
57 |
+ { |
|
58 |
+ "name": "UseBB", |
|
59 |
+ "url": "http://www.usebb.net/", |
|
60 |
+ "safe": "1.0.12", |
|
61 |
+ "vuln": "CVE-2011-3611", |
|
62 |
+ "latest": "1.0.16", |
|
63 |
+ "detection": [ |
|
64 |
+ { |
|
65 |
+ "file": "common.php", |
|
66 |
+ "variable": "USEBB_VERSION", |
|
67 |
+ "subdir": 1 |
|
68 |
+ } |
|
69 |
+ ] |
|
70 |
+ }, |
|
71 |
+ { |
|
72 |
+ "name": "Vanilla", |
|
73 |
+ "url": "http://vanillaforums.com/", |
|
74 |
+ "safe": "2.1.3", |
|
75 |
+ "vuln": "http://vanillaforums.org/discussion/27822/vanilla-2-1-3-security-release", |
|
76 |
+ "detection": [ |
|
77 |
+ { |
|
78 |
+ "file": "version.php", |
|
79 |
+ "variable": "APPLICATION_VERSION", |
|
80 |
+ "subdir": 1, |
|
81 |
+ "extra_match": "define('APPLICATION', 'Vanilla');" |
|
82 |
+ } |
|
83 |
+ ] |
|
84 |
+ }, |
|
85 |
+ { |
|
86 |
+ "name": "Vanilla2", |
|
87 |
+ "url": "http://vanillaforums.com/", |
|
88 |
+ "safe": "2.1.3", |
|
89 |
+ "vuln": "http://vanillaforums.org/discussion/27822/vanilla-2-1-3-security-release", |
|
90 |
+ "detection": [ |
|
91 |
+ { |
|
92 |
+ "file": "index.php", |
|
93 |
+ "variable": "APPLICATION_VERSION", |
|
94 |
+ "subdir": 0, |
|
95 |
+ "extra_match": "define('APPLICATION', 'Vanilla');" |
|
96 |
+ } |
|
97 |
+ ] |
|
98 |
+ }, |
|
99 |
+ { |
|
100 |
+ "name": "Simple_Machines_Forum", |
|
101 |
+ "url": "http://www.simplemachines.org/", |
|
102 |
+ "safe": "2.0.5", |
|
103 |
+ "old_safe": "1.1.16", |
|
104 |
+ "vuln": "http://www.simplemachines.org/community/index.php?topic=509417.0", |
|
105 |
+ "detection": [ |
|
106 |
+ { |
|
107 |
+ "file": "index.php", |
|
108 |
+ "variable": "$forum_version", |
|
109 |
+ "subdir": 0, |
|
110 |
+ "extra_match": "Simple Machines Forum" |
|
111 |
+ } |
|
112 |
+ ] |
|
113 |
+ }, |
|
114 |
+ { |
|
115 |
+ "name": "MyBB", |
|
116 |
+ "url": "http://www.mybboard.net/", |
|
117 |
+ "safe": "1.8.3", |
|
118 |
+ "old_safe": "1.6.16", |
|
119 |
+ "vuln": "http://blog.mybb.com/2014/11/20/mybb-1-8-3-1-6-16-released-security-releases/", |
|
120 |
+ "detection": [ |
|
121 |
+ { |
|
122 |
+ "file": "class_core.php", |
|
123 |
+ "variable": "$version", |
|
124 |
+ "subdir": 1 |
|
125 |
+ } |
|
126 |
+ ] |
|
127 |
+ }, |
|
128 |
+ { |
|
129 |
+ "name": "Phorum", |
|
130 |
+ "url": "http://www.phorum.org/", |
|
131 |
+ "safe": "5.2.19", |
|
132 |
+ "vuln": "http://www.phorum.org/phorum5/read.php?64,151943", |
|
133 |
+ "latest": "5.2.19", |
|
134 |
+ "detection": [ |
|
135 |
+ { |
|
136 |
+ "file": "common.php", |
|
137 |
+ "variable": "define( \"PHORUM\"", |
|
138 |
+ "subdir": 0 |
|
139 |
+ } |
|
140 |
+ ] |
|
141 |
+ }, |
|
142 |
+ { |
|
143 |
+ "name": "wBB", |
|
144 |
+ "url": "http://www.woltlab.com/", |
|
145 |
+ "safe": "3.0.9", |
|
146 |
+ "vuln": "http://www.securityfocus.com/archive/1/503867/30/60/threaded", |
|
147 |
+ "detection": [ |
|
148 |
+ { |
|
149 |
+ "file": "config.inc.php", |
|
150 |
+ "variable": "define('PACKAGE_VERSION',", |
|
151 |
+ "subdir": 0 |
|
152 |
+ } |
|
153 |
+ ] |
|
154 |
+ }, |
|
155 |
+ { |
|
156 |
+ "name": "WBBLite", |
|
157 |
+ "url": "http://wbblite.com/", |
|
158 |
+ "safe": "2.1", |
|
159 |
+ "vuln": "http://www.securityfocus.com/archive/1/503867/30/60/threaded", |
|
160 |
+ "detection": [ |
|
161 |
+ { |
|
162 |
+ "file": "package.xml", |
|
163 |
+ "variable": "<version>", |
|
164 |
+ "subdir": 0, |
|
165 |
+ "extra_match": "<packagename>WoltLab Burning Board Lite</packagename>" |
|
166 |
+ } |
|
167 |
+ ] |
|
168 |
+ }, |
|
169 |
+ { |
|
170 |
+ "name": "FluxBB12", |
|
171 |
+ "url": "https://fluxbb.org/", |
|
172 |
+ "safe": "1.5.11", |
|
173 |
+ "vuln": "https://fluxbb.org/forums/viewtopic.php?id=9472", |
|
174 |
+ "detection": [ |
|
175 |
+ { |
|
176 |
+ "file": "install.php", |
|
177 |
+ "variable": "$fluxbb_version", |
|
178 |
+ "subdir": 1 |
|
179 |
+ } |
|
180 |
+ ] |
|
181 |
+ }, |
|
182 |
+ { |
|
183 |
+ "name": "FluxBB", |
|
184 |
+ "url": "https://fluxbb.org/", |
|
185 |
+ "safe": "1.5.11", |
|
186 |
+ "vuln": "https://fluxbb.org/forums/viewtopic.php?id=9472", |
|
187 |
+ "detection": [ |
|
188 |
+ { |
|
189 |
+ "file": "common.php", |
|
190 |
+ "variable": "FORUM_VERSION", |
|
191 |
+ "subdir": 1, |
|
192 |
+ "extra_match": "FORUM_DB_REVISION" |
|
193 |
+ } |
|
194 |
+ ] |
|
195 |
+ }, |
|
196 |
+ { |
|
197 |
+ "name": "vBulletin", |
|
198 |
+ "url": "https://www.vbulletin.com/", |
|
199 |
+ "safe": "4.2.2", |
|
200 |
+ "vuln": "CVE-2013-6129", |
|
201 |
+ "detection": [ |
|
202 |
+ { |
|
203 |
+ "file": "class_core.php", |
|
204 |
+ "variable": "define('FILE_VERSION'", |
|
205 |
+ "subdir": 1, |
|
206 |
+ "extra_match": "vBulletin" |
|
207 |
+ } |
|
208 |
+ ] |
|
209 |
+ } |
|
210 |
+] |
|
0 | 211 |
\ No newline at end of file |
... | ... |
@@ -1,80 +0,0 @@ |
1 |
-[Serendipity] |
|
2 |
-url=https://docs.s9y.org/ |
|
3 |
-safe=2.3.2 |
|
4 |
-vuln=https://blog.s9y.org/archives/287-Serendipity-2.3.2-released-security-update.html |
|
5 |
-file=serendipity_config.inc.php |
|
6 |
-variable=$serendipity['version'] |
|
7 |
-subdir=0 |
|
8 |
- |
|
9 |
-[Wordpress] |
|
10 |
-url=https://wordpress.org/ |
|
11 |
-safe=5.2.4 |
|
12 |
-old_safe=5.1.4,5.1.3,5.0.8,5.0.7,4.9.13,4.9.12,4.8.12,4.8.11,4.7.16,4.7.15,4.6.17,4.6.16,4.5.20,4.5.19,4.4.21,4.4.20,4.3.22,4.3.21,4.2.26,4.2.25,4.1.29,4.1.28,4.0.29,4.0.28,3.9.30,3.9.29,3.8.32,3.8.31,3.7.32,3.7.31 |
|
13 |
-vuln=CVE-2019-17672 |
|
14 |
-file=version.php |
|
15 |
-variable=$wp_version |
|
16 |
-subdir=1 |
|
17 |
-extra_match=The WordPress version string |
|
18 |
- |
|
19 |
-[SimplePHPBlog] |
|
20 |
-url=http://www.simplephpblog.com/ |
|
21 |
-safe=0.5.1 |
|
22 |
-vuln=CVE-2007-5071 |
|
23 |
-file=sb_functions.php |
|
24 |
-variable=$sb_info[ 'version' ] |
|
25 |
-subdir=1 |
|
26 |
- |
|
27 |
-[b2evolution] |
|
28 |
-url=https://b2evolution.net/ |
|
29 |
-safe=1.9.2 |
|
30 |
-old_safe=1.8.7 |
|
31 |
-vuln=CVE-2007-0175 |
|
32 |
-file=_application.php |
|
33 |
-variable=$app_version |
|
34 |
-extra_match=This is b2evolution |
|
35 |
-subdir=2 |
|
36 |
- |
|
37 |
-[nucleuscms] |
|
38 |
-url=http://www.nucleuscms.org/ |
|
39 |
-safe=3.40 |
|
40 |
-vuln=CVE-2009-0929 |
|
41 |
-file=globalfunctions.php |
|
42 |
-variable=$nucleus['version'] |
|
43 |
-subdir=2 |
|
44 |
- |
|
45 |
-[sBlog] |
|
46 |
-url=https://web.archive.org/web/20080908094255/http://sblog.se/wiki/Main_Page |
|
47 |
-safe= |
|
48 |
-latest=0.7.3 |
|
49 |
-vuln=CVE-2007-1801 |
|
50 |
-file=version.ini |
|
51 |
-variable=conf_current_version |
|
52 |
-subdir=1 |
|
53 |
-extra_match=[sblog_version_info] |
|
54 |
- |
|
55 |
-[Movable_Type] |
|
56 |
-url=https://movabletype.com/ |
|
57 |
-# only 5.x public |
|
58 |
-safe=7.1.4 |
|
59 |
-old_safe=6.5.2,6.3.10 |
|
60 |
-vuln=https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html |
|
61 |
-file=mt.php |
|
62 |
-variable=VERSION_ID |
|
63 |
-subdir=1 |
|
64 |
- |
|
65 |
-[artmedic_weblog] |
|
66 |
-url=http://www.artmedic-phpscripts.de/ |
|
67 |
-safe= |
|
68 |
-latest=1.0 |
|
69 |
-vuln=CVE-2008-0798 |
|
70 |
-file=artmedic_index.php |
|
71 |
-variable=# artmedic weblog |
|
72 |
-subdir=0 |
|
73 |
- |
|
74 |
-[DotClear] |
|
75 |
-url=http://www.dotclear.net/ |
|
76 |
-safe=2.2.3 |
|
77 |
-vuln=CVE-2011-1584 |
|
78 |
-file=LISEZMOI.txt |
|
79 |
-variable=DotClear |
|
80 |
-subdir=0 |
... | ... |
@@ -0,0 +1,128 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "Serendipity", |
|
4 |
+ "url": "https://docs.s9y.org/", |
|
5 |
+ "safe": "2.3.2", |
|
6 |
+ "vuln": "https://blog.s9y.org/archives/287-Serendipity-2.3.2-released-security-update.html", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "serendipity_config.inc.php", |
|
10 |
+ "variable": "$serendipity['version']", |
|
11 |
+ "subdir": 0 |
|
12 |
+ } |
|
13 |
+ ] |
|
14 |
+ }, |
|
15 |
+ { |
|
16 |
+ "name": "Wordpress", |
|
17 |
+ "url": "https://wordpress.org/", |
|
18 |
+ "safe": "5.2.4", |
|
19 |
+ "old_safe": "5.1.4,5.1.3,5.0.8,5.0.7,4.9.13,4.9.12,4.8.12,4.8.11,4.7.16,4.7.15,4.6.17,4.6.16,4.5.20,4.5.19,4.4.21,4.4.20,4.3.22,4.3.21,4.2.26,4.2.25,4.1.29,4.1.28,4.0.29,4.0.28,3.9.30,3.9.29,3.8.32,3.8.31,3.7.32,3.7.31", |
|
20 |
+ "vuln": "CVE-2019-17672", |
|
21 |
+ "detection": [ |
|
22 |
+ { |
|
23 |
+ "file": "version.php", |
|
24 |
+ "variable": "$wp_version", |
|
25 |
+ "subdir": 1, |
|
26 |
+ "extra_match": "The WordPress version string" |
|
27 |
+ } |
|
28 |
+ ] |
|
29 |
+ }, |
|
30 |
+ { |
|
31 |
+ "name": "SimplePHPBlog", |
|
32 |
+ "url": "http://www.simplephpblog.com/", |
|
33 |
+ "safe": "0.5.1", |
|
34 |
+ "vuln": "CVE-2007-5071", |
|
35 |
+ "detection": [ |
|
36 |
+ { |
|
37 |
+ "file": "sb_functions.php", |
|
38 |
+ "variable": "$sb_info[ 'version' ]", |
|
39 |
+ "subdir": 1 |
|
40 |
+ } |
|
41 |
+ ] |
|
42 |
+ }, |
|
43 |
+ { |
|
44 |
+ "name": "b2evolution", |
|
45 |
+ "url": "https://b2evolution.net/", |
|
46 |
+ "safe": "1.9.2", |
|
47 |
+ "old_safe": "1.8.7", |
|
48 |
+ "vuln": "CVE-2007-0175", |
|
49 |
+ "detection": [ |
|
50 |
+ { |
|
51 |
+ "file": "_application.php", |
|
52 |
+ "variable": "$app_version", |
|
53 |
+ "subdir": 2, |
|
54 |
+ "extra_match": "This is b2evolution" |
|
55 |
+ } |
|
56 |
+ ] |
|
57 |
+ }, |
|
58 |
+ { |
|
59 |
+ "name": "nucleuscms", |
|
60 |
+ "url": "http://www.nucleuscms.org/", |
|
61 |
+ "safe": "3.40", |
|
62 |
+ "vuln": "CVE-2009-0929", |
|
63 |
+ "detection": [ |
|
64 |
+ { |
|
65 |
+ "file": "globalfunctions.php", |
|
66 |
+ "variable": "$nucleus['version']", |
|
67 |
+ "subdir": 2 |
|
68 |
+ } |
|
69 |
+ ] |
|
70 |
+ }, |
|
71 |
+ { |
|
72 |
+ "name": "sBlog", |
|
73 |
+ "url": "https://web.archive.org/web/20080908094255/http://sblog.se/wiki/Main_Page", |
|
74 |
+ "safe": "", |
|
75 |
+ "vuln": "CVE-2007-1801", |
|
76 |
+ "latest": "0.7.3", |
|
77 |
+ "detection": [ |
|
78 |
+ { |
|
79 |
+ "file": "version.ini", |
|
80 |
+ "variable": "conf_current_version", |
|
81 |
+ "subdir": 1, |
|
82 |
+ "extra_match": "[sblog_version_info]" |
|
83 |
+ } |
|
84 |
+ ] |
|
85 |
+ }, |
|
86 |
+ { |
|
87 |
+ "name": "Movable_Type", |
|
88 |
+ "url": "https://movabletype.com/", |
|
89 |
+ "safe": "7.1.4", |
|
90 |
+ "old_safe": "6.5.2,6.3.10", |
|
91 |
+ "vuln": "https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html", |
|
92 |
+ "note": "only 5.x public", |
|
93 |
+ "detection": [ |
|
94 |
+ { |
|
95 |
+ "file": "mt.php", |
|
96 |
+ "variable": "VERSION_ID", |
|
97 |
+ "subdir": 1 |
|
98 |
+ } |
|
99 |
+ ] |
|
100 |
+ }, |
|
101 |
+ { |
|
102 |
+ "name": "artmedic_weblog", |
|
103 |
+ "url": "http://www.artmedic-phpscripts.de/", |
|
104 |
+ "safe": "", |
|
105 |
+ "vuln": "CVE-2008-0798", |
|
106 |
+ "latest": "1.0", |
|
107 |
+ "detection": [ |
|
108 |
+ { |
|
109 |
+ "file": "artmedic_index.php", |
|
110 |
+ "variable": "# artmedic weblog", |
|
111 |
+ "subdir": 0 |
|
112 |
+ } |
|
113 |
+ ] |
|
114 |
+ }, |
|
115 |
+ { |
|
116 |
+ "name": "DotClear", |
|
117 |
+ "url": "http://www.dotclear.net/", |
|
118 |
+ "safe": "2.2.3", |
|
119 |
+ "vuln": "CVE-2011-1584", |
|
120 |
+ "detection": [ |
|
121 |
+ { |
|
122 |
+ "file": "LISEZMOI.txt", |
|
123 |
+ "variable": "DotClear", |
|
124 |
+ "subdir": 0 |
|
125 |
+ } |
|
126 |
+ ] |
|
127 |
+ } |
|
128 |
+] |
|
0 | 129 |
\ No newline at end of file |
... | ... |
@@ -1,251 +0,0 @@ |
1 |
-[WebsiteBaker] |
|
2 |
-url=https://websitebaker.org/ |
|
3 |
-safe=2.8.4 |
|
4 |
-vuln=CVE-2015-0553 |
|
5 |
-file=version.php |
|
6 |
-variable=VERSION |
|
7 |
-extra_match=Website Baker Project |
|
8 |
-subdir=3 |
|
9 |
- |
|
10 |
-[WebsiteBaker28] |
|
11 |
-url=https://websitebaker.org/ |
|
12 |
-safe=2.8.4 |
|
13 |
-vuln=CVE-2015-0553 |
|
14 |
-file=info.php |
|
15 |
-variable=$template_platform |
|
16 |
-extra_match=wb_theme |
|
17 |
-subdir=3 |
|
18 |
- |
|
19 |
-[toendaCMS] |
|
20 |
-url=http://www.toendacms.com/ |
|
21 |
-safe= |
|
22 |
-vuln=CVE-2007-1872 |
|
23 |
-file=tcms_version.xml |
|
24 |
-variable=release |
|
25 |
-subdir=2 |
|
26 |
- |
|
27 |
-[Drupal6] |
|
28 |
-url=https://www.drupal.org/ |
|
29 |
-safe=7.67 |
|
30 |
-latest=7.67 |
|
31 |
-vuln=https://www.drupal.org/sa-core-2019-007 |
|
32 |
-file=system.module |
|
33 |
-variable=define('VERSION' |
|
34 |
-subdir=2 |
|
35 |
- |
|
36 |
-[Drupal7] |
|
37 |
-url=https://www.drupal.org/ |
|
38 |
-safe=7.67 |
|
39 |
-latest=7.67 |
|
40 |
-vuln=https://www.drupal.org/sa-core-2019-007 |
|
41 |
-file=bootstrap.inc |
|
42 |
-variable=define('VERSION' |
|
43 |
-subdir=1 |
|
44 |
- |
|
45 |
-[Drupal8] |
|
46 |
-url=https://www.drupal.org/ |
|
47 |
-safe=8.7.1 |
|
48 |
-old_safe=8.6.16 |
|
49 |
-latest=8.7.1 |
|
50 |
-vuln=https://www.drupal.org/sa-core-2019-007 |
|
51 |
-file=Drupal.php |
|
52 |
-variable=const VERSION |
|
53 |
-subdir=2 |
|
54 |
- |
|
55 |
-[PHPNuke] |
|
56 |
-url=https://www.phpnuke.org/ |
|
57 |
-# I'm not really sure about that, but 8.0 is at least vulnerable |
|
58 |
-# Versions pre 8.0 aren't easily detectable |
|
59 |
-safe=8.1 |
|
60 |
-vuln=CVE-2007-1519 |
|
61 |
-file=version.php |
|
62 |
-variable=$version_number |
|
63 |
-extra_match=PHP-Nuke $version_number |
|
64 |
-subdir=2 |
|
65 |
- |
|
66 |
-[Typo3] |
|
67 |
-url=https://typo3.org/ |
|
68 |
-safe=9.5.6 |
|
69 |
-old_safe=8.7.25 |
|
70 |
-vuln=https://typo3.org/article/typo3-956-and-8725-security-releases-published/ |
|
71 |
-file=config_default.php |
|
72 |
-variable=$TYPO_VERSION |
|
73 |
-subdir=1 |
|
74 |
- |
|
75 |
-[typo3-6] |
|
76 |
-url=https://typo3.org/ |
|
77 |
-safe=9.5.6 |
|
78 |
-old_safe=8.7.25 |
|
79 |
-vuln=https://typo3.org/article/typo3-956-and-8725-security-releases-published/ |
|
80 |
-file=SystemEnvironmentBuilder.php |
|
81 |
-variable=define('TYPO3_version |
|
82 |
-subdir=4 |
|
83 |
- |
|
84 |
-[Joomla-1] |
|
85 |
-url=https://www.joomla.org/ |
|
86 |
-safe=3.9.13 |
|
87 |
-vuln=CVE-2019-18674 |
|
88 |
-file=CHANGELOG.php |
|
89 |
-variable=--------------- |
|
90 |
-extra_match=Joomla! is free software. |
|
91 |
-subdir=0 |
|
92 |
- |
|
93 |
-[Joomla] |
|
94 |
-url=https://www.joomla.org/ |
|
95 |
-safe=3.9.13 |
|
96 |
-vuln=CVE-2019-18674 |
|
97 |
-file=joomla.xml |
|
98 |
-variable=<version> |
|
99 |
-extra_match=FILES_JOOMLA_XML_DESCRIPTION |
|
100 |
-path_match=administrator/manifests/files |
|
101 |
-subdir=3 |
|
102 |
- |
|
103 |
-[Mambo] |
|
104 |
-url=http://www.source.mambo-foundation.org/ |
|
105 |
-safe= |
|
106 |
-vuln=CVE-2008-2905 |
|
107 |
-file=version.php |
|
108 |
-variable=var $RELEASE,var $DEV_LEVEL |
|
109 |
-extra_match=@package Mambo |
|
110 |
-subdir=1 |
|
111 |
- |
|
112 |
-[w-Agora] |
|
113 |
-url=http://www.w-agora.net/ |
|
114 |
-safe= |
|
115 |
-latest=4.2.1 |
|
116 |
-vuln=CVE-2007-0607 |
|
117 |
-file=misc_func.php |
|
118 |
-variable=$v = |
|
119 |
-subdir=1 |
|
120 |
-extra_match=w-agora version $v |
|
121 |
- |
|
122 |
-[MODx] |
|
123 |
-url=https://modx.com/ |
|
124 |
-safe=1.0.15 |
|
125 |
-vuln=http://forums.modx.com/thread/94952/multiple-vulnerabilities-xss-remote-command-injection |
|
126 |
-file=version.inc.php |
|
127 |
-variable=$version |
|
128 |
-subdir=2 |
|
129 |
-extra_match=$full_appname = 'MODx' |
|
130 |
- |
|
131 |
-[MODX-1.x] |
|
132 |
-url=https://modx.com/ |
|
133 |
-safe=1.0.15 |
|
134 |
-vuln=http://forums.modx.com/thread/94952/multiple-vulnerabilities-xss-remote-command-injection |
|
135 |
-file=version.inc.php |
|
136 |
-variable=$modx_version |
|
137 |
-subdir=2 |
|
138 |
- |
|
139 |
-[MODX-2.x] |
|
140 |
-url=https://modx.com/ |
|
141 |
-safe=2.2.11 |
|
142 |
-vuln=http://modx.com/blog/2014/07/15/revolution-2.2.15/ |
|
143 |
-file=changelog.txt |
|
144 |
-variable=MODX Revolution |
|
145 |
-subdir=2 |
|
146 |
-extra_match=MODX |
|
147 |
- |
|
148 |
-[PostNuke] |
|
149 |
-# This one is a hell to detect, not sure for how many versions this works |
|
150 |
-url=http://www.postnuke.com |
|
151 |
-# 0.764 last stable in 2006-11-20, 0.8.0.0 rcs available |
|
152 |
-safe= |
|
153 |
-vuln=CVE-2007-0385 |
|
154 |
-file=global.php |
|
155 |
-variable=_MESSAGE_00_a |
|
156 |
-subdir=2 |
|
157 |
-extra_match=http://www.pn-cms.de |
|
158 |
- |
|
159 |
-[Contenido] |
|
160 |
-url=https://www.contenido.org/ |
|
161 |
-safe=4.8.15 |
|
162 |
-latest=4.8.15 |
|
163 |
-vuln=http://www.contenido.org/de/front_content.php?idcat=107&idart=1789&client=6&lang=3 |
|
164 |
-file=config.misc.php |
|
165 |
-variable=$cfg['version'] |
|
166 |
-subdir=1 |
|
167 |
-extra_match=Contenido Misc Configurations |
|
168 |
- |
|
169 |
-[SilverStripe] |
|
170 |
-url=https://www.silverstripe.com |
|
171 |
-safe=2.4.7 |
|
172 |
-vuln=CVE-2012-0976 |
|
173 |
-file=silverstripe_version |
|
174 |
-variable=/open/modules/cms/ |
|
175 |
-subdir=1 |
|
176 |
-extra_match=/open/modules/cms/ |
|
177 |
- |
|
178 |
-[CMSMadeSimple] |
|
179 |
-url=https://www.cmsmadesimple.org/ |
|
180 |
-safe=1.11.13 |
|
181 |
-vuln=http://www.cmsmadesimple.org/2015/02/Announcing-CMS-Made-Simple-1-11-13-Security-Release/ |
|
182 |
-file=version.php |
|
183 |
-variable=$CMS_VERSION |
|
184 |
-subdir=0 |
|
185 |
- |
|
186 |
-[e107] |
|
187 |
-url=https://e107.org/ |
|
188 |
-safe=1.0.0 |
|
189 |
-vuln=CVE-2011-4920 |
|
190 |
-file=ver.php |
|
191 |
-variable=$e107info['e107_version'] |
|
192 |
-subdir=0 |
|
193 |
- |
|
194 |
-[SPIP] |
|
195 |
-url=https://www.spip.net/ |
|
196 |
-safe=2.1.13 |
|
197 |
-old_safe=2.0.18 |
|
198 |
-vuln=http://archives.rezo.net/archives/spip-en.mbox/U5QUZ6WJRAJC7H5BR7W5SQG6WCD3PXL7/ |
|
199 |
-file=inc_version.php |
|
200 |
-variable=$spip_version_branche |
|
201 |
-subdir=1 |
|
202 |
- |
|
203 |
-[contao] |
|
204 |
-url=https://contao.org/ |
|
205 |
-safe=3.2.5 |
|
206 |
-old_safe=2.11.14 |
|
207 |
-vuln=CVE-2014-1860 |
|
208 |
-latest=3.2.5 |
|
209 |
-file=CHANGELOG.md |
|
210 |
-variable=Version |
|
211 |
-extra_match=Contao Open Source CMS |
|
212 |
-subdir=0 |
|
213 |
- |
|
214 |
-[contao-old] |
|
215 |
-url=https://contao.org/ |
|
216 |
-safe=3.2.5 |
|
217 |
-old_safe=2.11.14 |
|
218 |
-vuln=CVE-2014-1860 |
|
219 |
-latest=3.2.5 |
|
220 |
-file=CHANGELOG.txt |
|
221 |
-variable=Version |
|
222 |
-extra_match=Contao Open Source CMS Changelog |
|
223 |
-subdir=0 |
|
224 |
- |
|
225 |
-[redaxo] |
|
226 |
-url=https://redaxo.org/ |
|
227 |
-safe=4.5 |
|
228 |
-vuln=CVE-2012-3869 |
|
229 |
-latest=4.5 |
|
230 |
-file=en_gb.lang |
|
231 |
-variable=setup_037 |
|
232 |
-subdir=3 |
|
233 |
- |
|
234 |
-[textpattern] |
|
235 |
-url=https://textpattern.com/ |
|
236 |
-safe=4.7.0 |
|
237 |
-vuln=CVE-2018-7474 |
|
238 |
-latest=4.7.3 |
|
239 |
-file=index.php |
|
240 |
-subdir=1 |
|
241 |
-variable=$thisversion |
|
242 |
- |
|
243 |
-[bolt] |
|
244 |
-url=https://bolt.cm/ |
|
245 |
-safe=3.5.3 |
|
246 |
-latest=3.5.3 |
|
247 |
-file=Version.php |
|
248 |
-variable=const VERSION |
|
249 |
-vuln=https://github.com/bolt/bolt/blob/v3.5.4/changelog.md#bolt-353 |
|
250 |
-extra_match=Bolt's |
|
251 |
-subdir=4 |
... | ... |
@@ -0,0 +1,387 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "WebsiteBaker", |
|
4 |
+ "url": "https://websitebaker.org/", |
|
5 |
+ "safe": "2.8.4", |
|
6 |
+ "vuln": "CVE-2015-0553", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "version.php", |
|
10 |
+ "variable": "VERSION", |
|
11 |
+ "subdir": 3, |
|
12 |
+ "extra_match": "Website Baker Project" |
|
13 |
+ } |
|
14 |
+ ] |
|
15 |
+ }, |
|
16 |
+ { |
|
17 |
+ "name": "WebsiteBaker28", |
|
18 |
+ "url": "https://websitebaker.org/", |
|
19 |
+ "safe": "2.8.4", |
|
20 |
+ "vuln": "CVE-2015-0553", |
|
21 |
+ "detection": [ |
|
22 |
+ { |
|
23 |
+ "file": "info.php", |
|
24 |
+ "variable": "$template_platform", |
|
25 |
+ "subdir": 3, |
|
26 |
+ "extra_match": "wb_theme" |
|
27 |
+ } |
|
28 |
+ ] |
|
29 |
+ }, |
|
30 |
+ { |
|
31 |
+ "name": "toendaCMS", |
|
32 |
+ "url": "http://www.toendacms.com/", |
|
33 |
+ "safe": "", |
|
34 |
+ "vuln": "CVE-2007-1872", |
|
35 |
+ "detection": [ |
|
36 |
+ { |
|
37 |
+ "file": "tcms_version.xml", |
|
38 |
+ "variable": "release", |
|
39 |
+ "subdir": 2 |
|
40 |
+ } |
|
41 |
+ ] |
|
42 |
+ }, |
|
43 |
+ { |
|
44 |
+ "name": "Drupal6", |
|
45 |
+ "url": "https://www.drupal.org/", |
|
46 |
+ "safe": "7.67", |
|
47 |
+ "vuln": "https://www.drupal.org/sa-core-2019-007", |
|
48 |
+ "latest": "7.67", |
|
49 |
+ "detection": [ |
|
50 |
+ { |
|
51 |
+ "file": "system.module", |
|
52 |
+ "variable": "define('VERSION'", |
|
53 |
+ "subdir": 2 |
|
54 |
+ } |
|
55 |
+ ] |
|
56 |
+ }, |
|
57 |
+ { |
|
58 |
+ "name": "Drupal7", |
|
59 |
+ "url": "https://www.drupal.org/", |
|
60 |
+ "safe": "7.67", |
|
61 |
+ "vuln": "https://www.drupal.org/sa-core-2019-007", |
|
62 |
+ "latest": "7.67", |
|
63 |
+ "detection": [ |
|
64 |
+ { |
|
65 |
+ "file": "bootstrap.inc", |
|
66 |
+ "variable": "define('VERSION'", |
|
67 |
+ "subdir": 1 |
|
68 |
+ } |
|
69 |
+ ] |
|
70 |
+ }, |
|
71 |
+ { |
|
72 |
+ "name": "Drupal8", |
|
73 |
+ "url": "https://www.drupal.org/", |
|
74 |
+ "safe": "8.7.1", |
|
75 |
+ "old_safe": "8.6.16", |
|
76 |
+ "vuln": "https://www.drupal.org/sa-core-2019-007", |
|
77 |
+ "latest": "8.7.1", |
|
78 |
+ "detection": [ |
|
79 |
+ { |
|
80 |
+ "file": "Drupal.php", |
|
81 |
+ "variable": "const VERSION", |
|
82 |
+ "subdir": 2 |
|
83 |
+ } |
|
84 |
+ ] |
|
85 |
+ }, |
|
86 |
+ { |
|
87 |
+ "name": "PHPNuke", |
|
88 |
+ "url": "https://www.phpnuke.org/", |
|
89 |
+ "safe": "8.1", |
|
90 |
+ "vuln": "CVE-2007-1519", |
|
91 |
+ "note": "I'm not really sure about that, but 8.0 is at least vulnerable, pre 8.0 aren't easily detectable", |
|
92 |
+ "detection": [ |
|
93 |
+ { |
|
94 |
+ "file": "version.php", |
|
95 |
+ "variable": "$version_number", |
|
96 |
+ "subdir": 2, |
|
97 |
+ "extra_match": "PHP-Nuke $version_number" |
|
98 |
+ } |
|
99 |
+ ] |
|
100 |
+ }, |
|
101 |
+ { |
|
102 |
+ "name": "Typo3", |
|
103 |
+ "url": "https://typo3.org/", |
|
104 |
+ "safe": "9.5.6", |
|
105 |
+ "old_safe": "8.7.25", |
|
106 |
+ "vuln": "https://typo3.org/article/typo3-956-and-8725-security-releases-published/", |
|
107 |
+ "detection": [ |
|
108 |
+ { |
|
109 |
+ "file": "config_default.php", |
|
110 |
+ "variable": "$TYPO_VERSION", |
|
111 |
+ "subdir": 1 |
|
112 |
+ } |
|
113 |
+ ] |
|
114 |
+ }, |
|
115 |
+ { |
|
116 |
+ "name": "typo3-6", |
|
117 |
+ "url": "https://typo3.org/", |
|
118 |
+ "safe": "9.5.6", |
|
119 |
+ "old_safe": "8.7.25", |
|
120 |
+ "vuln": "https://typo3.org/article/typo3-956-and-8725-security-releases-published/", |
|
121 |
+ "detection": [ |
|
122 |
+ { |
|
123 |
+ "file": "SystemEnvironmentBuilder.php", |
|
124 |
+ "variable": "define('TYPO3_version", |
|
125 |
+ "subdir": 4 |
|
126 |
+ } |
|
127 |
+ ] |
|
128 |
+ }, |
|
129 |
+ { |
|
130 |
+ "name": "Joomla-1", |
|
131 |
+ "url": "https://www.joomla.org/", |
|
132 |
+ "safe": "3.9.13", |
|
133 |
+ "vuln": "CVE-2019-18674", |
|
134 |
+ "detection": [ |
|
135 |
+ { |
|
136 |
+ "file": "CHANGELOG.php", |
|
137 |
+ "variable": "---------------", |
|
138 |
+ "subdir": 0, |
|
139 |
+ "extra_match": "Joomla! is free software." |
|
140 |
+ } |
|
141 |
+ ] |
|
142 |
+ }, |
|
143 |
+ { |
|
144 |
+ "name": "Joomla", |
|
145 |
+ "url": "https://www.joomla.org/", |
|
146 |
+ "safe": "3.9.13", |
|
147 |
+ "vuln": "CVE-2019-18674", |
|
148 |
+ "detection": [ |
|
149 |
+ { |
|
150 |
+ "file": "joomla.xml", |
|
151 |
+ "variable": "<version>", |
|
152 |
+ "subdir": 3, |
|
153 |
+ "extra_match": "FILES_JOOMLA_XML_DESCRIPTION", |
|
154 |
+ "path_match": "administrator/manifests/files" |
|
155 |
+ } |
|
156 |
+ ] |
|
157 |
+ }, |
|
158 |
+ { |
|
159 |
+ "name": "Mambo", |
|
160 |
+ "url": "http://www.source.mambo-foundation.org/", |
|
161 |
+ "safe": "", |
|
162 |
+ "vuln": "CVE-2008-2905", |
|
163 |
+ "detection": [ |
|
164 |
+ { |
|
165 |
+ "file": "version.php", |
|
166 |
+ "variable": "var $RELEASE,var $DEV_LEVEL", |
|
167 |
+ "subdir": 1, |
|
168 |
+ "extra_match": "@package Mambo" |
|
169 |
+ } |
|
170 |
+ ] |
|
171 |
+ }, |
|
172 |
+ { |
|
173 |
+ "name": "w-Agora", |
|
174 |
+ "url": "http://www.w-agora.net/", |
|
175 |
+ "safe": "", |
|
176 |
+ "vuln": "CVE-2007-0607", |
|
177 |
+ "latest": "4.2.1", |
|
178 |
+ "detection": [ |
|
179 |
+ { |
|
180 |
+ "file": "misc_func.php", |
|
181 |
+ "variable": "$v =", |
|
182 |
+ "subdir": 1, |
|
183 |
+ "extra_match": "w-agora version $v" |
|
184 |
+ } |
|
185 |
+ ] |
|
186 |
+ }, |
|
187 |
+ { |
|
188 |
+ "name": "MODx", |
|
189 |
+ "url": "https://modx.com/", |
|
190 |
+ "safe": "1.0.15", |
|
191 |
+ "vuln": "http://forums.modx.com/thread/94952/multiple-vulnerabilities-xss-remote-command-injection", |
|
192 |
+ "detection": [ |
|
193 |
+ { |
|
194 |
+ "file": "version.inc.php", |
|
195 |
+ "variable": "$version", |
|
196 |
+ "subdir": 2, |
|
197 |
+ "extra_match": "$full_appname = 'MODx'" |
|
198 |
+ } |
|
199 |
+ ] |
|
200 |
+ }, |
|
201 |
+ { |
|
202 |
+ "name": "MODX-1.x", |
|
203 |
+ "url": "https://modx.com/", |
|
204 |
+ "safe": "1.0.15", |
|
205 |
+ "vuln": "http://forums.modx.com/thread/94952/multiple-vulnerabilities-xss-remote-command-injection", |
|
206 |
+ "detection": [ |
|
207 |
+ { |
|
208 |
+ "file": "version.inc.php", |
|
209 |
+ "variable": "$modx_version", |
|
210 |
+ "subdir": 2 |
|
211 |
+ } |
|
212 |
+ ] |
|
213 |
+ }, |
|
214 |
+ { |
|
215 |
+ "name": "MODX-2.x", |
|
216 |
+ "url": "https://modx.com/", |
|
217 |
+ "safe": "2.2.11", |
|
218 |
+ "vuln": "http://modx.com/blog/2014/07/15/revolution-2.2.15/", |
|
219 |
+ "detection": [ |
|
220 |
+ { |
|
221 |
+ "file": "changelog.txt", |
|
222 |
+ "variable": "MODX Revolution", |
|
223 |
+ "subdir": 2, |
|
224 |
+ "extra_match": "MODX" |
|
225 |
+ } |
|
226 |
+ ] |
|
227 |
+ }, |
|
228 |
+ { |
|
229 |
+ "name": "PostNuke", |
|
230 |
+ "url": "http://www.postnuke.com", |
|
231 |
+ "safe": "", |
|
232 |
+ "vuln": "CVE-2007-0385", |
|
233 |
+ "latest": "0.764", |
|
234 |
+ "detection": [ |
|
235 |
+ { |
|
236 |
+ "file": "global.php", |
|
237 |
+ "variable": "_MESSAGE_00_a", |
|
238 |
+ "subdir": 2, |
|
239 |
+ "extra_match": "http://www.pn-cms.de" |
|
240 |
+ } |
|
241 |
+ ] |
|
242 |
+ }, |
|
243 |
+ { |
|
244 |
+ "name": "Contenido", |
|
245 |
+ "url": "https://www.contenido.org/", |
|
246 |
+ "safe": "4.8.15", |
|
247 |
+ "vuln": "http://www.contenido.org/de/front_content.php?idcat=107&idart=1789&client=6&lang=3", |
|
248 |
+ "latest": "4.8.15", |
|
249 |
+ "detection": [ |
|
250 |
+ { |
|
251 |
+ "file": "config.misc.php", |
|
252 |
+ "variable": "$cfg['version']", |
|
253 |
+ "subdir": 1, |
|
254 |
+ "extra_match": "Contenido Misc Configurations" |
|
255 |
+ } |
|
256 |
+ ] |
|
257 |
+ }, |
|
258 |
+ { |
|
259 |
+ "name": "SilverStripe", |
|
260 |
+ "url": "https://www.silverstripe.com", |
|
261 |
+ "safe": "2.4.7", |
|
262 |
+ "vuln": "CVE-2012-0976", |
|
263 |
+ "detection": [ |
|
264 |
+ { |
|
265 |
+ "file": "silverstripe_version", |
|
266 |
+ "variable": "/open/modules/cms/", |
|
267 |
+ "subdir": 1, |
|
268 |
+ "extra_match": "/open/modules/cms/" |
|
269 |
+ } |
|
270 |
+ ] |
|
271 |
+ }, |
|
272 |
+ { |
|
273 |
+ "name": "CMSMadeSimple", |
|
274 |
+ "url": "https://www.cmsmadesimple.org/", |
|
275 |
+ "safe": "1.11.13", |
|
276 |
+ "vuln": "http://www.cmsmadesimple.org/2015/02/Announcing-CMS-Made-Simple-1-11-13-Security-Release/", |
|
277 |
+ "detection": [ |
|
278 |
+ { |
|
279 |
+ "file": "version.php", |
|
280 |
+ "variable": "$CMS_VERSION", |
|
281 |
+ "subdir": 0 |
|
282 |
+ } |
|
283 |
+ ] |
|
284 |
+ }, |
|
285 |
+ { |
|
286 |
+ "name": "e107", |
|
287 |
+ "url": "https://e107.org/", |
|
288 |
+ "safe": "1.0.0", |
|
289 |
+ "vuln": "CVE-2011-4920", |
|
290 |
+ "detection": [ |
|
291 |
+ { |
|
292 |
+ "file": "ver.php", |
|
293 |
+ "variable": "$e107info['e107_version']", |
|
294 |
+ "subdir": 0 |
|
295 |
+ } |
|
296 |
+ ] |
|
297 |
+ }, |
|
298 |
+ { |
|
299 |
+ "name": "SPIP", |
|
300 |
+ "url": "https://www.spip.net/", |
|
301 |
+ "safe": "2.1.13", |
|
302 |
+ "old_safe": "2.0.18", |
|
303 |
+ "vuln": "http://archives.rezo.net/archives/spip-en.mbox/U5QUZ6WJRAJC7H5BR7W5SQG6WCD3PXL7/", |
|
304 |
+ "detection": [ |
|
305 |
+ { |
|
306 |
+ "file": "inc_version.php", |
|
307 |
+ "variable": "$spip_version_branche", |
|
308 |
+ "subdir": 1 |
|
309 |
+ } |
|
310 |
+ ] |
|
311 |
+ }, |
|
312 |
+ { |
|
313 |
+ "name": "contao", |
|
314 |
+ "url": "https://contao.org/", |
|
315 |
+ "safe": "3.2.5", |
|
316 |
+ "old_safe": "2.11.14", |
|
317 |
+ "vuln": "CVE-2014-1860", |
|
318 |
+ "latest": "3.2.5", |
|
319 |
+ "detection": [ |
|
320 |
+ { |
|
321 |
+ "file": "CHANGELOG.md", |
|
322 |
+ "variable": "Version", |
|
323 |
+ "subdir": 0, |
|
324 |
+ "extra_match": "Contao Open Source CMS" |
|
325 |
+ } |
|
326 |
+ ] |
|
327 |
+ }, |
|
328 |
+ { |
|
329 |
+ "name": "contao-old", |
|
330 |
+ "url": "https://contao.org/", |
|
331 |
+ "safe": "3.2.5", |
|
332 |
+ "old_safe": "2.11.14", |
|
333 |
+ "vuln": "CVE-2014-1860", |
|
334 |
+ "latest": "3.2.5", |
|
335 |
+ "detection": [ |
|
336 |
+ { |
|
337 |
+ "file": "CHANGELOG.txt", |
|
338 |
+ "variable": "Version", |
|
339 |
+ "subdir": 0, |
|
340 |
+ "extra_match": "Contao Open Source CMS Changelog" |
|
341 |
+ } |
|
342 |
+ ] |
|
343 |
+ }, |
|
344 |
+ { |
|
345 |
+ "name": "redaxo", |
|
346 |
+ "url": "https://redaxo.org/", |
|
347 |
+ "safe": "4.5", |
|
348 |
+ "vuln": "CVE-2012-3869", |
|
349 |
+ "latest": "4.5", |
|
350 |
+ "detection": [ |
|
351 |
+ { |
|
352 |
+ "file": "en_gb.lang", |
|
353 |
+ "variable": "setup_037", |
|
354 |
+ "subdir": 3 |
|
355 |
+ } |
|
356 |
+ ] |
|
357 |
+ }, |
|
358 |
+ { |
|
359 |
+ "name": "textpattern", |
|
360 |
+ "url": "https://textpattern.com/", |
|
361 |
+ "safe": "4.7.0", |
|
362 |
+ "vuln": "CVE-2018-7474", |
|
363 |
+ "latest": "4.7.3", |
|
364 |
+ "detection": [ |
|
365 |
+ { |
|
366 |
+ "file": "index.php", |
|
367 |
+ "variable": "$thisversion", |
|
368 |
+ "subdir": 1 |
|
369 |
+ } |
|
370 |
+ ] |
|
371 |
+ }, |
|
372 |
+ { |
|
373 |
+ "name": "bolt", |
|
374 |
+ "url": "https://bolt.cm/", |
|
375 |
+ "safe": "3.5.3", |
|
376 |
+ "vuln": "https://github.com/bolt/bolt/blob/v3.5.4/changelog.md#bolt-353", |
|
377 |
+ "latest": "3.5.3", |
|
378 |
+ "detection": [ |
|
379 |
+ { |
|
380 |
+ "file": "Version.php", |
|
381 |
+ "variable": "const VERSION", |
|
382 |
+ "subdir": 4, |
|
383 |
+ "extra_match": "Bolt's" |
|
384 |
+ } |
|
385 |
+ ] |
|
386 |
+ } |
|
387 |
+] |
|
0 | 388 |
\ No newline at end of file |
... | ... |
@@ -0,0 +1,15 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "vtigerCRM", |
|
4 |
+ "url": "http://www.vtiger.de", |
|
5 |
+ "safe": "5.3.0", |
|
6 |
+ "vuln": "CVE-2011-4670", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "vtigerversion.php", |
|
10 |
+ "variable": "$vtiger_current_version", |
|
11 |
+ "subdir": 0 |
|
12 |
+ } |
|
13 |
+ ] |
|
14 |
+ } |
|
15 |
+] |
|
0 | 16 |
\ No newline at end of file |
... | ... |
@@ -1,65 +0,0 @@ |
1 |
-[Phormer] |
|
2 |
-url=http://p.horm.org/er/ |
|
3 |
-safe= |
|
4 |
-vuln=CVE-2007-5013 |
|
5 |
-file=funcs.php |
|
6 |
-variable=PHORMER_VERSION |
|
7 |
-subdir=0 |
|
8 |
- |
|
9 |
-[Gallery2] |
|
10 |
-url=http://gallery.menalto.com/ |
|
11 |
-safe=2.3.2 |
|
12 |
-vuln=CVE-2012-1113 |
|
13 |
-file=module.inc |
|
14 |
-variable=setGalleryVersion |
|
15 |
-subdir=2 |
|
16 |
- |
|
17 |
-[Gallery3] |
|
18 |
-url=http://gallery.menalto.com/ |
|
19 |
-safe=3.0.9 |
|
20 |
-vuln=http://galleryproject.org/gallery_3_0_9 |
|
21 |
-file=gallery.php |
|
22 |
-variable=const VERSION |
|
23 |
-subdir=3 |
|
24 |
- |
|
25 |
-[Coppermine] |
|
26 |
-url=http://coppermine-gallery.net/ |
|
27 |
-safe=1.5.28 |
|
28 |
-vuln=CVE-2014-4612 |
|
29 |
-file=versioncheck.php |
|
30 |
-variable=Coppermine version |
|
31 |
-subdir=0 |
|
32 |
- |
|
33 |
-[Piwigo/PhpWebGallery] |
|
34 |
-url=http://www.phpwebgallery.net/ |
|
35 |
-safe=2.6.3 |
|
36 |
-vuln=CVE-2014-4648 |
|
37 |
-file=constants.php |
|
38 |
-variable=PHPWG_VERSION |
|
39 |
-subdir=1 |
|
40 |
- |
|
41 |
-[LinPHA] |
|
42 |
-url=http://linpha.sourceforge.net |
|
43 |
-safe=1.3.4 |
|
44 |
-vuln=CVE-2008-1856 |
|
45 |
-file=upgrade.php |
|
46 |
-variable=$version |
|
47 |
-subdir=1 |
|
48 |
-extra_match=$inst_linpha_not_work_correctly |
|
49 |
- |
|
50 |
-[mig] |
|
51 |
-url=http://mig.sourceforge.net/ |
|
52 |
-safe=1.5.0 |
|
53 |
-vuln=CVE-2005-2603 |
|
54 |
-file=index.php |
|
55 |
-variable=$version |
|
56 |
-subdir=0 |
|
57 |
-extra_match=Mig - A general purpose photo gallery management system. |
|
58 |
- |
|
59 |
-[zenphoto] |
|
60 |
-url=http://www.zenphoto.org/ |
|
61 |
-safe=1.4.5.4 |
|
62 |
-vuln=CVE-2013-7242 |
|
63 |
-file=version.php |
|
64 |
-variable=define('ZENPHOTO_VERSION' |
|
65 |
-subdir=1 |
... | ... |
@@ -0,0 +1,108 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "Phormer", |
|
4 |
+ "url": "http://p.horm.org/er/", |
|
5 |
+ "safe": "", |
|
6 |
+ "vuln": "CVE-2007-5013", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "funcs.php", |
|
10 |
+ "variable": "PHORMER_VERSION", |
|
11 |
+ "subdir": 0 |
|
12 |
+ } |
|
13 |
+ ] |
|
14 |
+ }, |
|
15 |
+ { |
|
16 |
+ "name": "Gallery2", |
|
17 |
+ "url": "http://gallery.menalto.com/", |
|
18 |
+ "safe": "2.3.2", |
|
19 |
+ "vuln": "CVE-2012-1113", |
|
20 |
+ "detection": [ |
|
21 |
+ { |
|
22 |
+ "file": "module.inc", |
|
23 |
+ "variable": "setGalleryVersion", |
|
24 |
+ "subdir": 2 |
|
25 |
+ } |
|
26 |
+ ] |
|
27 |
+ }, |
|
28 |
+ { |
|
29 |
+ "name": "Gallery3", |
|
30 |
+ "url": "http://gallery.menalto.com/", |
|
31 |
+ "safe": "3.0.9", |
|
32 |
+ "vuln": "http://galleryproject.org/gallery_3_0_9", |
|
33 |
+ "detection": [ |
|
34 |
+ { |
|
35 |
+ "file": "gallery.php", |
|
36 |
+ "variable": "const VERSION", |
|
37 |
+ "subdir": 3 |
|
38 |
+ } |
|
39 |
+ ] |
|
40 |
+ }, |
|
41 |
+ { |
|
42 |
+ "name": "Coppermine", |
|
43 |
+ "url": "http://coppermine-gallery.net/", |
|
44 |
+ "safe": "1.5.28", |
|
45 |
+ "vuln": "CVE-2014-4612", |
|
46 |
+ "detection": [ |
|
47 |
+ { |
|
48 |
+ "file": "versioncheck.php", |
|
49 |
+ "variable": "Coppermine version", |
|
50 |
+ "subdir": 0 |
|
51 |
+ } |
|
52 |
+ ] |
|
53 |
+ }, |
|
54 |
+ { |
|
55 |
+ "name": "Piwigo/PhpWebGallery", |
|
56 |
+ "url": "http://www.phpwebgallery.net/", |
|
57 |
+ "safe": "2.6.3", |
|
58 |
+ "vuln": "CVE-2014-4648", |
|
59 |
+ "detection": [ |
|
60 |
+ { |
|
61 |
+ "file": "constants.php", |
|
62 |
+ "variable": "PHPWG_VERSION", |
|
63 |
+ "subdir": 1 |
|
64 |
+ } |
|
65 |
+ ] |
|
66 |
+ }, |
|
67 |
+ { |
|
68 |
+ "name": "LinPHA", |
|
69 |
+ "url": "http://linpha.sourceforge.net", |
|
70 |
+ "safe": "1.3.4", |
|
71 |
+ "vuln": "CVE-2008-1856", |
|
72 |
+ "detection": [ |
|
73 |
+ { |
|
74 |
+ "file": "upgrade.php", |
|
75 |
+ "variable": "$version", |
|
76 |
+ "subdir": 1, |
|
77 |
+ "extra_match": "$inst_linpha_not_work_correctly" |
|
78 |
+ } |
|
79 |
+ ] |
|
80 |
+ }, |
|
81 |
+ { |
|
82 |
+ "name": "mig", |
|
83 |
+ "url": "http://mig.sourceforge.net/", |
|
84 |
+ "safe": "1.5.0", |
|
85 |
+ "vuln": "CVE-2005-2603", |
|
86 |
+ "detection": [ |
|
87 |
+ { |
|
88 |
+ "file": "index.php", |
|
89 |
+ "variable": "$version", |
|
90 |
+ "subdir": 0, |
|
91 |
+ "extra_match": "Mig - A general purpose photo gallery management system." |
|
92 |
+ } |
|
93 |
+ ] |
|
94 |
+ }, |
|
95 |
+ { |
|
96 |
+ "name": "zenphoto", |
|
97 |
+ "url": "http://www.zenphoto.org/", |
|
98 |
+ "safe": "1.4.5.4", |
|
99 |
+ "vuln": "CVE-2013-7242", |
|
100 |
+ "detection": [ |
|
101 |
+ { |
|
102 |
+ "file": "version.php", |
|
103 |
+ "variable": "define('ZENPHOTO_VERSION'", |
|
104 |
+ "subdir": 1 |
|
105 |
+ } |
|
106 |
+ ] |
|
107 |
+ } |
|
108 |
+] |
|
0 | 109 |
\ No newline at end of file |
... | ... |
@@ -0,0 +1,17 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "NetRisk", |
|
4 |
+ "url": "http://phprisk.org/", |
|
5 |
+ "safe": "", |
|
6 |
+ "vuln": "CVE-2008-0144", |
|
7 |
+ "latest": "1.9.7", |
|
8 |
+ "detection": [ |
|
9 |
+ { |
|
10 |
+ "file": "install.php", |
|
11 |
+ "variable": "$version", |
|
12 |
+ "subdir": 0, |
|
13 |
+ "extra_match": "NetRisk - Setup" |
|
14 |
+ } |
|
15 |
+ ] |
|
16 |
+ } |
|
17 |
+] |
|
0 | 18 |
\ No newline at end of file |
... | ... |
@@ -1,33 +0,0 @@ |
1 |
-[Horde-groupware] |
|
2 |
-url=http://www.horde.org/ |
|
3 |
-file=bundle.php |
|
4 |
-variable=BUNDLE_VERSION |
|
5 |
-extra_match='Horde Groupware' |
|
6 |
-safe=1.2.5 |
|
7 |
-vuln=CVE-2009-3701 |
|
8 |
-subdir=1 |
|
9 |
- |
|
10 |
-[eGroupWare] |
|
11 |
-url=http://www.egroupware.org/ |
|
12 |
-safe=1.8.006 |
|
13 |
-vuln=CVE-2014-2027 |
|
14 |
-file=setup.inc.php |
|
15 |
-variable=$setup_info['phpgwapi']['version'] |
|
16 |
-subdir=2 |
|
17 |
- |
|
18 |
-[more.groupware] |
|
19 |
-url=http://www.moregroupware.com/ |
|
20 |
-safe= |
|
21 |
-vuln=CVE-2006-4906 |
|
22 |
-file=version.inc.php |
|
23 |
-variable=$gwversion_number |
|
24 |
-subdir=1 |
|
25 |
- |
|
26 |
-[SimpleGroupware] |
|
27 |
-url=http://www.simple-groupware.de/ |
|
28 |
-safe=0.607 |
|
29 |
-latest=0.724 |
|
30 |
-vuln=http://www.simple-groupware.de/cms/Release-0-607 |
|
31 |
-file=setup.php |
|
32 |
-variable=define("CORE_VERSION_STRING" |
|
33 |
-subdir=2 |
... | ... |
@@ -0,0 +1,56 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "Horde-groupware", |
|
4 |
+ "url": "http://www.horde.org/", |
|
5 |
+ "safe": "1.2.5", |
|
6 |
+ "vuln": "CVE-2009-3701", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "bundle.php", |
|
10 |
+ "variable": "BUNDLE_VERSION", |
|
11 |
+ "subdir": 1, |
|
12 |
+ "extra_match": "'Horde Groupware'" |
|
13 |
+ } |
|
14 |
+ ] |
|
15 |
+ }, |
|
16 |
+ { |
|
17 |
+ "name": "eGroupWare", |
|
18 |
+ "url": "http://www.egroupware.org/", |
|
19 |
+ "safe": "1.8.006", |
|
20 |
+ "vuln": "CVE-2014-2027", |
|
21 |
+ "detection": [ |
|
22 |
+ { |
|
23 |
+ "file": "setup.inc.php", |
|
24 |
+ "variable": "$setup_info['phpgwapi']['version']", |
|
25 |
+ "subdir": 2 |
|
26 |
+ } |
|
27 |
+ ] |
|
28 |
+ }, |
|
29 |
+ { |
|
30 |
+ "name": "more.groupware", |
|
31 |
+ "url": "http://www.moregroupware.com/", |
|
32 |
+ "safe": "", |
|
33 |
+ "vuln": "CVE-2006-4906", |
|
34 |
+ "detection": [ |
|
35 |
+ { |
|
36 |
+ "file": "version.inc.php", |
|
37 |
+ "variable": "$gwversion_number", |
|
38 |
+ "subdir": 1 |
|
39 |
+ } |
|
40 |
+ ] |
|
41 |
+ }, |
|
42 |
+ { |
|
43 |
+ "name": "SimpleGroupware", |
|
44 |
+ "url": "http://www.simple-groupware.de/", |
|
45 |
+ "safe": "0.607", |
|
46 |
+ "vuln": "http://www.simple-groupware.de/cms/Release-0-607", |
|
47 |
+ "latest": "0.724", |
|
48 |
+ "detection": [ |
|
49 |
+ { |
|
50 |
+ "file": "setup.php", |
|
51 |
+ "variable": "define(\"CORE_VERSION_STRING\"", |
|
52 |
+ "subdir": 2 |
|
53 |
+ } |
|
54 |
+ ] |
|
55 |
+ } |
|
56 |
+] |
|
0 | 57 |
\ No newline at end of file |
... | ... |
@@ -1,17 +0,0 @@ |
1 |
-[DRBGuestbook] |
|
2 |
-url=http://www.dbscripts.net/guestbook/ |
|
3 |
-safe=1.1.14 |
|
4 |
-vuln=CVE-2007-5218 |
|
5 |
-file=README.txt |
|
6 |
-variable=Version |
|
7 |
-extra_match=DRBGuestbook |
|
8 |
-subdir=0 |
|
9 |
- |
|
10 |
-[SimpGB] |
|
11 |
-url=http://www.boesch-it.de/ |
|
12 |
-safe=1.47.0 |
|
13 |
-vuln=CVE-2007-5127 |
|
14 |
-file=global.inc.php |
|
15 |
-variable=$version |
|
16 |
-subdir=1 |
|
17 |
-extra_match=$path_simpgb |
... | ... |
@@ -0,0 +1,30 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "DRBGuestbook", |
|
4 |
+ "url": "http://www.dbscripts.net/guestbook/", |
|
5 |
+ "safe": "1.1.14", |
|
6 |
+ "vuln": "CVE-2007-5218", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "README.txt", |
|
10 |
+ "variable": "Version", |
|
11 |
+ "subdir": 0, |
|
12 |
+ "extra_match": "DRBGuestbook" |
|
13 |
+ } |
|
14 |
+ ] |
|
15 |
+ }, |
|
16 |
+ { |
|
17 |
+ "name": "SimpGB", |
|
18 |
+ "url": "http://www.boesch-it.de/", |
|
19 |
+ "safe": "1.47.0", |
|
20 |
+ "vuln": "CVE-2007-5127", |
|
21 |
+ "detection": [ |
|
22 |
+ { |
|
23 |
+ "file": "global.inc.php", |
|
24 |
+ "variable": "$version", |
|
25 |
+ "subdir": 1, |
|
26 |
+ "extra_match": "$path_simpgb" |
|
27 |
+ } |
|
28 |
+ ] |
|
29 |
+ } |
|
30 |
+] |
|
0 | 31 |
\ No newline at end of file |
... | ... |
@@ -1,30 +0,0 @@ |
1 |
-[jquery-min] |
|
2 |
-url=https://jquery.com/ |
|
3 |
-safe=3.4.0 |
|
4 |
-vuln=CVE-2019-11358 |
|
5 |
-latest=3.4.1 |
|
6 |
-file=jquery.min.js |
|
7 |
-subdir=0 |
|
8 |
-variable=/*! jQuery |
|
9 |
-thirdparty=yes |
|
10 |
- |
|
11 |
-[jquery] |
|
12 |
-url=https://jquery.com/ |
|
13 |
-safe=3.4.0 |
|
14 |
-vuln=CVE-2019-11358 |
|
15 |
-latest=3.4.1 |
|
16 |
-file=jquery.js |
|
17 |
-subdir=0 |
|
18 |
-variable=/*! jQuery |
|
19 |
-thirdparty=yes |
|
20 |
- |
|
21 |
-[bootstrap] |
|
22 |
-url=https://getbootstrap.com/ |
|
23 |
-safe=4.3.1 |
|
24 |
-old_safe=3.4.1 |
|
25 |
-vuln=CVE-2019-8331 |
|
26 |
-latest=3.4.1 |
|
27 |
-file=bootstrap.min.css |
|
28 |
-subdir=0 |
|
29 |
-variable=* Bootstrap v |
|
30 |
-thirdparty=yes |
... | ... |
@@ -0,0 +1,48 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "jquery-min", |
|
4 |
+ "url": "https://jquery.com/", |
|
5 |
+ "safe": "3.4.0", |
|
6 |
+ "vuln": "CVE-2019-11358", |
|
7 |
+ "latest": "3.4.1", |
|
8 |
+ "thirdparty": "yes", |
|
9 |
+ "detection": [ |
|
10 |
+ { |
|
11 |
+ "file": "jquery.min.js", |
|
12 |
+ "variable": "/*! jQuery", |
|
13 |
+ "subdir": 0 |
|
14 |
+ } |
|
15 |
+ ] |
|
16 |
+ }, |
|
17 |
+ { |
|
18 |
+ "name": "jquery", |
|
19 |
+ "url": "https://jquery.com/", |
|
20 |
+ "safe": "3.4.0", |
|
21 |
+ "vuln": "CVE-2019-11358", |
|
22 |
+ "latest": "3.4.1", |
|
23 |
+ "thirdparty": "yes", |
|
24 |
+ "detection": [ |
|
25 |
+ { |
|
26 |
+ "file": "jquery.js", |
|
27 |
+ "variable": "/*! jQuery", |
|
28 |
+ "subdir": 0 |
|
29 |
+ } |
|
30 |
+ ] |
|
31 |
+ }, |
|
32 |
+ { |
|
33 |
+ "name": "bootstrap", |
|
34 |
+ "url": "https://getbootstrap.com/", |
|
35 |
+ "safe": "4.3.1", |
|
36 |
+ "old_safe": "3.4.1", |
|
37 |
+ "vuln": "CVE-2019-8331", |
|
38 |
+ "latest": "3.4.1", |
|
39 |
+ "thirdparty": "yes", |
|
40 |
+ "detection": [ |
|
41 |
+ { |
|
42 |
+ "file": "bootstrap.min.css", |
|
43 |
+ "variable": "* Bootstrap v", |
|
44 |
+ "subdir": 0 |
|
45 |
+ } |
|
46 |
+ ] |
|
47 |
+ } |
|
48 |
+] |
|
0 | 49 |
\ No newline at end of file |
... | ... |
@@ -0,0 +1,16 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "cpDynaLinks", |
|
4 |
+ "url": "https://web.archive.org/web/20160423004721/http://www.cplinks.com/cpdynalinks/", |
|
5 |
+ "safe": "", |
|
6 |
+ "vuln": "CVE-2007-5408", |
|
7 |
+ "latest": "1.02", |
|
8 |
+ "detection": [ |
|
9 |
+ { |
|
10 |
+ "file": "version.php", |
|
11 |
+ "variable": "$cplinks_version", |
|
12 |
+ "subdir": 0 |
|
13 |
+ } |
|
14 |
+ ] |
|
15 |
+ } |
|
16 |
+] |
|
0 | 17 |
\ No newline at end of file |
... | ... |
@@ -1,418 +0,0 @@ |
1 |
-[phpMyAdmin-veryold] |
|
2 |
-url=https://www.phpmyadmin.net/ |
|
3 |
-safe=4.9.2 |
|
4 |
-vuln=CVE-2019-18622 |
|
5 |
-file=Config.class.php |
|
6 |
-variable=PMA_VERSION |
|
7 |
-subdir=1 |
|
8 |
- |
|
9 |
-[phpMyAdmin-old] |
|
10 |
-url=https://www.phpmyadmin.net/ |
|
11 |
-safe=4.9.2 |
|
12 |
-vuln=CVE-2019-18622 |
|
13 |
-file=Config.php |
|
14 |
-variable=PMA_VERSION |
|
15 |
-subdir=1 |
|
16 |
-extra_match=namespace PMA\libraries; |
|
17 |
- |
|
18 |
-[phpMyAdmin] |
|
19 |
-url=https://www.phpmyadmin.net/ |
|
20 |
-safe=4.9.2 |
|
21 |
-vuln=CVE-2019-18622 |
|
22 |
-file=Config.php |
|
23 |
-variable=PMA_VERSION |
|
24 |
-subdir=2 |
|
25 |
-extra_match=namespace PhpMyAdmin; |
|
26 |
- |
|
27 |
-[SquirrelMail] |
|
28 |
-url=https://squirrelmail.org/ |
|
29 |
-safe=1.4.22 |
|
30 |
-vuln=CVE-2010-4554 |
|
31 |
-file=strings.php |
|
32 |
-variable=$version |
|
33 |
-extra_match=SquirrelMail version number |
|
34 |
-subdir=1 |
|
35 |
- |
|
36 |
-[Mantis-deprecated] |
|
37 |
-url=https://mantisbt.org/ |
|
38 |
-safe=2.22.1 |
|
39 |
-vuln=CVE-2019-15715 |
|
40 |
-file=config_defaults_inc.php |
|
41 |
-variable=$g_mantis_version |
|
42 |
-subdir=0 |
|
43 |
- |
|
44 |
-[Mantis] |
|
45 |
-url=https://mantisbt.org/ |
|
46 |
-safe=2.22.1 |
|
47 |
-vuln=CVE-2019-15715 |
|
48 |
-file=constant_inc.php |
|
49 |
-variable=MANTIS_VERSION |
|
50 |
-subdir=1 |
|
51 |
- |
|
52 |
-[Bugzilla3] |
|
53 |
-url=https://www.bugzilla.org/ |
|
54 |
-safe=4.4.7 |
|
55 |
-old_safe=4.2.12,4.0.16 |
|
56 |
-vuln=CVE-2011-2379 |
|
57 |
-file=Constants.pm |
|
58 |
-variable=BUGZILLA_VERSION |
|
59 |
-subdir=1 |
|
60 |
- |
|
61 |
-[Bugzilla2] |
|
62 |
-url=https://www.bugzilla.org/ |
|
63 |
-safe=4.4.7 |
|
64 |
-old_safe=4.2.12,4.0.16 |
|
65 |
-vuln=CVE-2011-2379 |
|
66 |
-file=Config.pm |
|
67 |
-variable=$Bugzilla::Config::VERSION |
|
68 |
-subdir=1 |
|
69 |
- |
|
70 |
-[SimpNews] |
|
71 |
-url=http://www.boesch-it.de |
|
72 |
-safe=2.48 |
|
73 |
-vuln=CVE-2010-2858 |
|
74 |
-file=global.inc.php |
|
75 |
-variable=$version |
|
76 |
-subdir=1 |
|
77 |
-extra_match=$path_simpnews |
|
78 |
- |
|
79 |
-[calendarix] |
|
80 |
-url=http://www.calendarix.com/ |
|
81 |
-safe= |
|
82 |
-vuln=CVE-2007-3183 |
|
83 |
-file=cal_config.inc.php |
|
84 |
-variable=$version |
|
85 |
-subdir=0 |
|
86 |
- |
|
87 |
-[myEvent] |
|
88 |
-url=http://mywebland.com/ |
|
89 |
-safe= |
|
90 |
-vuln=CVE-2007-0690 |
|
91 |
-file=config.php |
|
92 |
-variable=$version |
|
93 |
-extra_match=$eventbgcolor |
|
94 |
-subdir=0 |
|
95 |
- |
|
96 |
-[php-stats] |
|
97 |
-url=http://php-stats.com/ |
|
98 |
-safe= |
|
99 |
-vuln=CVE-2007-5453 |
|
100 |
-file=update.php |
|
101 |
-variable=$version |
|
102 |
-extra_match=http://php-stats.com/ |
|
103 |
-subdir=0 |
|
104 |
- |
|
105 |
-[Ampache] |
|
106 |
-url=http://ampache.org/ |
|
107 |
-safe=3.5.3 |
|
108 |
-vuln=http://ampache.org/2009/12/20/3-5-3-security-release/ |
|
109 |
-file=init.php |
|
110 |
-variable=$results['version'] |
|
111 |
-subdir=1 |
|
112 |
-extra_match=$ampache_path |
|
113 |
- |
|
114 |
-[SiteBar] |
|
115 |
-url=http://sitebar.org/ |
|
116 |
-safe=3.3.9 |
|
117 |
-vuln=CVE-2007-5492 |
|
118 |
-file=database.inc.php |
|
119 |
-variable=SB_CURRENT_RELEASE |
|
120 |
-subdir=1 |
|
121 |
- |
|
122 |
-[phpPgAdmin] |
|
123 |
-url=http://phppgadmin.sourceforge.net/ |
|
124 |
-safe=5.0.4 |
|
125 |
-vuln=CVE-2012-1600 |
|
126 |
-file=lib.inc.php |
|
127 |
-variable=$appVersion |
|
128 |
-subdir=1 |
|
129 |
-extra_match=phpPgAdmin |
|
130 |
- |
|
131 |
-[FTP Admin] |
|
132 |
-url=http://ftpadmin.sourceforge.net/ |
|
133 |
-safe= |
|
134 |
-vuln=CVE-2007-6234 |
|
135 |
-file=session_start.php |
|
136 |
-variable=VERSION |
|
137 |
-subdir=0 |
|
138 |
-extra_match=define("TITLE", "FTP Admin"); |
|
139 |
- |
|
140 |
-[RoundCube-deprecated] |
|
141 |
-url=https://roundcube.net |
|
142 |
-safe=1.3.10 |
|
143 |
-vuln=CVE-2019-10740 |
|
144 |
-file=index.php |
|
145 |
-variable=RCMAIL_VERSION |
|
146 |
-subdir=0 |
|
147 |
- |
|
148 |
-[RoundCube] |
|
149 |
-url=https://roundcube.net |
|
150 |
-safe=1.3.10 |
|
151 |
-vuln=CVE-2019-10740 |
|
152 |
-file=iniset.php |
|
153 |
-variable=RCMAIL_VERSION |
|
154 |
-subdir=2 |
|
155 |
- |
|
156 |
-[Moodle] |
|
157 |
-url=https://moodle.org/ |
|
158 |
-safe=3.2.2 |
|
159 |
-old_safe=3.1.5,3.0.9,2.7.19 |
|
160 |
-vuln=CVE-2017-2641 |
|
161 |
-file=version.php |
|
162 |
-variable=$release |
|
163 |
-subdir=0 |
|
164 |
-extra_match=MOODLE VERSION INFORMATION |
|
165 |
- |
|
166 |
-[cacti] |
|
167 |
-url=http://www.cacti.net/ |
|
168 |
-safe=0.8.7 |
|
169 |
-vuln=CVE-2007-6035 |
|
170 |
-file=global.php |
|
171 |
-variable=$config["cacti_version"] |
|
172 |
-subdir=1 |
|
173 |
- |
|
174 |
-[gnopaste] |
|
175 |
-url=http://gnopaste.sf.net/ |
|
176 |
-safe=0.5.4 |
|
177 |
-vuln=CVE-2006-2834 |
|
178 |
-file=install.php |
|
179 |
-variable=$_SESSION['page_title'] = 'gnopaste |
|
180 |
-subdir=0 |
|
181 |
- |
|
182 |
-[Flyspray] |
|
183 |
-url=http://www.flyspray.org/ |
|
184 |
-safe=0.9.9.7 |
|
185 |
-vuln=CVE-2012-1058 |
|
186 |
-file=class.flyspray.php |
|
187 |
-variable=var $version |
|
188 |
-subdir=1 |
|
189 |
- |
|
190 |
-[phpMyID] |
|
191 |
-url=http://siege.org/projects/phpMyID |
|
192 |
-safe= |
|
193 |
-vuln=CVE-2008-4730 |
|
194 |
-file=MyID.php |
|
195 |
-variable=@version |
|
196 |
-subdir=0 |
|
197 |
- |
|
198 |
-[phplist-old] |
|
199 |
-url=http://www.phplist.com/ |
|
200 |
-safe=3.2.7 |
|
201 |
-vuln=CVE-2016-10045 |
|
202 |
-file=connect.php |
|
203 |
-variable=define("VERSION" |
|
204 |
-subdir=1 |
|
205 |
- |
|
206 |
-[phplist] |
|
207 |
-url=http://www.phplist.com/ |
|
208 |
-safe=3.2.7 |
|
209 |
-vuln=CVE-2016-10045 |
|
210 |
-file=init.php |
|
211 |
-variable=define("VERSION" |
|
212 |
-subdir=1 |
|
213 |
- |
|
214 |
-[Piwik] |
|
215 |
-url=https://matomo.org/ |
|
216 |
-safe=3.12.0 |
|
217 |
-vuln=https://matomo.org/changelog/matomo-3-12-0/ |
|
218 |
-file=Version.php |
|
219 |
-variable=const VERSION |
|
220 |
-subdir=1 |
|
221 |
-extra_match=@link http://piwik.org |
|
222 |
- |
|
223 |
-[Matomo] |
|
224 |
-url=https://matomo.org/ |
|
225 |
-safe=3.12.0 |
|
226 |
-latest=3.13.0 |
|
227 |
-vuln=https://matomo.org/changelog/matomo-3-12-0/ |
|
228 |
-file=Version.php |
|
229 |
-variable=const VERSION |
|
230 |
-subdir=1 |
|
231 |
-extra_match=@link https://matomo.org |
|
232 |
- |
|
233 |
-[phpWishlist] |
|
234 |
-url=http://phpwishlist.sourceforge.net/ |
|
235 |
-safe=0.1.15 |
|
236 |
-vuln=CVE-2005-2203 |
|
237 |
-file=header.inc.php |
|
238 |
-variable=$version |
|
239 |
-subdir=1 |
|
240 |
-extra_match=* Wishlist - |
|
241 |
- |
|
242 |
-[awstats] |
|
243 |
-url=http://awstats.sourceforge.net/ |
|
244 |
-safe=7.1 |
|
245 |
-vuln=CVE-2012-4547 |
|
246 |
-file=awstats.pl |
|
247 |
-variable=$VERSION = |
|
248 |
-subdir=0 |
|
249 |
- |
|
250 |
-[phpMyFAQ] |
|
251 |
-url=http://www.phpmyfaq.de/ |
|
252 |
-safe=2.5.5 |
|
253 |
-vuln=http://www.phpmyfaq.de/advisory_2009-12-01.php |
|
254 |
-file=phpmyfaq.spec |
|
255 |
-variable=version |
|
256 |
-subdir=1 |
|
257 |
- |
|
258 |
-[Horde-webmail] |
|
259 |
-url=http://www.horde.org/ |
|
260 |
-file=bundle.php |
|
261 |
-variable=BUNDLE_VERSION |
|
262 |
-extra_match='Horde Groupware Webmail Edition' |
|
263 |
-safe=1.2.7 |
|
264 |
-vuln=http://secunia.com/advisories/39860 |
|
265 |
-subdir=1 |
|
266 |
- |
|
267 |
-[ResourceSpace] |
|
268 |
-url=http://www.resourcespace.org/ |
|
269 |
-file=version.php |
|
270 |
-variable=$productname='ResourceSpace';$productversion |
|
271 |
-safe=4.2.2833 |
|
272 |
-latest=4.3.2912 |
|
273 |
-vuln=CVE-2011-4311 |
|
274 |
-subdir=1 |
|
275 |
- |
|
276 |
-[apc.php] |
|
277 |
-url=http://pecl.php.net/package/APC |
|
278 |
-file=apc.php |
|
279 |
-# this does not contain it's "real" version number, using the CVS id |
|
280 |
-# instead - there's been an XSS pre 3.1.4. |
|
281 |
-variable=$VERSION='$Id: apc.php |
|
282 |
-safe=301867 |
|
283 |
-vuln=CVE-2010-3294 |
|
284 |
-subdir=0 |
|
285 |
- |
|
286 |
-[webtrees] |
|
287 |
-url=http://webtrees.net/ |
|
288 |
-file=session.php |
|
289 |
-variable=define('WT_VERSION' |
|
290 |
-safe=1.2.4 |
|
291 |
-latest=1.2.4 |
|
292 |
-vuln=http://webtrees.net/en/forums/2-open-discussion/16423-webtrees-124 |
|
293 |
-subdir=1 |
|
294 |
- |
|
295 |
-[PhpGedView] |
|
296 |
-url=http://phpgedview.sourceforge.net/ |
|
297 |
-file=session.php |
|
298 |
-variable=define('PGV_VERSION' |
|
299 |
-safe= |
|
300 |
-vuln=CVE-2011-0405 |
|
301 |
-subdir=1 |
|
302 |
- |
|
303 |
-[status.net] |
|
304 |
-url=http://status.net |
|
305 |
-file=common.php |
|
306 |
-variable=define('STATUSNET_BASE_VERSION' |
|
307 |
-safe=0.9.9 |
|
308 |
-vuln=CVE-2011-3370 |
|
309 |
-subdir=1 |
|
310 |
- |
|
311 |
-[limesurvey18] |
|
312 |
-url=http://www.limesurvey.org/ |
|
313 |
-file=common.php |
|
314 |
-variable=$versionnumber |
|
315 |
-extra_match=LimeSurvey |
|
316 |
-safe=2.07 |
|
317 |
-vuln=CVE-2015-5078 |
|
318 |
-subdir=0 |
|
319 |
- |
|
320 |
-[limesurvey19] |
|
321 |
-url=http://www.limesurvey.org/ |
|
322 |
-file=version.php |
|
323 |
-variable=$versionnumber |
|
324 |
-extra_match=$dbversionnumber |
|
325 |
-safe=2.07 |
|
326 |
-vuln=CVE-2015-5078 |
|
327 |
-subdir=0 |
|
328 |
- |
|
329 |
-[limesurvey] |
|
330 |
-url=http://www.limesurvey.org/ |
|
331 |
-file=version.php |
|
332 |
-variable=$config['versionnumber'] |
|
333 |
-extra_match=LimeSurvey |
|
334 |
-safe=2.07 |
|
335 |
-vuln=CVE-2015-5078 |
|
336 |
-subdir=2 |
|
337 |
- |
|
338 |
-[webcalendar] |
|
339 |
-url=http://www.k5n.us/webcalendar.php |
|
340 |
-file=config.php |
|
341 |
-variable=$PROGRAM_VERSION |
|
342 |
-extra_match=@package WebCalendar |
|
343 |
-safe=1.2.7 |
|
344 |
-vuln=CVE-2013-1422 |
|
345 |
-subdir=1 |
|
346 |
- |
|
347 |
-[nextcloud] |
|
348 |
-url=https://nextcloud.com |
|
349 |
-file=version.php |
|
350 |
-variable=$OC_VersionString |
|
351 |
-vuln=CVE-2019-5449 |
|
352 |
-safe=15.0.1 |
|
353 |
-old_safe=14.0.5,13.0.9 |
|
354 |
-subdir=0 |
|
355 |
-extra_match=$vendor = 'nextcloud'; |
|
356 |
- |
|
357 |
-[owncloud] |
|
358 |
-url=https://owncloud.org/ |
|
359 |
-file=version.php |
|
360 |
-variable=$OC_VersionString |
|
361 |
-subdir=0 |
|
362 |
-extra_nomatch=nextcloud |
|
363 |
-vuln=https://owncloud.org/security/advisories/possibility-to-extend-internal-share-permissions-using-the-api/ |
|
364 |
-safe=10.2.1 |
|
365 |
- |
|
366 |
-[owncloud5] |
|
367 |
-url=https://owncloud.org/ |
|
368 |
-file=util.php |
|
369 |
-variable=return ' |
|
370 |
-subdir=1 |
|
371 |
-extra_match=class OC_Util |
|
372 |
-vuln=https://owncloud.org/security/advisories/possibility-to-extend-internal-share-permissions-using-the-api/ |
|
373 |
-safe=10.2.1 |
|
374 |
- |
|
375 |
-[videodb] |
|
376 |
-url=http://www.videodb.net/ |
|
377 |
-file=constants.php |
|
378 |
-variable=('VERSION', |
|
379 |
-extra_match=TBL_ |
|
380 |
-safe=4.0 |
|
381 |
-vuln=http://www.exploit-db.com/exploits/17660/ |
|
382 |
-subdir=1 |
|
383 |
- |
|
384 |
-[OpenX] |
|
385 |
-url=http://www.openx.com/ |
|
386 |
-file=constants.php |
|
387 |
-variable=OA_VERSION |
|
388 |
-extra_match=OpenX |
|
389 |
-safe= |
|
390 |
-vuln=http://www.kreativrauschen.com/blog/2013/12/18/zero-day-vulnerability-in-openx-source-2-8-11-and-revive-adserver-3-0-1/ |
|
391 |
-subdir=0 |
|
392 |
- |
|
393 |
-[revive] |
|
394 |
-url=http://www.revive-adserver.com/ |
|
395 |
-file=constants.php |
|
396 |
-variable=VERSION |
|
397 |
-extra_match=Revive Adserver |
|
398 |
-safe=3.0.5 |
|
399 |
-vuln=CVE-2013-5954 |
|
400 |
-subdir=0 |
|
401 |
- |
|
402 |
-[osTicket] |
|
403 |
-url=http://osticket.com/ |
|
404 |
-file=bootstrap.php |
|
405 |
-variable=define('THIS_VERSION', |
|
406 |
-safe=1.8.12 |
|
407 |
-latest=1.9.12 |
|
408 |
-vuln=https://github.com/osTicket/osTicket-1.8/releases/tag/v1.8.12 |
|
409 |
-subdir=0 |
|
410 |
- |
|
411 |
-[Gitlist] |
|
412 |
-url=https://gitlist.org/ |
|
413 |
-file=footer.twig |
|
414 |
-variable=Powered by |
|
415 |
-safe=0.7.0 |
|
416 |
-latest=1.0.2 |
|
417 |
-vuln=CVE-2018-1000533 |
|
418 |
-subdir=3 |
... | ... |
@@ -0,0 +1,660 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "phpMyAdmin-veryold", |
|
4 |
+ "url": "https://www.phpmyadmin.net/", |
|
5 |
+ "safe": "4.9.2", |
|
6 |
+ "vuln": "CVE-2019-18622", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "Config.class.php", |
|
10 |
+ "variable": "PMA_VERSION", |
|
11 |
+ "subdir": 1 |
|
12 |
+ } |
|
13 |
+ ] |
|
14 |
+ }, |
|
15 |
+ { |
|
16 |
+ "name": "phpMyAdmin-old", |
|
17 |
+ "url": "https://www.phpmyadmin.net/", |
|
18 |
+ "safe": "4.9.2", |
|
19 |
+ "vuln": "CVE-2019-18622", |
|
20 |
+ "detection": [ |
|
21 |
+ { |
|
22 |
+ "file": "Config.php", |
|
23 |
+ "variable": "PMA_VERSION", |
|
24 |
+ "subdir": 1, |
|
25 |
+ "extra_match": "namespace PMA\\libraries;" |
|
26 |
+ } |
|
27 |
+ ] |
|
28 |
+ }, |
|
29 |
+ { |
|
30 |
+ "name": "phpMyAdmin", |
|
31 |
+ "url": "https://www.phpmyadmin.net/", |
|
32 |
+ "safe": "4.9.2", |
|
33 |
+ "vuln": "CVE-2019-18622", |
|
34 |
+ "detection": [ |
|
35 |
+ { |
|
36 |
+ "file": "Config.php", |
|
37 |
+ "variable": "PMA_VERSION", |
|
38 |
+ "subdir": 2, |
|
39 |
+ "extra_match": "namespace PhpMyAdmin;" |
|
40 |
+ } |
|
41 |
+ ] |
|
42 |
+ }, |
|
43 |
+ { |
|
44 |
+ "name": "SquirrelMail", |
|
45 |
+ "url": "https://squirrelmail.org/", |
|
46 |
+ "safe": "1.4.22", |
|
47 |
+ "vuln": "CVE-2010-4554", |
|
48 |
+ "detection": [ |
|
49 |
+ { |
|
50 |
+ "file": "strings.php", |
|
51 |
+ "variable": "$version", |
|
52 |
+ "subdir": 1, |
|
53 |
+ "extra_match": "SquirrelMail version number" |
|
54 |
+ } |
|
55 |
+ ] |
|
56 |
+ }, |
|
57 |
+ { |
|
58 |
+ "name": "Mantis-deprecated", |
|
59 |
+ "url": "https://mantisbt.org/", |
|
60 |
+ "safe": "2.22.1", |
|
61 |
+ "vuln": "CVE-2019-15715", |
|
62 |
+ "detection": [ |
|
63 |
+ { |
|
64 |
+ "file": "config_defaults_inc.php", |
|
65 |
+ "variable": "$g_mantis_version", |
|
66 |
+ "subdir": 0 |
|
67 |
+ } |
|
68 |
+ ] |
|
69 |
+ }, |
|
70 |
+ { |
|
71 |
+ "name": "Mantis", |
|
72 |
+ "url": "https://mantisbt.org/", |
|
73 |
+ "safe": "2.22.1", |
|
74 |
+ "vuln": "CVE-2019-15715", |
|
75 |
+ "detection": [ |
|
76 |
+ { |
|
77 |
+ "file": "constant_inc.php", |
|
78 |
+ "variable": "MANTIS_VERSION", |
|
79 |
+ "subdir": 1 |
|
80 |
+ } |
|
81 |
+ ] |
|
82 |
+ }, |
|
83 |
+ { |
|
84 |
+ "name": "Bugzilla3", |
|
85 |
+ "url": "https://www.bugzilla.org/", |
|
86 |
+ "safe": "4.4.7", |
|
87 |
+ "old_safe": "4.2.12,4.0.16", |
|
88 |
+ "vuln": "CVE-2011-2379", |
|
89 |
+ "detection": [ |
|
90 |
+ { |
|
91 |
+ "file": "Constants.pm", |
|
92 |
+ "variable": "BUGZILLA_VERSION", |
|
93 |
+ "subdir": 1 |
|
94 |
+ } |
|
95 |
+ ] |
|
96 |
+ }, |
|
97 |
+ { |
|
98 |
+ "name": "Bugzilla2", |
|
99 |
+ "url": "https://www.bugzilla.org/", |
|
100 |
+ "safe": "4.4.7", |
|
101 |
+ "old_safe": "4.2.12,4.0.16", |
|
102 |
+ "vuln": "CVE-2011-2379", |
|
103 |
+ "detection": [ |
|
104 |
+ { |
|
105 |
+ "file": "Config.pm", |
|
106 |
+ "variable": "$Bugzilla::Config::VERSION", |
|
107 |
+ "subdir": 1 |
|
108 |
+ } |
|
109 |
+ ] |
|
110 |
+ }, |
|
111 |
+ { |
|
112 |
+ "name": "SimpNews", |
|
113 |
+ "url": "http://www.boesch-it.de", |
|
114 |
+ "safe": "2.48", |
|
115 |
+ "vuln": "CVE-2010-2858", |
|
116 |
+ "detection": [ |
|
117 |
+ { |
|
118 |
+ "file": "global.inc.php", |
|
119 |
+ "variable": "$version", |
|
120 |
+ "subdir": 1, |
|
121 |
+ "extra_match": "$path_simpnews" |
|
122 |
+ } |
|
123 |
+ ] |
|
124 |
+ }, |
|
125 |
+ { |
|
126 |
+ "name": "calendarix", |
|
127 |
+ "url": "http://www.calendarix.com/", |
|
128 |
+ "safe": "", |
|
129 |
+ "vuln": "CVE-2007-3183", |
|
130 |
+ "detection": [ |
|
131 |
+ { |
|
132 |
+ "file": "cal_config.inc.php", |
|
133 |
+ "variable": "$version", |
|
134 |
+ "subdir": 0 |
|
135 |
+ } |
|
136 |
+ ] |
|
137 |
+ }, |
|
138 |
+ { |
|
139 |
+ "name": "myEvent", |
|
140 |
+ "url": "http://mywebland.com/", |
|
141 |
+ "safe": "", |
|
142 |
+ "vuln": "CVE-2007-0690", |
|
143 |
+ "detection": [ |
|
144 |
+ { |
|
145 |
+ "file": "config.php", |
|
146 |
+ "variable": "$version", |
|
147 |
+ "subdir": 0, |
|
148 |
+ "extra_match": "$eventbgcolor" |
|
149 |
+ } |
|
150 |
+ ] |
|
151 |
+ }, |
|
152 |
+ { |
|
153 |
+ "name": "php-stats", |
|
154 |
+ "url": "http://php-stats.com/", |
|
155 |
+ "safe": "", |
|
156 |
+ "vuln": "CVE-2007-5453", |
|
157 |
+ "detection": [ |
|
158 |
+ { |
|
159 |
+ "file": "update.php", |
|
160 |
+ "variable": "$version", |
|
161 |
+ "subdir": 0, |
|
162 |
+ "extra_match": "http://php-stats.com/" |
|
163 |
+ } |
|
164 |
+ ] |
|
165 |
+ }, |
|
166 |
+ { |
|
167 |
+ "name": "Ampache", |
|
168 |
+ "url": "http://ampache.org/", |
|
169 |
+ "safe": "3.5.3", |
|
170 |
+ "vuln": "http://ampache.org/2009/12/20/3-5-3-security-release/", |
|
171 |
+ "detection": [ |
|
172 |
+ { |
|
173 |
+ "file": "init.php", |
|
174 |
+ "variable": "$results['version']", |
|
175 |
+ "subdir": 1, |
|
176 |
+ "extra_match": "$ampache_path" |
|
177 |
+ } |
|
178 |
+ ] |
|
179 |
+ }, |
|
180 |
+ { |
|
181 |
+ "name": "SiteBar", |
|
182 |
+ "url": "http://sitebar.org/", |
|
183 |
+ "safe": "3.3.9", |
|
184 |
+ "vuln": "CVE-2007-5492", |
|
185 |
+ "detection": [ |
|
186 |
+ { |
|
187 |
+ "file": "database.inc.php", |
|
188 |
+ "variable": "SB_CURRENT_RELEASE", |
|
189 |
+ "subdir": 1 |
|
190 |
+ } |
|
191 |
+ ] |
|
192 |
+ }, |
|
193 |
+ { |
|
194 |
+ "name": "phpPgAdmin", |
|
195 |
+ "url": "http://phppgadmin.sourceforge.net/", |
|
196 |
+ "safe": "5.0.4", |
|
197 |
+ "vuln": "CVE-2012-1600", |
|
198 |
+ "detection": [ |
|
199 |
+ { |
|
200 |
+ "file": "lib.inc.php", |
|
201 |
+ "variable": "$appVersion", |
|
202 |
+ "subdir": 1, |
|
203 |
+ "extra_match": "phpPgAdmin" |
|
204 |
+ } |
|
205 |
+ ] |
|
206 |
+ }, |
|
207 |
+ { |
|
208 |
+ "name": "FTP Admin", |
|
209 |
+ "url": "http://ftpadmin.sourceforge.net/", |
|
210 |
+ "safe": "", |
|
211 |
+ "vuln": "CVE-2007-6234", |
|
212 |
+ "detection": [ |
|
213 |
+ { |
|
214 |
+ "file": "session_start.php", |
|
215 |
+ "variable": "VERSION", |
|
216 |
+ "subdir": 0, |
|
217 |
+ "extra_match": "define(\"TITLE\", \"FTP Admin\");" |
|
218 |
+ } |
|
219 |
+ ] |
|
220 |
+ }, |
|
221 |
+ { |
|
222 |
+ "name": "RoundCube-deprecated", |
|
223 |
+ "url": "https://roundcube.net", |
|
224 |
+ "safe": "1.3.10", |
|
225 |
+ "vuln": "CVE-2019-10740", |
|
226 |
+ "detection": [ |
|
227 |
+ { |
|
228 |
+ "file": "index.php", |
|
229 |
+ "variable": "RCMAIL_VERSION", |
|
230 |
+ "subdir": 0 |
|
231 |
+ } |
|
232 |
+ ] |
|
233 |
+ }, |
|
234 |
+ { |
|
235 |
+ "name": "RoundCube", |
|
236 |
+ "url": "https://roundcube.net", |
|
237 |
+ "safe": "1.3.10", |
|
238 |
+ "vuln": "CVE-2019-10740", |
|
239 |
+ "detection": [ |
|
240 |
+ { |
|
241 |
+ "file": "iniset.php", |
|
242 |
+ "variable": "RCMAIL_VERSION", |
|
243 |
+ "subdir": 2 |
|
244 |
+ } |
|
245 |
+ ] |
|
246 |
+ }, |
|
247 |
+ { |
|
248 |
+ "name": "Moodle", |
|
249 |
+ "url": "https://moodle.org/", |
|
250 |
+ "safe": "3.2.2", |
|
251 |
+ "old_safe": "3.1.5,3.0.9,2.7.19", |
|
252 |
+ "vuln": "CVE-2017-2641", |
|
253 |
+ "detection": [ |
|
254 |
+ { |
|
255 |
+ "file": "version.php", |
|
256 |
+ "variable": "$release", |
|
257 |
+ "subdir": 0, |
|
258 |
+ "extra_match": "MOODLE VERSION INFORMATION" |
|
259 |
+ } |
|
260 |
+ ] |
|
261 |
+ }, |
|
262 |
+ { |
|
263 |
+ "name": "cacti", |
|
264 |
+ "url": "http://www.cacti.net/", |
|
265 |
+ "safe": "0.8.7", |
|
266 |
+ "vuln": "CVE-2007-6035", |
|
267 |
+ "detection": [ |
|
268 |
+ { |
|
269 |
+ "file": "global.php", |
|
270 |
+ "variable": "$config[\"cacti_version\"]", |
|
271 |
+ "subdir": 1 |
|
272 |
+ } |
|
273 |
+ ] |
|
274 |
+ }, |
|
275 |
+ { |
|
276 |
+ "name": "gnopaste", |
|
277 |
+ "url": "http://gnopaste.sf.net/", |
|
278 |
+ "safe": "0.5.4", |
|
279 |
+ "vuln": "CVE-2006-2834", |
|
280 |
+ "detection": [ |
|
281 |
+ { |
|
282 |
+ "file": "install.php", |
|
283 |
+ "variable": "$_SESSION['page_title'] = 'gnopaste", |
|
284 |
+ "subdir": 0 |
|
285 |
+ } |
|
286 |
+ ] |
|
287 |
+ }, |
|
288 |
+ { |
|
289 |
+ "name": "Flyspray", |
|
290 |
+ "url": "http://www.flyspray.org/", |
|
291 |
+ "safe": "0.9.9.7", |
|
292 |
+ "vuln": "CVE-2012-1058", |
|
293 |
+ "detection": [ |
|
294 |
+ { |
|
295 |
+ "file": "class.flyspray.php", |
|
296 |
+ "variable": "var $version", |
|
297 |
+ "subdir": 1 |
|
298 |
+ } |
|
299 |
+ ] |
|
300 |
+ }, |
|
301 |
+ { |
|
302 |
+ "name": "phpMyID", |
|
303 |
+ "url": "http://siege.org/projects/phpMyID", |
|
304 |
+ "safe": "", |
|
305 |
+ "vuln": "CVE-2008-4730", |
|
306 |
+ "detection": [ |
|
307 |
+ { |
|
308 |
+ "file": "MyID.php", |
|
309 |
+ "variable": "@version", |
|
310 |
+ "subdir": 0 |
|
311 |
+ } |
|
312 |
+ ] |
|
313 |
+ }, |
|
314 |
+ { |
|
315 |
+ "name": "phplist-old", |
|
316 |
+ "url": "http://www.phplist.com/", |
|
317 |
+ "safe": "3.2.7", |
|
318 |
+ "vuln": "CVE-2016-10045", |
|
319 |
+ "detection": [ |
|
320 |
+ { |
|
321 |
+ "file": "connect.php", |
|
322 |
+ "variable": "define(\"VERSION\"", |
|
323 |
+ "subdir": 1 |
|
324 |
+ } |
|
325 |
+ ] |
|
326 |
+ }, |
|
327 |
+ { |
|
328 |
+ "name": "phplist", |
|
329 |
+ "url": "http://www.phplist.com/", |
|
330 |
+ "safe": "3.2.7", |
|
331 |
+ "vuln": "CVE-2016-10045", |
|
332 |
+ "detection": [ |
|
333 |
+ { |
|
334 |
+ "file": "init.php", |
|
335 |
+ "variable": "define(\"VERSION\"", |
|
336 |
+ "subdir": 1 |
|
337 |
+ } |
|
338 |
+ ] |
|
339 |
+ }, |
|
340 |
+ { |
|
341 |
+ "name": "Piwik", |
|
342 |
+ "url": "https://matomo.org/", |
|
343 |
+ "safe": "3.12.0", |
|
344 |
+ "vuln": "https://matomo.org/changelog/matomo-3-12-0/", |
|
345 |
+ "detection": [ |
|
346 |
+ { |
|
347 |
+ "file": "Version.php", |
|
348 |
+ "variable": "const VERSION", |
|
349 |
+ "subdir": 1, |
|
350 |
+ "extra_match": "@link http://piwik.org" |
|
351 |
+ } |
|
352 |
+ ] |
|
353 |
+ }, |
|
354 |
+ { |
|
355 |
+ "name": "Matomo", |
|
356 |
+ "url": "https://matomo.org/", |
|
357 |
+ "safe": "3.12.0", |
|
358 |
+ "vuln": "https://matomo.org/changelog/matomo-3-12-0/", |
|
359 |
+ "latest": "3.13.0", |
|
360 |
+ "detection": [ |
|
361 |
+ { |
|
362 |
+ "file": "Version.php", |
|
363 |
+ "variable": "const VERSION", |
|
364 |
+ "subdir": 1, |
|
365 |
+ "extra_match": "@link https://matomo.org" |
|
366 |
+ } |
|
367 |
+ ] |
|
368 |
+ }, |
|
369 |
+ { |
|
370 |
+ "name": "phpWishlist", |
|
371 |
+ "url": "http://phpwishlist.sourceforge.net/", |
|
372 |
+ "safe": "0.1.15", |
|
373 |
+ "vuln": "CVE-2005-2203", |
|
374 |
+ "detection": [ |
|
375 |
+ { |
|
376 |
+ "file": "header.inc.php", |
|
377 |
+ "variable": "$version", |
|
378 |
+ "subdir": 1, |
|
379 |
+ "extra_match": "* Wishlist -" |
|
380 |
+ } |
|
381 |
+ ] |
|
382 |
+ }, |
|
383 |
+ { |
|
384 |
+ "name": "awstats", |
|
385 |
+ "url": "http://awstats.sourceforge.net/", |
|
386 |
+ "safe": "7.1", |
|
387 |
+ "vuln": "CVE-2012-4547", |
|
388 |
+ "detection": [ |
|
389 |
+ { |
|
390 |
+ "file": "awstats.pl", |
|
391 |
+ "variable": "$VERSION =", |
|
392 |
+ "subdir": 0 |
|
393 |
+ } |
|
394 |
+ ] |
|
395 |
+ }, |
|
396 |
+ { |
|
397 |
+ "name": "phpMyFAQ", |
|
398 |
+ "url": "http://www.phpmyfaq.de/", |
|
399 |
+ "safe": "2.5.5", |
|
400 |
+ "vuln": "http://www.phpmyfaq.de/advisory_2009-12-01.php", |
|
401 |
+ "detection": [ |
|
402 |
+ { |
|
403 |
+ "file": "phpmyfaq.spec", |
|
404 |
+ "variable": "version", |
|
405 |
+ "subdir": 1 |
|
406 |
+ } |
|
407 |
+ ] |
|
408 |
+ }, |
|
409 |
+ { |
|
410 |
+ "name": "Horde-webmail", |
|
411 |
+ "url": "http://www.horde.org/", |
|
412 |
+ "safe": "1.2.7", |
|
413 |
+ "vuln": "http://secunia.com/advisories/39860", |
|
414 |
+ "detection": [ |
|
415 |
+ { |
|
416 |
+ "file": "bundle.php", |
|
417 |
+ "variable": "BUNDLE_VERSION", |
|
418 |
+ "subdir": 1, |
|
419 |
+ "extra_match": "'Horde Groupware Webmail Edition'" |
|
420 |
+ } |
|
421 |
+ ] |
|
422 |
+ }, |
|
423 |
+ { |
|
424 |
+ "name": "ResourceSpace", |
|
425 |
+ "url": "http://www.resourcespace.org/", |
|
426 |
+ "safe": "4.2.2833", |
|
427 |
+ "vuln": "CVE-2011-4311", |
|
428 |
+ "latest": "4.3.2912", |
|
429 |
+ "detection": [ |
|
430 |
+ { |
|
431 |
+ "file": "version.php", |
|
432 |
+ "variable": "$productname='ResourceSpace';$productversion", |
|
433 |
+ "subdir": 1 |
|
434 |
+ } |
|
435 |
+ ] |
|
436 |
+ }, |
|
437 |
+ { |
|
438 |
+ "name": "apc.php", |
|
439 |
+ "url": "http://pecl.php.net/package/APC", |
|
440 |
+ "safe": "301867", |
|
441 |
+ "vuln": "CVE-2010-3294", |
|
442 |
+ "note": "this does not contain it's \"real\" version number, using the CVS id instead - there's been an XSS pre 3.1.4.", |
|
443 |
+ "detection": [ |
|
444 |
+ { |
|
445 |
+ "file": "apc.php", |
|
446 |
+ "variable": "$VERSION='$Id: apc.php", |
|
447 |
+ "subdir": 0 |
|
448 |
+ } |
|
449 |
+ ] |
|
450 |
+ }, |
|
451 |
+ { |
|
452 |
+ "name": "webtrees", |
|
453 |
+ "url": "http://webtrees.net/", |
|
454 |
+ "safe": "1.2.4", |
|
455 |
+ "vuln": "http://webtrees.net/en/forums/2-open-discussion/16423-webtrees-124", |
|
456 |
+ "latest": "1.2.4", |
|
457 |
+ "detection": [ |
|
458 |
+ { |
|
459 |
+ "file": "session.php", |
|
460 |
+ "variable": "define('WT_VERSION'", |
|
461 |
+ "subdir": 1 |
|
462 |
+ } |
|
463 |
+ ] |
|
464 |
+ }, |
|
465 |
+ { |
|
466 |
+ "name": "PhpGedView", |
|
467 |
+ "url": "http://phpgedview.sourceforge.net/", |
|
468 |
+ "safe": "", |
|
469 |
+ "vuln": "CVE-2011-0405", |
|
470 |
+ "detection": [ |
|
471 |
+ { |
|
472 |
+ "file": "session.php", |
|
473 |
+ "variable": "define('PGV_VERSION'", |
|
474 |
+ "subdir": 1 |
|
475 |
+ } |
|
476 |
+ ] |
|
477 |
+ }, |
|
478 |
+ { |
|
479 |
+ "name": "status.net", |
|
480 |
+ "url": "http://status.net", |
|
481 |
+ "safe": "0.9.9", |
|
482 |
+ "vuln": "CVE-2011-3370", |
|
483 |
+ "detection": [ |
|
484 |
+ { |
|
485 |
+ "file": "common.php", |
|
486 |
+ "variable": "define('STATUSNET_BASE_VERSION'", |
|
487 |
+ "subdir": 1 |
|
488 |
+ } |
|
489 |
+ ] |
|
490 |
+ }, |
|
491 |
+ { |
|
492 |
+ "name": "limesurvey18", |
|
493 |
+ "url": "http://www.limesurvey.org/", |
|
494 |
+ "safe": "2.07", |
|
495 |
+ "vuln": "CVE-2015-5078", |
|
496 |
+ "detection": [ |
|
497 |
+ { |
|
498 |
+ "file": "common.php", |
|
499 |
+ "variable": "$versionnumber", |
|
500 |
+ "subdir": 0, |
|
501 |
+ "extra_match": "LimeSurvey" |
|
502 |
+ } |
|
503 |
+ ] |
|
504 |
+ }, |
|
505 |
+ { |
|
506 |
+ "name": "limesurvey19", |
|
507 |
+ "url": "http://www.limesurvey.org/", |
|
508 |
+ "safe": "2.07", |
|
509 |
+ "vuln": "CVE-2015-5078", |
|
510 |
+ "detection": [ |
|
511 |
+ { |
|
512 |
+ "file": "version.php", |
|
513 |
+ "variable": "$versionnumber", |
|
514 |
+ "subdir": 0, |
|
515 |
+ "extra_match": "$dbversionnumber" |
|
516 |
+ } |
|
517 |
+ ] |
|
518 |
+ }, |
|
519 |
+ { |
|
520 |
+ "name": "limesurvey", |
|
521 |
+ "url": "http://www.limesurvey.org/", |
|
522 |
+ "safe": "2.07", |
|
523 |
+ "vuln": "CVE-2015-5078", |
|
524 |
+ "detection": [ |
|
525 |
+ { |
|
526 |
+ "file": "version.php", |
|
527 |
+ "variable": "$config['versionnumber']", |
|
528 |
+ "subdir": 2, |
|
529 |
+ "extra_match": "LimeSurvey" |
|
530 |
+ } |
|
531 |
+ ] |
|
532 |
+ }, |
|
533 |
+ { |
|
534 |
+ "name": "webcalendar", |
|
535 |
+ "url": "http://www.k5n.us/webcalendar.php", |
|
536 |
+ "safe": "1.2.7", |
|
537 |
+ "vuln": "CVE-2013-1422", |
|
538 |
+ "detection": [ |
|
539 |
+ { |
|
540 |
+ "file": "config.php", |
|
541 |
+ "variable": "$PROGRAM_VERSION", |
|
542 |
+ "subdir": 1, |
|
543 |
+ "extra_match": "@package WebCalendar" |
|
544 |
+ } |
|
545 |
+ ] |
|
546 |
+ }, |
|
547 |
+ { |
|
548 |
+ "name": "nextcloud", |
|
549 |
+ "url": "https://nextcloud.com", |
|
550 |
+ "safe": "15.0.1", |
|
551 |
+ "old_safe": "14.0.5,13.0.9", |
|
552 |
+ "vuln": "CVE-2019-5449", |
|
553 |
+ "detection": [ |
|
554 |
+ { |
|
555 |
+ "file": "version.php", |
|
556 |
+ "variable": "$OC_VersionString", |
|
557 |
+ "subdir": 0, |
|
558 |
+ "extra_match": "$vendor = 'nextcloud';" |
|
559 |
+ } |
|
560 |
+ ] |
|
561 |
+ }, |
|
562 |
+ { |
|
563 |
+ "name": "owncloud", |
|
564 |
+ "url": "https://owncloud.org/", |
|
565 |
+ "safe": "10.2.1", |
|
566 |
+ "vuln": "https://owncloud.org/security/advisories/possibility-to-extend-internal-share-permissions-using-the-api/", |
|
567 |
+ "detection": [ |
|
568 |
+ { |
|
569 |
+ "file": "version.php", |
|
570 |
+ "variable": "$OC_VersionString", |
|
571 |
+ "subdir": 0, |
|
572 |
+ "extra_nomatch": "nextcloud" |
|
573 |
+ } |
|
574 |
+ ] |
|
575 |
+ }, |
|
576 |
+ { |
|
577 |
+ "name": "owncloud5", |
|
578 |
+ "url": "https://owncloud.org/", |
|
579 |
+ "safe": "10.2.1", |
|
580 |
+ "vuln": "https://owncloud.org/security/advisories/possibility-to-extend-internal-share-permissions-using-the-api/", |
|
581 |
+ "detection": [ |
|
582 |
+ { |
|
583 |
+ "file": "util.php", |
|
584 |
+ "variable": "return '", |
|
585 |
+ "subdir": 1, |
|
586 |
+ "extra_match": "class OC_Util" |
|
587 |
+ } |
|
588 |
+ ] |
|
589 |
+ }, |
|
590 |
+ { |
|
591 |
+ "name": "videodb", |
|
592 |
+ "url": "http://www.videodb.net/", |
|
593 |
+ "safe": "4.0", |
|
594 |
+ "vuln": "http://www.exploit-db.com/exploits/17660/", |
|
595 |
+ "detection": [ |
|
596 |
+ { |
|
597 |
+ "file": "constants.php", |
|
598 |
+ "variable": "('VERSION',", |
|
599 |
+ "subdir": 1, |
|
600 |
+ "extra_match": "TBL_" |
|
601 |
+ } |
|
602 |
+ ] |
|
603 |
+ }, |
|
604 |
+ { |
|
605 |
+ "name": "OpenX", |
|
606 |
+ "url": "http://www.openx.com/", |
|
607 |
+ "safe": "", |
|
608 |
+ "vuln": "http://www.kreativrauschen.com/blog/2013/12/18/zero-day-vulnerability-in-openx-source-2-8-11-and-revive-adserver-3-0-1/", |
|
609 |
+ "detection": [ |
|
610 |
+ { |
|
611 |
+ "file": "constants.php", |
|
612 |
+ "variable": "OA_VERSION", |
|
613 |
+ "subdir": 0, |
|
614 |
+ "extra_match": "OpenX" |
|
615 |
+ } |
|
616 |
+ ] |
|
617 |
+ }, |
|
618 |
+ { |
|
619 |
+ "name": "revive", |
|
620 |
+ "url": "http://www.revive-adserver.com/", |
|
621 |
+ "safe": "3.0.5", |
|
622 |
+ "vuln": "CVE-2013-5954", |
|
623 |
+ "detection": [ |
|
624 |
+ { |
|
625 |
+ "file": "constants.php", |
|
626 |
+ "variable": "VERSION", |
|
627 |
+ "subdir": 0, |
|
628 |
+ "extra_match": "Revive Adserver" |
|
629 |
+ } |
|
630 |
+ ] |
|
631 |
+ }, |
|
632 |
+ { |
|
633 |
+ "name": "osTicket", |
|
634 |
+ "url": "http://osticket.com/", |
|
635 |
+ "safe": "1.8.12", |
|
636 |
+ "vuln": "https://github.com/osTicket/osTicket-1.8/releases/tag/v1.8.12", |
|
637 |
+ "latest": "1.9.12", |
|
638 |
+ "detection": [ |
|
639 |
+ { |
|
640 |
+ "file": "bootstrap.php", |
|
641 |
+ "variable": "define('THIS_VERSION',", |
|
642 |
+ "subdir": 0 |
|
643 |
+ } |
|
644 |
+ ] |
|
645 |
+ }, |
|
646 |
+ { |
|
647 |
+ "name": "Gitlist", |
|
648 |
+ "url": "https://gitlist.org/", |
|
649 |
+ "safe": "0.7.0", |
|
650 |
+ "vuln": "CVE-2018-1000533", |
|
651 |
+ "latest": "1.0.2", |
|
652 |
+ "detection": [ |
|
653 |
+ { |
|
654 |
+ "file": "footer.twig", |
|
655 |
+ "variable": "Powered by", |
|
656 |
+ "subdir": 3 |
|
657 |
+ } |
|
658 |
+ ] |
|
659 |
+ } |
|
660 |
+] |
|
0 | 661 |
\ No newline at end of file |
... | ... |
@@ -0,0 +1,17 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "smarty", |
|
4 |
+ "url": "https://www.smarty.net/", |
|
5 |
+ "safe": "3.1.33", |
|
6 |
+ "vuln": "CVE-2018-16831", |
|
7 |
+ "latest": "3.1.33", |
|
8 |
+ "thirdparty": "yes", |
|
9 |
+ "detection": [ |
|
10 |
+ { |
|
11 |
+ "file": "Smarty.class.php", |
|
12 |
+ "variable": "@version", |
|
13 |
+ "subdir": 1 |
|
14 |
+ } |
|
15 |
+ ] |
|
16 |
+ } |
|
17 |
+] |
|
0 | 18 |
\ No newline at end of file |
... | ... |
@@ -1,191 +0,0 @@ |
1 |
-[Serendipity-mycalendar] |
|
2 |
-url=https://s9y.org |
|
3 |
-safe=0.13 |
|
4 |
-vuln=CVE-2007-6390 |
|
5 |
-file=serendipity_event_mycalendar.php |
|
6 |
-variable=$propbag->add('version' |
|
7 |
-subdir=0 |
|
8 |
- |
|
9 |
-[Serendipity-freetag] |
|
10 |
-url=https://s9y.org |
|
11 |
-safe=3.69 |
|
12 |
-vuln=https://github.com/s9y/additional_plugins/commit/3edecdb7eccc24e0d5c63a3d5702dba54599bda3 |
|
13 |
-file=serendipity_event_freetag.php |
|
14 |
-variable=$propbag->add('version' |
|
15 |
-subdir=0 |
|
16 |
- |
|
17 |
-[SquirrelMail-gpg] |
|
18 |
-url=https://squirrelmail.org/plugin_view.php?id=153 |
|
19 |
-safe=2.1 |
|
20 |
-vuln=CVE-2007-3779 |
|
21 |
-file=gpg_pref_functions.php |
|
22 |
-variable=$GPG_VERSION |
|
23 |
-subdir=0 |
|
24 |
- |
|
25 |
-[Drupal-Views] |
|
26 |
-url=https://www.drupal.org/project/views |
|
27 |
-safe=2.13 |
|
28 |
-vuln=CVE-2011-4113 |
|
29 |
-file=views.info |
|
30 |
-variable=version = "6.x |
|
31 |
-subdir=0 |
|
32 |
- |
|
33 |
-[Wordpress-timthumb] |
|
34 |
-url=https://github.com/GabrielGil/TimThumb |
|
35 |
-safe=2.8.14 |
|
36 |
-vuln=CVE-2014-4663 |
|
37 |
-file=timthumb.php |
|
38 |
-variable=('VERSION', |
|
39 |
-extra_match=TimThumb |
|
40 |
-subdir=0 |
|
41 |
- |
|
42 |
-[Wordpress-timthumb-renamed] |
|
43 |
-url=https://github.com/GabrielGil/TimThumb |
|
44 |
-safe=2.8.14 |
|
45 |
-vuln=CVE-2014-4663 |
|
46 |
-file=thumb.php |
|
47 |
-variable=('VERSION', |
|
48 |
-extra_match=TimThumb |
|
49 |
-subdir=0 |
|
50 |
- |
|
51 |
-[Joomla-JCE] |
|
52 |
-url=https://www.joomlacontenteditor.net/ |
|
53 |
-safe=2.1 |
|
54 |
-vuln=CVE-2012-2902 |
|
55 |
-file=editor.php |
|
56 |
-variable=$_version |
|
57 |
-extra_match=JCE class |
|
58 |
-subdir=3 |
|
59 |
- |
|
60 |
-[WP Super Cache] |
|
61 |
-url=https://wordpress.org/plugins/wp-super-cache/ |
|
62 |
-safe=1.6.9 |
|
63 |
-latest=1.7.0 |
|
64 |
-vuln=https://odd.blog/2019/07/25/wp-super-cache-1-6-9-security-update/ |
|
65 |
-file=wp-cache.php |
|
66 |
-variable=Version: |
|
67 |
-extra_match=Plugin Name: WP Super Cache |
|
68 |
-subdir=0 |
|
69 |
- |
|
70 |
-[W3 Total Cache] |
|
71 |
-url=https://wordpress.org/plugins/w3-total-cache/ |
|
72 |
-safe=0.9.7.4 |
|
73 |
-vuln=https://www.cybersecurity-help.cz/vdb/SB2019050701 |
|
74 |
-file=w3-total-cache.php |
|
75 |
-variable=Version: |
|
76 |
-extra_match=Plugin Name: W3 Total Cache |
|
77 |
-subdir=0 |
|
78 |
- |
|
79 |
-[phpThumb] |
|
80 |
-url=http://phpthumb.sourceforge.net/ |
|
81 |
-safe=1.7.10 |
|
82 |
-vuln=CVE-2010-1598 |
|
83 |
-file=phpthumb.class.php |
|
84 |
-variable=$phpthumb_version |
|
85 |
-subdir=0 |
|
86 |
- |
|
87 |
-[Wordpress-Jetpack] |
|
88 |
-url=https://jetpack.com/ |
|
89 |
-safe=7.9.1 |
|
90 |
-vuln=https://jetpack.com/2019/11/19/jetpack-7-9-1-maintenance-security/ |
|
91 |
-file=jetpack.php |
|
92 |
-variable=JETPACK__VERSION |
|
93 |
-subdir=0 |
|
94 |
- |
|
95 |
-[Wordpress-MailPoet] |
|
96 |
-url=https://www.mailpoet.com/ |
|
97 |
-safe=2.6.8 |
|
98 |
-vuln=CVE-2014-4726 |
|
99 |
-file=base.php |
|
100 |
-variable=static $version |
|
101 |
-extra_match=WYSIJA_object |
|
102 |
-subdir=0 |
|
103 |
- |
|
104 |
-[Wordpress-CustomContact] |
|
105 |
-url=https://wordpress.org/plugins/custom-contact-forms/ |
|
106 |
-safe=5.1.0.4 |
|
107 |
-vuln=http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html |
|
108 |
-file=custom-contact-forms.php |
|
109 |
-variable=Version |
|
110 |
-subdir=0 |
|
111 |
- |
|
112 |
-[Wordpress-SliderRevolution] |
|
113 |
-url=https://revolution.themepunch.com/ |
|
114 |
-# unclear about exact version |
|
115 |
-safe=4.2.3 |
|
116 |
-vuln=CVE-2015-5151 |
|
117 |
-file=revslider.php |
|
118 |
-variable=$revSliderVersion |
|
119 |
-subdir=0 |
|
120 |
- |
|
121 |
-[Wordpress-NextGEN] |
|
122 |
-url=https://wordpress.org/plugins/nextgen-gallery/ |
|
123 |
-safe=3.2.11 |
|
124 |
-vuln=CVE-2019-14314 |
|
125 |
-file=nggallery.php |
|
126 |
-variable=NGG_PLUGIN_VERSION |
|
127 |
-subdir=0 |
|
128 |
- |
|
129 |
-[Wordpress-Akismet] |
|
130 |
-url=https://wordpress.org/plugins/akismet/ |
|
131 |
-safe=3.1.5 |
|
132 |
-vuln=CVE-2015-9357 |
|
133 |
-file=akismet.php |
|
134 |
-variable=AKISMET_VERSION |
|
135 |
-subdir=0 |
|
136 |
- |
|
137 |
-[Wordpress-AllInOneSEO] |
|
138 |
-url=https://semperplugins.com/all-in-one-seo-pack-changelog/ |
|
139 |
-safe=3.2.7 |
|
140 |
-vuln=CVE-2019-16520 |
|
141 |
-file=all_in_one_seo_pack.php |
|
142 |
-variable=define( 'AIOSEOP_VERSION' |
|
143 |
-subdir=0 |
|
144 |
- |
|
145 |
-[Wordpress-DownloadManager] |
|
146 |
-url=https://wordpress.org/plugins/download-manager/ |
|
147 |
-safe=2.7.5 |
|
148 |
-vuln=http://blog.sucuri.net/2014/12/security-advisory-high-severity-wordpress-download-manager.html |
|
149 |
-file=download-manager.php |
|
150 |
-variable=define('WPDM_Version' |
|
151 |
-subdir=0 |
|
152 |
- |
|
153 |
-[Wordpress-Fancybox] |
|
154 |
-url=https://wordpress.org/plugins/fancybox-for-wordpress/ |
|
155 |
-safe=3.0.4 |
|
156 |
-vuln=CVE-2015-1494 |
|
157 |
-file=fancybox.php |
|
158 |
-variable=FBFW_VERSION |
|
159 |
-subdir=0 |
|
160 |
- |
|
161 |
-[Joomla-Googlemaps] |
|
162 |
-url=http://joomlacode.org/gf/project/mambot_google1/ |
|
163 |
-safe=3.1 |
|
164 |
-vuln=http://joomlacode.org/gf/project/mambot_google1/news/?id=4119 |
|
165 |
-file=plugin_googlemap3.perm |
|
166 |
-variable=<version> |
|
167 |
-subdir=0 |
|
168 |
- |
|
169 |
-[Wordpress-SEObyYoast] |
|
170 |
-url=https://wordpress.org/plugins/wordpress-seo/ |
|
171 |
-safe=11.6.0 |
|
172 |
-vuln=CVE-2019-13478 |
|
173 |
-file=wp-seo-main.php |
|
174 |
-variable=WPSEO_VERSION |
|
175 |
-subdir=0 |
|
176 |
- |
|
177 |
-[Wordpress-GoogleAnalyticsbyMonsterInsights] |
|
178 |
-url=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/ |
|
179 |
-safe=5.4.5 |
|
180 |
-vuln=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/ |
|
181 |
-file=googleanalytics.php |
|
182 |
-variable=GAWP_VERSION |
|
183 |
-subdir=0 |
|
184 |
- |
|
185 |
-[Wordpress-Captcha] |
|
186 |
-url=https://wordpress.org/plugins/captcha/ |
|
187 |
-safe=4.4.5 |
|
188 |
-vuln=https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/ |
|
189 |
-file=captcha.php |
|
190 |
-variable=Version: |
|
191 |
-subdir=0 |
... | ... |
@@ -0,0 +1,309 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "Serendipity-mycalendar", |
|
4 |
+ "url": "https://s9y.org", |
|
5 |
+ "safe": "0.13", |
|
6 |
+ "vuln": "CVE-2007-6390", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "serendipity_event_mycalendar.php", |
|
10 |
+ "variable": "$propbag->add('version'", |
|
11 |
+ "subdir": 0 |
|
12 |
+ } |
|
13 |
+ ] |
|
14 |
+ }, |
|
15 |
+ { |
|
16 |
+ "name": "Serendipity-freetag", |
|
17 |
+ "url": "https://s9y.org", |
|
18 |
+ "safe": "3.69", |
|
19 |
+ "vuln": "https://github.com/s9y/additional_plugins/commit/3edecdb7eccc24e0d5c63a3d5702dba54599bda3", |
|
20 |
+ "detection": [ |
|
21 |
+ { |
|
22 |
+ "file": "serendipity_event_freetag.php", |
|
23 |
+ "variable": "$propbag->add('version'", |
|
24 |
+ "subdir": 0 |
|
25 |
+ } |
|
26 |
+ ] |
|
27 |
+ }, |
|
28 |
+ { |
|
29 |
+ "name": "SquirrelMail-gpg", |
|
30 |
+ "url": "https://squirrelmail.org/plugin_view.php?id=153", |
|
31 |
+ "safe": "2.1", |
|
32 |
+ "vuln": "CVE-2007-3779", |
|
33 |
+ "detection": [ |
|
34 |
+ { |
|
35 |
+ "file": "gpg_pref_functions.php", |
|
36 |
+ "variable": "$GPG_VERSION", |
|
37 |
+ "subdir": 0 |
|
38 |
+ } |
|
39 |
+ ] |
|
40 |
+ }, |
|
41 |
+ { |
|
42 |
+ "name": "Drupal-Views", |
|
43 |
+ "url": "https://www.drupal.org/project/views", |
|
44 |
+ "safe": "2.13", |
|
45 |
+ "vuln": "CVE-2011-4113", |
|
46 |
+ "detection": [ |
|
47 |
+ { |
|
48 |
+ "file": "views.info", |
|
49 |
+ "variable": "version = \"6.x", |
|
50 |
+ "subdir": 0 |
|
51 |
+ } |
|
52 |
+ ] |
|
53 |
+ }, |
|
54 |
+ { |
|
55 |
+ "name": "Wordpress-timthumb", |
|
56 |
+ "url": "https://github.com/GabrielGil/TimThumb", |
|
57 |
+ "safe": "2.8.14", |
|
58 |
+ "vuln": "CVE-2014-4663", |
|
59 |
+ "detection": [ |
|
60 |
+ { |
|
61 |
+ "file": "timthumb.php", |
|
62 |
+ "variable": "('VERSION',", |
|
63 |
+ "subdir": 0, |
|
64 |
+ "extra_match": "TimThumb" |
|
65 |
+ } |
|
66 |
+ ] |
|
67 |
+ }, |
|
68 |
+ { |
|
69 |
+ "name": "Wordpress-timthumb-renamed", |
|
70 |
+ "url": "https://github.com/GabrielGil/TimThumb", |
|
71 |
+ "safe": "2.8.14", |
|
72 |
+ "vuln": "CVE-2014-4663", |
|
73 |
+ "detection": [ |
|
74 |
+ { |
|
75 |
+ "file": "thumb.php", |
|
76 |
+ "variable": "('VERSION',", |
|
77 |
+ "subdir": 0, |
|
78 |
+ "extra_match": "TimThumb" |
|
79 |
+ } |
|
80 |
+ ] |
|
81 |
+ }, |
|
82 |
+ { |
|
83 |
+ "name": "Joomla-JCE", |
|
84 |
+ "url": "https://www.joomlacontenteditor.net/", |
|
85 |
+ "safe": "2.1", |
|
86 |
+ "vuln": "CVE-2012-2902", |
|
87 |
+ "detection": [ |
|
88 |
+ { |
|
89 |
+ "file": "editor.php", |
|
90 |
+ "variable": "$_version", |
|
91 |
+ "subdir": 3, |
|
92 |
+ "extra_match": "JCE class" |
|
93 |
+ } |
|
94 |
+ ] |
|
95 |
+ }, |
|
96 |
+ { |
|
97 |
+ "name": "WP Super Cache", |
|
98 |
+ "url": "https://wordpress.org/plugins/wp-super-cache/", |
|
99 |
+ "safe": "1.6.9", |
|
100 |
+ "vuln": "https://odd.blog/2019/07/25/wp-super-cache-1-6-9-security-update/", |
|
101 |
+ "latest": "1.7.0", |
|
102 |
+ "detection": [ |
|
103 |
+ { |
|
104 |
+ "file": "wp-cache.php", |
|
105 |
+ "variable": "Version:", |
|
106 |
+ "subdir": 0, |
|
107 |
+ "extra_match": "Plugin Name: WP Super Cache" |
|
108 |
+ } |
|
109 |
+ ] |
|
110 |
+ }, |
|
111 |
+ { |
|
112 |
+ "name": "W3 Total Cache", |
|
113 |
+ "url": "https://wordpress.org/plugins/w3-total-cache/", |
|
114 |
+ "safe": "0.9.7.4", |
|
115 |
+ "vuln": "https://www.cybersecurity-help.cz/vdb/SB2019050701", |
|
116 |
+ "detection": [ |
|
117 |
+ { |
|
118 |
+ "file": "w3-total-cache.php", |
|
119 |
+ "variable": "Version:", |
|
120 |
+ "subdir": 0, |
|
121 |
+ "extra_match": "Plugin Name: W3 Total Cache" |
|
122 |
+ } |
|
123 |
+ ] |
|
124 |
+ }, |
|
125 |
+ { |
|
126 |
+ "name": "phpThumb", |
|
127 |
+ "url": "http://phpthumb.sourceforge.net/", |
|
128 |
+ "safe": "1.7.10", |
|
129 |
+ "vuln": "CVE-2010-1598", |
|
130 |
+ "detection": [ |
|
131 |
+ { |
|
132 |
+ "file": "phpthumb.class.php", |
|
133 |
+ "variable": "$phpthumb_version", |
|
134 |
+ "subdir": 0 |
|
135 |
+ } |
|
136 |
+ ] |
|
137 |
+ }, |
|
138 |
+ { |
|
139 |
+ "name": "Wordpress-Jetpack", |
|
140 |
+ "url": "https://jetpack.com/", |
|
141 |
+ "safe": "7.9.1", |
|
142 |
+ "vuln": "https://jetpack.com/2019/11/19/jetpack-7-9-1-maintenance-security/", |
|
143 |
+ "detection": [ |
|
144 |
+ { |
|
145 |
+ "file": "jetpack.php", |
|
146 |
+ "variable": "JETPACK__VERSION", |
|
147 |
+ "subdir": 0 |
|
148 |
+ } |
|
149 |
+ ] |
|
150 |
+ }, |
|
151 |
+ { |
|
152 |
+ "name": "Wordpress-MailPoet", |
|
153 |
+ "url": "https://www.mailpoet.com/", |
|
154 |
+ "safe": "2.6.8", |
|
155 |
+ "vuln": "CVE-2014-4726", |
|
156 |
+ "detection": [ |
|
157 |
+ { |
|
158 |
+ "file": "base.php", |
|
159 |
+ "variable": "static $version", |
|
160 |
+ "subdir": 0, |
|
161 |
+ "extra_match": "WYSIJA_object" |
|
162 |
+ } |
|
163 |
+ ] |
|
164 |
+ }, |
|
165 |
+ { |
|
166 |
+ "name": "Wordpress-CustomContact", |
|
167 |
+ "url": "https://wordpress.org/plugins/custom-contact-forms/", |
|
168 |
+ "safe": "5.1.0.4", |
|
169 |
+ "vuln": "http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html", |
|
170 |
+ "detection": [ |
|
171 |
+ { |
|
172 |
+ "file": "custom-contact-forms.php", |
|
173 |
+ "variable": "Version", |
|
174 |
+ "subdir": 0 |
|
175 |
+ } |
|
176 |
+ ] |
|
177 |
+ }, |
|
178 |
+ { |
|
179 |
+ "name": "Wordpress-SliderRevolution", |
|
180 |
+ "url": "https://revolution.themepunch.com/", |
|
181 |
+ "safe": "4.2.3", |
|
182 |
+ "vuln": "CVE-2015-5151", |
|
183 |
+ "note": "unclear about exact version", |
|
184 |
+ "detection": [ |
|
185 |
+ { |
|
186 |
+ "file": "revslider.php", |
|
187 |
+ "variable": "$revSliderVersion", |
|
188 |
+ "subdir": 0 |
|
189 |
+ } |
|
190 |
+ ] |
|
191 |
+ }, |
|
192 |
+ { |
|
193 |
+ "name": "Wordpress-NextGEN", |
|
194 |
+ "url": "https://wordpress.org/plugins/nextgen-gallery/", |
|
195 |
+ "safe": "3.2.11", |
|
196 |
+ "vuln": "CVE-2019-14314", |
|
197 |
+ "detection": [ |
|
198 |
+ { |
|
199 |
+ "file": "nggallery.php", |
|
200 |
+ "variable": "NGG_PLUGIN_VERSION", |
|
201 |
+ "subdir": 0 |
|
202 |
+ } |
|
203 |
+ ] |
|
204 |
+ }, |
|
205 |
+ { |
|
206 |
+ "name": "Wordpress-Akismet", |
|
207 |
+ "url": "https://wordpress.org/plugins/akismet/", |
|
208 |
+ "safe": "3.1.5", |
|
209 |
+ "vuln": "CVE-2015-9357", |
|
210 |
+ "detection": [ |
|
211 |
+ { |
|
212 |
+ "file": "akismet.php", |
|
213 |
+ "variable": "AKISMET_VERSION", |
|
214 |
+ "subdir": 0 |
|
215 |
+ } |
|
216 |
+ ] |
|
217 |
+ }, |
|
218 |
+ { |
|
219 |
+ "name": "Wordpress-AllInOneSEO", |
|
220 |
+ "url": "https://semperplugins.com/all-in-one-seo-pack-changelog/", |
|
221 |
+ "safe": "3.2.7", |
|
222 |
+ "vuln": "CVE-2019-16520", |
|
223 |
+ "detection": [ |
|
224 |
+ { |
|
225 |
+ "file": "all_in_one_seo_pack.php", |
|
226 |
+ "variable": "define( 'AIOSEOP_VERSION'", |
|
227 |
+ "subdir": 0 |
|
228 |
+ } |
|
229 |
+ ] |
|
230 |
+ }, |
|
231 |
+ { |
|
232 |
+ "name": "Wordpress-DownloadManager", |
|
233 |
+ "url": "https://wordpress.org/plugins/download-manager/", |
|
234 |
+ "safe": "2.7.5", |
|
235 |
+ "vuln": "http://blog.sucuri.net/2014/12/security-advisory-high-severity-wordpress-download-manager.html", |
|
236 |
+ "detection": [ |
|
237 |
+ { |
|
238 |
+ "file": "download-manager.php", |
|
239 |
+ "variable": "define('WPDM_Version'", |
|
240 |
+ "subdir": 0 |
|
241 |
+ } |
|
242 |
+ ] |
|
243 |
+ }, |
|
244 |
+ { |
|
245 |
+ "name": "Wordpress-Fancybox", |
|
246 |
+ "url": "https://wordpress.org/plugins/fancybox-for-wordpress/", |
|
247 |
+ "safe": "3.0.4", |
|
248 |
+ "vuln": "CVE-2015-1494", |
|
249 |
+ "detection": [ |
|
250 |
+ { |
|
251 |
+ "file": "fancybox.php", |
|
252 |
+ "variable": "FBFW_VERSION", |
|
253 |
+ "subdir": 0 |
|
254 |
+ } |
|
255 |
+ ] |
|
256 |
+ }, |
|
257 |
+ { |
|
258 |
+ "name": "Joomla-Googlemaps", |
|
259 |
+ "url": "http://joomlacode.org/gf/project/mambot_google1/", |
|
260 |
+ "safe": "3.1", |
|
261 |
+ "vuln": "http://joomlacode.org/gf/project/mambot_google1/news/?id=4119", |
|
262 |
+ "detection": [ |
|
263 |
+ { |
|
264 |
+ "file": "plugin_googlemap3.perm", |
|
265 |
+ "variable": "<version>", |
|
266 |
+ "subdir": 0 |
|
267 |
+ } |
|
268 |
+ ] |
|
269 |
+ }, |
|
270 |
+ { |
|
271 |
+ "name": "Wordpress-SEObyYoast", |
|
272 |
+ "url": "https://wordpress.org/plugins/wordpress-seo/", |
|
273 |
+ "safe": "11.6.0", |
|
274 |
+ "vuln": "CVE-2019-13478", |
|
275 |
+ "detection": [ |
|
276 |
+ { |
|
277 |
+ "file": "wp-seo-main.php", |
|
278 |
+ "variable": "WPSEO_VERSION", |
|
279 |
+ "subdir": 0 |
|
280 |
+ } |
|
281 |
+ ] |
|
282 |
+ }, |
|
283 |
+ { |
|
284 |
+ "name": "Wordpress-GoogleAnalyticsbyMonsterInsights", |
|
285 |
+ "url": "https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/", |
|
286 |
+ "safe": "5.4.5", |
|
287 |
+ "vuln": "https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/", |
|
288 |
+ "detection": [ |
|
289 |
+ { |
|
290 |
+ "file": "googleanalytics.php", |
|
291 |
+ "variable": "GAWP_VERSION", |
|
292 |
+ "subdir": 0 |
|
293 |
+ } |
|
294 |
+ ] |
|
295 |
+ }, |
|
296 |
+ { |
|
297 |
+ "name": "Wordpress-Captcha", |
|
298 |
+ "url": "https://wordpress.org/plugins/captcha/", |
|
299 |
+ "safe": "4.4.5", |
|
300 |
+ "vuln": "https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/", |
|
301 |
+ "detection": [ |
|
302 |
+ { |
|
303 |
+ "file": "captcha.php", |
|
304 |
+ "variable": "Version:", |
|
305 |
+ "subdir": 0 |
|
306 |
+ } |
|
307 |
+ ] |
|
308 |
+ } |
|
309 |
+] |
|
0 | 310 |
\ No newline at end of file |
... | ... |
@@ -0,0 +1,16 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "Wordpress-Theme-Twentyfifteen", |
|
4 |
+ "url": "http://www.wordpress.org", |
|
5 |
+ "safe": "1.2", |
|
6 |
+ "vuln": "https://blog.sucuri.net/2015/05/jetpack-and-twentyfifteen-vulnerable-to-dom-based-xss.html", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "style.css", |
|
10 |
+ "variable": "Version:", |
|
11 |
+ "subdir": 0, |
|
12 |
+ "extra_match": "Theme Name: Twenty Fifteen" |
|
13 |
+ } |
|
14 |
+ ] |
|
15 |
+ } |
|
16 |
+] |
|
0 | 17 |
\ No newline at end of file |
... | ... |
@@ -1,33 +0,0 @@ |
1 |
-[FreeWebshop] |
|
2 |
-url=http://www.freewebshop.org/ |
|
3 |
-safe=2.2.7 |
|
4 |
-vuln=CVE-2007-6711 |
|
5 |
-file=subs.inc.php |
|
6 |
-variable=$version |
|
7 |
-subdir=1 |
|
8 |
- |
|
9 |
-[Magento-old] |
|
10 |
-url=http://www.magentocommerce.com/ |
|
11 |
-safe=1.9.2.2 |
|
12 |
-vuln=CVE-2015-5161 |
|
13 |
-file=Mage.php |
|
14 |
-variable=return ' |
|
15 |
-subdir=1 |
|
16 |
- |
|
17 |
-[Magento] |
|
18 |
-url=http://www.magentocommerce.com/ |
|
19 |
-safe=1.9.2.2 |
|
20 |
-vuln=CVE-2015-5161 |
|
21 |
-# This does not reliably give correct version numbers, |
|
22 |
-# but it works for the latest versions |
|
23 |
-file=RELEASE_NOTES.txt |
|
24 |
-variable===== |
|
25 |
-subdir=0 |
|
26 |
- |
|
27 |
-[zencart] |
|
28 |
-url=http://www.zen-cart.com/ |
|
29 |
-safe=1.3.9 |
|
30 |
-vuln=CVE-2009-2254 |
|
31 |
-file=paypaldp.php |
|
32 |
-variable=$this->codeVersion |
|
33 |
-subdir=3 |
... | ... |
@@ -0,0 +1,55 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "FreeWebshop", |
|
4 |
+ "url": "http://www.freewebshop.org/", |
|
5 |
+ "safe": "2.2.7", |
|
6 |
+ "vuln": "CVE-2007-6711", |
|
7 |
+ "detection": [ |
|
8 |
+ { |
|
9 |
+ "file": "subs.inc.php", |
|
10 |
+ "variable": "$version", |
|
11 |
+ "subdir": 1 |
|
12 |
+ } |
|
13 |
+ ] |
|
14 |
+ }, |
|
15 |
+ { |
|
16 |
+ "name": "Magento-old", |
|
17 |
+ "url": "http://www.magentocommerce.com/", |
|
18 |
+ "safe": "1.9.2.2", |
|
19 |
+ "vuln": "CVE-2015-5161", |
|
20 |
+ "detection": [ |
|
21 |
+ { |
|
22 |
+ "file": "Mage.php", |
|
23 |
+ "variable": "return '", |
|
24 |
+ "subdir": 1 |
|
25 |
+ } |
|
26 |
+ ] |
|
27 |
+ }, |
|
28 |
+ { |
|
29 |
+ "name": "Magento", |
|
30 |
+ "url": "http://www.magentocommerce.com/", |
|
31 |
+ "safe": "1.9.2.2", |
|
32 |
+ "vuln": "CVE-2015-5161", |
|
33 |
+ "note": "This does not reliably give correct version numbers, but it works for the latest versions", |
|
34 |
+ "detection": [ |
|
35 |
+ { |
|
36 |
+ "file": "RELEASE_NOTES.txt", |
|
37 |
+ "variable": "====", |
|
38 |
+ "subdir": 0 |
|
39 |
+ } |
|
40 |
+ ] |
|
41 |
+ }, |
|
42 |
+ { |
|
43 |
+ "name": "zencart", |
|
44 |
+ "url": "http://www.zen-cart.com/", |
|
45 |
+ "safe": "1.3.9", |
|
46 |
+ "vuln": "CVE-2009-2254", |
|
47 |
+ "detection": [ |
|
48 |
+ { |
|
49 |
+ "file": "paypaldp.php", |
|
50 |
+ "variable": "$this->codeVersion", |
|
51 |
+ "subdir": 3 |
|
52 |
+ } |
|
53 |
+ ] |
|
54 |
+ } |
|
55 |
+] |
|
0 | 56 |
\ No newline at end of file |
... | ... |
@@ -1,71 +0,0 @@ |
1 |
-[MediaWiki] |
|
2 |
-url=https://www.mediawiki.org/ |
|
3 |
-safe=1.33.1 |
|
4 |
-old_safe=1.32.4,1.31.4 |
|
5 |
-latest=1.33.1 |
|
6 |
-vuln=CVE-2019-16738 |
|
7 |
-file=DefaultSettings.php |
|
8 |
-variable=$wgVersion |
|
9 |
-subdir=1 |
|
10 |
- |
|
11 |
-[TWiki] |
|
12 |
-url=http://twiki.org/ |
|
13 |
-safe=5.0.1 |
|
14 |
-vuln=CVE-2010-3841 |
|
15 |
-file=TWiki.pm |
|
16 |
-variable=$RELEASE |
|
17 |
-subdir=1 |
|
18 |
- |
|
19 |
-[PmWiki] |
|
20 |
-url=https://pmwiki.org/ |
|
21 |
-safe=2.2.96 |
|
22 |
-latest=2.2.122 |
|
23 |
-vuln=https://pmwiki.org/wiki/PmWiki/ChangeLog#v2296 |
|
24 |
-file=version.php |
|
25 |
-variable=$Version |
|
26 |
-extra_match=pmwiki |
|
27 |
-subdir=1 |
|
28 |
- |
|
29 |
-[TikiWiki] |
|
30 |
-url=http://tikiwiki.org/ |
|
31 |
-safe=5.3 |
|
32 |
-old_safe=3.8 |
|
33 |
-vuln=CVE-2010-4239 |
|
34 |
-file=twversion.class.php |
|
35 |
-variable=$this->version |
|
36 |
-subdir=2 |
|
37 |
- |
|
38 |
-[TikiWiki-old] |
|
39 |
-url=http://tikiwiki.org/ |
|
40 |
-safe=5.3 |
|
41 |
-old_safe=3.8 |
|
42 |
-vuln=CVE-2010-4239 |
|
43 |
-file=README |
|
44 |
-variable=version |
|
45 |
-extra_match=Tiki! The wiki |
|
46 |
-subdir=0 |
|
47 |
- |
|
48 |
-[phpwiki] |
|
49 |
-url=http://phpwiki.sourceforge.net/ |
|
50 |
-safe=1.3.14 |
|
51 |
-vuln=CVE-2007-3193 |
|
52 |
-file=prepend.php |
|
53 |
-variable=PHPWIKI_VERSION |
|
54 |
-subdir=1 |
|
55 |
- |
|
56 |
-[phpwiki-legacy] |
|
57 |
-url=http://phpwiki.sourceforge.net/ |
|
58 |
-safe=1.3.14 |
|
59 |
-vuln=CVE-2007-3193 |
|
60 |
-file=config.php |
|
61 |
-variable=PHPWIKI_VERSION |
|
62 |
-subdir=1 |
|
63 |
- |
|
64 |
-[etherpad-lite] |
|
65 |
-url=https://etherpad.org/ |
|
66 |
-safe=1.6.4 |
|
67 |
-vuln=CVE-2018-9326 |
|
68 |
-file=package.json |
|
69 |
-variable=version |
|
70 |
-extra_match=ep_etherpad-lite |
|
71 |
-subdir=0 |
... | ... |
@@ -0,0 +1,114 @@ |
1 |
+[ |
|
2 |
+ { |
|
3 |
+ "name": "MediaWiki", |
|
4 |
+ "url": "https://www.mediawiki.org/", |
|
5 |
+ "safe": "1.33.1", |
|
6 |
+ "old_safe": "1.32.4,1.31.4", |
|
7 |
+ "vuln": "CVE-2019-16738", |
|
8 |
+ "latest": "1.33.1", |
|
9 |
+ "detection": [ |
|
10 |
+ { |
|
11 |
+ "file": "DefaultSettings.php", |
|
12 |
+ "variable": "$wgVersion", |
|
13 |
+ "subdir": 1 |
|
14 |
+ } |
|
15 |
+ ] |
|
16 |
+ }, |
|
17 |
+ { |
|
18 |
+ "name": "TWiki", |
|
19 |
+ "url": "http://twiki.org/", |
|
20 |
+ "safe": "5.0.1", |
|
21 |
+ "vuln": "CVE-2010-3841", |
|
22 |
+ "detection": [ |
|
23 |
+ { |
|
24 |
+ "file": "TWiki.pm", |
|
25 |
+ "variable": "$RELEASE", |
|
26 |
+ "subdir": 1 |
|
27 |
+ } |
|
28 |
+ ] |
|
29 |
+ }, |
|
30 |
+ { |
|
31 |
+ "name": "PmWiki", |
|
32 |
+ "url": "https://pmwiki.org/", |
|
33 |
+ "safe": "2.2.96", |
|
34 |
+ "vuln": "https://pmwiki.org/wiki/PmWiki/ChangeLog#v2296", |
|
35 |
+ "latest": "2.2.122", |
|
36 |
+ "detection": [ |
|
37 |
+ { |
|
38 |
+ "file": "version.php", |
|
39 |
+ "variable": "$Version", |
|
40 |
+ "subdir": 1, |
|
41 |
+ "extra_match": "pmwiki" |
|
42 |
+ } |
|
43 |
+ ] |
|
44 |
+ }, |
|
45 |
+ { |
|
46 |
+ "name": "TikiWiki", |
|
47 |
+ "url": "http://tikiwiki.org/", |
|
48 |
+ "safe": "5.3", |
|
49 |
+ "old_safe": "3.8", |
|
50 |
+ "vuln": "CVE-2010-4239", |
|
51 |
+ "detection": [ |
|
52 |
+ { |
|
53 |
+ "file": "twversion.class.php", |
|
54 |
+ "variable": "$this->version", |
|
55 |
+ "subdir": 2 |
|
56 |
+ } |
|
57 |
+ ] |
|
58 |
+ }, |
|
59 |
+ { |
|
60 |
+ "name": "TikiWiki-old", |
|
61 |
+ "url": "http://tikiwiki.org/", |
|
62 |
+ "safe": "5.3", |
|
63 |
+ "old_safe": "3.8", |
|
64 |
+ "vuln": "CVE-2010-4239", |
|
65 |
+ "detection": [ |
|
66 |
+ { |
|
67 |
+ "file": "README", |
|
68 |
+ "variable": "version", |
|
69 |
+ "subdir": 0, |
|
70 |
+ "extra_match": "Tiki! The wiki" |
|
71 |
+ } |
|
72 |
+ ] |
|
73 |
+ }, |
|
74 |
+ { |
|
75 |
+ "name": "phpwiki", |
|
76 |
+ "url": "http://phpwiki.sourceforge.net/", |
|
77 |
+ "safe": "1.3.14", |
|
78 |
+ "vuln": "CVE-2007-3193", |
|
79 |
+ "detection": [ |
|
80 |
+ { |
|
81 |
+ "file": "prepend.php", |
|
82 |
+ "variable": "PHPWIKI_VERSION", |
|
83 |
+ "subdir": 1 |
|
84 |
+ } |
|
85 |
+ ] |
|
86 |
+ }, |
|
87 |
+ { |
|
88 |
+ "name": "phpwiki-legacy", |
|
89 |
+ "url": "http://phpwiki.sourceforge.net/", |
|
90 |
+ "safe": "1.3.14", |
|
91 |
+ "vuln": "CVE-2007-3193", |
|
92 |
+ "detection": [ |
|
93 |
+ { |
|
94 |
+ "file": "config.php", |
|
95 |
+ "variable": "PHPWIKI_VERSION", |
|
96 |
+ "subdir": 1 |
|
97 |
+ } |
|
98 |
+ ] |
|
99 |
+ }, |
|
100 |
+ { |
|
101 |
+ "name": "etherpad-lite", |
|
102 |
+ "url": "https://etherpad.org/", |
|
103 |
+ "safe": "1.6.4", |
|
104 |
+ "vuln": "CVE-2018-9326", |
|
105 |
+ "detection": [ |
|
106 |
+ { |
|
107 |
+ "file": "package.json", |
|
108 |
+ "variable": "version", |
|
109 |
+ "subdir": 0, |
|
110 |
+ "extra_match": "ep_etherpad-lite" |
|
111 |
+ } |
|
112 |
+ ] |
|
113 |
+ } |
|
114 |
+] |
|
0 | 115 |
\ No newline at end of file |
1 | 116 |