Git Product home page Git Product logo

Comments (2)

Ali-Razmjoo avatar Ali-Razmjoo commented on June 20, 2024

Hello,

It's a nice idea to change the exploit database, @rezasp please review and suggest yaml, json or xml.

Regards.

from joomscan.

StPanning avatar StPanning commented on June 20, 2024

xml is kind-of hard to read/write. json is also more for machines, IMHO,
yaml on the other hand is human readable and more line-oriented,
this makes easer diffs and is thus easier to review.
for every format exist stable libraries.

So my argument still is:
The whole file needs to be maintained and updated by humans.
So my vote is for yaml :)

I've been already toying around with semi-automatic extraction cve's regarding joomla.
My tool is still in it's very early state.
(One would have to correct it manually though. In this example my program was not able to detect, that it si not the core part of joomla, but component)
The output looks something like this:

- desc: XSS and SQLi in huge IT gallery v1.1.5 for Joomla
  id: CVE-2016-1000113
  refs:
  - src:
      BID:
      - entry: '92102'
        url: http://www.securityfocus.com/bid/92102
      MISC:
      - entry: http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro
        url: http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro
      - entry: http://www.vapidlabs.com/advisory.php?v=164
        url: http://www.vapidlabs.com/advisory.php?v=164
  vuln_part: core
  vulnerable_versions:
    from: 1.1.5
    to: ''
- desc: XSS in huge IT gallery v1.1.5 for Joomla
  id: CVE-2016-1000114
  refs:
  - src:
      BID:
      - entry: '92102'
        url: http://www.securityfocus.com/bid/92102
      MISC:
      - entry: http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro
        url: http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro
      - entry: http://www.vapidlabs.com/advisory.php?v=164
        url: http://www.vapidlabs.com/advisory.php?v=164
  vuln_part: core
  vulnerable_versions:
    from: 1.1.5
    to: 

from joomscan.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.