diff --git a/rules/web/web_cve_CVE-2010-0943.yaml b/rules/web/web_cve_CVE-2010-0943_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-0943.yaml rename to rules/web/web_cve_CVE-2010-0943_exploitation_attempt.yaml index 07b40e00d..d6be923ac 100644 --- a/rules/web/web_cve_CVE-2010-0943.yaml +++ b/rules/web/web_cve_CVE-2010-0943_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-0943:Joomla! Component com_jashowcase - Directory Traversal -id: e5616a8c-a43e-47c2-9fd2-19b429581b90 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-0943 exploitation attempt +id: 63b70c55-0d7a-4e2f-a130-11028352b6ff +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the JA Showcase (com_jashowcase) diff --git a/rules/web/web_cve_CVE-2010-0944.yaml b/rules/web/web_cve_CVE-2010-0944_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-0944.yaml rename to rules/web/web_cve_CVE-2010-0944_exploitation_attempt.yaml index eb0802663..c38d952b9 100644 --- a/rules/web/web_cve_CVE-2010-0944.yaml +++ b/rules/web/web_cve_CVE-2010-0944_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-0944:Joomla! Component com_jcollection - Directory Traversal -id: c3eada81-1f9a-4a55-97b8-d3207d89228e -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-0944 exploitation attempt +id: d30903f7-cb51-445f-81a1-f2948f5fb763 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the JCollection (com_jcollection) diff --git a/rules/web/web_cve_CVE-2010-1306.yaml b/rules/web/web_cve_CVE-2010-1306_exploitation_attempt.yaml similarity index 80% rename from rules/web/web_cve_CVE-2010-1306.yaml rename to rules/web/web_cve_CVE-2010-1306_exploitation_attempt.yaml index 1a6e62688..70431ad78 100644 --- a/rules/web/web_cve_CVE-2010-1306.yaml +++ b/rules/web/web_cve_CVE-2010-1306_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1306:Joomla! Component Picasa 2.0 - Local File Inclusion -id: 560cd98d-aa1d-451b-90a5-08ce5ab72d7b -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1306 exploitation attempt +id: a12a5acd-3ebf-46b8-9ff3-95daeb84b801 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Picasa (com_joomlapicasa2) component diff --git a/rules/web/web_cve_CVE-2010-1314.yaml b/rules/web/web_cve_CVE-2010-1314_exploitation_attempt.yaml similarity index 80% rename from rules/web/web_cve_CVE-2010-1314.yaml rename to rules/web/web_cve_CVE-2010-1314_exploitation_attempt.yaml index e36b0acaa..7faa239f0 100644 --- a/rules/web/web_cve_CVE-2010-1314.yaml +++ b/rules/web/web_cve_CVE-2010-1314_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1314:Joomla! Component Highslide 1.5 - Local File Inclusion -id: 18019647-a68c-412a-bca9-626618b1a79c -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1314 exploitation attempt +id: 24c87e4f-7206-451a-9164-364ca4f3c388 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Highslide JS (com_hsconfig) diff --git a/rules/web/web_cve_CVE-2010-1345.yaml b/rules/web/web_cve_CVE-2010-1345_exploitation_attempt.yaml similarity index 79% rename from rules/web/web_cve_CVE-2010-1345.yaml rename to rules/web/web_cve_CVE-2010-1345_exploitation_attempt.yaml index 6c3fe8c81..25b32926f 100644 --- a/rules/web/web_cve_CVE-2010-1345.yaml +++ b/rules/web/web_cve_CVE-2010-1345_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1345:Joomla! Component Cookex Agency CKForms - Local File Inclusion -id: e70e977a-aaf3-4ec1-a948-493caea7cff3 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1345 exploitation attempt +id: 5f723f65-f584-49f3-87c0-7babbae20d9d +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) diff --git a/rules/web/web_cve_CVE-2010-1353.yaml b/rules/web/web_cve_CVE-2010-1353_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-1353.yaml rename to rules/web/web_cve_CVE-2010-1353_exploitation_attempt.yaml index a1c006bda..1ba62bda9 100644 --- a/rules/web/web_cve_CVE-2010-1353.yaml +++ b/rules/web/web_cve_CVE-2010-1353_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1353:Joomla! Component LoginBox - Local File Inclusion -id: 559e6e69-af61-407c-9949-a8602cfb6d95 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1353 exploitation attempt +id: 26d15692-1cfc-4427-8e7d-9a364c2628f3 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the LoginBox Pro (com_loginbox) diff --git a/rules/web/web_cve_CVE-2010-1474.yaml b/rules/web/web_cve_CVE-2010-1474_exploitation_attempt.yaml similarity index 83% rename from rules/web/web_cve_CVE-2010-1474.yaml rename to rules/web/web_cve_CVE-2010-1474_exploitation_attempt.yaml index c023e301c..21b6dc419 100644 --- a/rules/web/web_cve_CVE-2010-1474.yaml +++ b/rules/web/web_cve_CVE-2010-1474_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1474:Joomla! Component Sweetykeeper 1.5 - Local File Inclusion -id: 06040396-89e0-4919-a186-a3ac48eb2d85 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1474 exploitation attempt +id: 5b50ffc4-dde4-4905-9da9-eb499ee53971 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) diff --git a/rules/web/web_cve_CVE-2010-1475.yaml b/rules/web/web_cve_CVE-2010-1475_exploitation_attempt.yaml similarity index 79% rename from rules/web/web_cve_CVE-2010-1475.yaml rename to rules/web/web_cve_CVE-2010-1475_exploitation_attempt.yaml index 5d2fb64e2..4786c6854 100644 --- a/rules/web/web_cve_CVE-2010-1475.yaml +++ b/rules/web/web_cve_CVE-2010-1475_exploitation_attempt.yaml @@ -1,7 +1,6 @@ -title: CVE-2010-1475:Joomla! Component Preventive And Reservation 1.0.5 - Local File - Inclusion -id: 568d0a33-0052-47bc-a04e-8f7e8f05e12d -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1475 exploitation attempt +id: 69295f5a-428a-47d6-bf4d-a93bb23270ca +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Preventive & Reservation (com_preventive) diff --git a/rules/web/web_cve_CVE-2010-1495.yaml b/rules/web/web_cve_CVE-2010-1495_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-1495.yaml rename to rules/web/web_cve_CVE-2010-1495_exploitation_attempt.yaml index b33408623..9e3ef52af 100644 --- a/rules/web/web_cve_CVE-2010-1495.yaml +++ b/rules/web/web_cve_CVE-2010-1495_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1495:Joomla! Component Matamko 1.01 - Local File Inclusion -id: cb3ac5e3-de9e-44b7-b0f5-b18a13ba3c69 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1495 exploitation attempt +id: e21410ad-5016-457a-a48f-2da871951471 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Matamko (com_matamko) component diff --git a/rules/web/web_cve_CVE-2010-1532.yaml b/rules/web/web_cve_CVE-2010-1532_exploitation_attempt.yaml similarity index 81% rename from rules/web/web_cve_CVE-2010-1532.yaml rename to rules/web/web_cve_CVE-2010-1532_exploitation_attempt.yaml index d80c1a206..bb5f49b8f 100644 --- a/rules/web/web_cve_CVE-2010-1532.yaml +++ b/rules/web/web_cve_CVE-2010-1532_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1532:Joomla! Component PowerMail Pro 1.5.3 - Local File Inclusion -id: ea2cd3fd-60fc-4945-be6d-e69340a0159d -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1532 exploitation attempt +id: 92b23f0b-aa99-497a-a0f1-f7e632bcad7b +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) diff --git a/rules/web/web_cve_CVE-2010-1533.yaml b/rules/web/web_cve_CVE-2010-1533_exploitation_attempt.yaml similarity index 79% rename from rules/web/web_cve_CVE-2010-1533.yaml rename to rules/web/web_cve_CVE-2010-1533_exploitation_attempt.yaml index 1a181a6aa..31ae93363 100644 --- a/rules/web/web_cve_CVE-2010-1533.yaml +++ b/rules/web/web_cve_CVE-2010-1533_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1533:Joomla! Component TweetLA 1.0.1 - Local File Inclusion -id: fc58d241-5812-4a66-acad-2c9370fc2975 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1533 exploitation attempt +id: 2e547af2-0fb1-4d26-829e-fb42d959133c +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the TweetLA (com_tweetla) component diff --git a/rules/web/web_cve_CVE-2010-1535.yaml b/rules/web/web_cve_CVE-2010-1535_exploitation_attempt.yaml similarity index 81% rename from rules/web/web_cve_CVE-2010-1535.yaml rename to rules/web/web_cve_CVE-2010-1535_exploitation_attempt.yaml index 80029d7fe..d2ee67cdd 100644 --- a/rules/web/web_cve_CVE-2010-1535.yaml +++ b/rules/web/web_cve_CVE-2010-1535_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1535:Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion -id: a4abca47-5c67-4b8c-a549-4e04f43ce751 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1535 exploitation attempt +id: 7dbde0a0-bd74-47ba-85f7-32093ffbd50c +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the TRAVELbook (com_travelbook) diff --git a/rules/web/web_cve_CVE-2010-1602.yaml b/rules/web/web_cve_CVE-2010-1602_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-1602.yaml rename to rules/web/web_cve_CVE-2010-1602_exploitation_attempt.yaml index aba677241..564faaf91 100644 --- a/rules/web/web_cve_CVE-2010-1602.yaml +++ b/rules/web/web_cve_CVE-2010-1602_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1602:Joomla! Component ZiMB Comment 0.8.1 - Local File Inclusion -id: 25e8e854-0a76-4f55-9b7a-9769ea2dbebc -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1602 exploitation attempt +id: d79bf48d-2705-4da1-929b-37e07764998f +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) diff --git a/rules/web/web_cve_CVE-2010-1657.yaml b/rules/web/web_cve_CVE-2010-1657_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-1657.yaml rename to rules/web/web_cve_CVE-2010-1657_exploitation_attempt.yaml index 1772f0c8e..447bbe514 100644 --- a/rules/web/web_cve_CVE-2010-1657.yaml +++ b/rules/web/web_cve_CVE-2010-1657_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1657:Joomla! Component SmartSite 1.0.0 - Local File Inclusion -id: 4fbedbee-ea11-4a65-9c25-bbb0d74f58fe -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1657 exploitation attempt +id: 7bdc9bd3-8dcd-4187-ab28-98b20cc1d020 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the SmartSite (com_smartsite) component diff --git a/rules/web/web_cve_CVE-2010-1718.yaml b/rules/web/web_cve_CVE-2010-1718_exploitation_attempt.yaml similarity index 80% rename from rules/web/web_cve_CVE-2010-1718.yaml rename to rules/web/web_cve_CVE-2010-1718_exploitation_attempt.yaml index 9e4d9a4ad..148380f12 100644 --- a/rules/web/web_cve_CVE-2010-1718.yaml +++ b/rules/web/web_cve_CVE-2010-1718_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1718:Joomla! Component Archery Scores 1.0.6 - Local File Inclusion -id: 92b06e2a-66ae-47b3-a135-fd2759f05902 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1718 exploitation attempt +id: a538251c-d600-43f3-8051-c3a83a5e8702 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in archeryscores.php in the Archery diff --git a/rules/web/web_cve_CVE-2010-1722.yaml b/rules/web/web_cve_CVE-2010-1722_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-1722.yaml rename to rules/web/web_cve_CVE-2010-1722_exploitation_attempt.yaml index a7765c23c..941793208 100644 --- a/rules/web/web_cve_CVE-2010-1722.yaml +++ b/rules/web/web_cve_CVE-2010-1722_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1722:Joomla! Component Online Market 2.x - Local File Inclusion -id: b0d9873c-08fc-4389-89aa-751d7d8d682e -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1722 exploitation attempt +id: 84715b18-505d-4252-9470-03c98a3006e5 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Online Market (com_market) component diff --git a/rules/web/web_cve_CVE-2010-1875.yaml b/rules/web/web_cve_CVE-2010-1875_exploitation_attempt.yaml similarity index 84% rename from rules/web/web_cve_CVE-2010-1875.yaml rename to rules/web/web_cve_CVE-2010-1875_exploitation_attempt.yaml index e38a061a8..9bd796a52 100644 --- a/rules/web/web_cve_CVE-2010-1875.yaml +++ b/rules/web/web_cve_CVE-2010-1875_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1875:Joomla! Component Property - Local File Inclusion -id: 454a58b3-a30a-4577-8175-a93d0febcb34 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1875 exploitation attempt +id: af757e17-ad81-4a28-a551-49c17aa5113a +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Real Estate Property (com_properties) diff --git a/rules/web/web_cve_CVE-2010-1953.yaml b/rules/web/web_cve_CVE-2010-1953_exploitation_attempt.yaml similarity index 81% rename from rules/web/web_cve_CVE-2010-1953.yaml rename to rules/web/web_cve_CVE-2010-1953_exploitation_attempt.yaml index b5cb130b3..4f10cf4e9 100644 --- a/rules/web/web_cve_CVE-2010-1953.yaml +++ b/rules/web/web_cve_CVE-2010-1953_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1953:Joomla! Component iNetLanka Multiple Map 1.0 - Local File Inclusion -id: e8b2e18e-5a9e-429e-9cd3-a839701736dc -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1953 exploitation attempt +id: 0fc4af77-6974-4e50-bf5e-9f175304eb54 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap) diff --git a/rules/web/web_cve_CVE-2010-1954.yaml b/rules/web/web_cve_CVE-2010-1954_exploitation_attempt.yaml similarity index 79% rename from rules/web/web_cve_CVE-2010-1954.yaml rename to rules/web/web_cve_CVE-2010-1954_exploitation_attempt.yaml index 4b1a6939a..23ef26198 100644 --- a/rules/web/web_cve_CVE-2010-1954.yaml +++ b/rules/web/web_cve_CVE-2010-1954_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1954:Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion -id: be925ca8-6808-4c32-951d-6069597c2cab -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1954 exploitation attempt +id: 2ccf65c5-e4b3-48f6-961e-93bbd537ca80 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) diff --git a/rules/web/web_cve_CVE-2010-1955.yaml b/rules/web/web_cve_CVE-2010-1955_exploitation_attempt.yaml similarity index 81% rename from rules/web/web_cve_CVE-2010-1955.yaml rename to rules/web/web_cve_CVE-2010-1955_exploitation_attempt.yaml index fb9bb13f6..10d81d675 100644 --- a/rules/web/web_cve_CVE-2010-1955.yaml +++ b/rules/web/web_cve_CVE-2010-1955_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1955:Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion -id: 9d34dee7-212f-49a0-a1fe-41b37ea241d9 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1955 exploitation attempt +id: 497c0911-226f-48a1-ac9f-518ffb98e65e +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory) diff --git a/rules/web/web_cve_CVE-2010-1979.yaml b/rules/web/web_cve_CVE-2010-1979_exploitation_attempt.yaml similarity index 81% rename from rules/web/web_cve_CVE-2010-1979.yaml rename to rules/web/web_cve_CVE-2010-1979_exploitation_attempt.yaml index a88364c80..80eb18973 100644 --- a/rules/web/web_cve_CVE-2010-1979.yaml +++ b/rules/web/web_cve_CVE-2010-1979_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1979:Joomla! Component Affiliate Datafeeds 880 - Local File Inclusion -id: 4ccbb33d-d6d9-4f18-bc7f-502bd3cc9481 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1979 exploitation attempt +id: 5b1c3030-e17b-43b3-b95e-952355a0f43f +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Affiliate Datafeeds (com_datafeeds) diff --git a/rules/web/web_cve_CVE-2010-1983.yaml b/rules/web/web_cve_CVE-2010-1983_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-1983.yaml rename to rules/web/web_cve_CVE-2010-1983_exploitation_attempt.yaml index 7543adad6..a29bfea42 100644 --- a/rules/web/web_cve_CVE-2010-1983.yaml +++ b/rules/web/web_cve_CVE-2010-1983_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-1983:Joomla! Component redTWITTER 1.0 - Local File Inclusion -id: fae044ae-fe67-4a83-809f-7a3203ee1a6d -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-1983 exploitation attempt +id: c4f29c4f-0281-4518-a824-88f259d92ef5 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the redTWITTER (com_redtwitter) diff --git a/rules/web/web_cve_CVE-2010-2033.yaml b/rules/web/web_cve_CVE-2010-2033_exploitation_attempt.yaml similarity index 84% rename from rules/web/web_cve_CVE-2010-2033.yaml rename to rules/web/web_cve_CVE-2010-2033_exploitation_attempt.yaml index bcb492f12..20b4dc702 100644 --- a/rules/web/web_cve_CVE-2010-2033.yaml +++ b/rules/web/web_cve_CVE-2010-2033_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-2033:Joomla Percha Categories Tree 0.6 - Local File Inclusion -id: 80fca714-f31f-48e7-82cd-07bb3ed0917d -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-2033 exploitation attempt +id: b5c6267a-7b2e-47c8-84dd-68a89ceb1e64 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) diff --git a/rules/web/web_cve_CVE-2010-2036.yaml b/rules/web/web_cve_CVE-2010-2036_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-2036.yaml rename to rules/web/web_cve_CVE-2010-2036_exploitation_attempt.yaml index 58d3c3104..f6c9adca4 100644 --- a/rules/web/web_cve_CVE-2010-2036.yaml +++ b/rules/web/web_cve_CVE-2010-2036_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-2036:Joomla! Component Percha Fields Attach 1.0 - Directory Traversal -id: b86f1914-f00b-4ba3-8f0b-3db29399d4d7 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-2036 exploitation attempt +id: 5f89e5fb-6f87-4fee-96b2-700e987a1c7e +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) diff --git a/rules/web/web_cve_CVE-2010-2259.yaml b/rules/web/web_cve_CVE-2010-2259_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-2259.yaml rename to rules/web/web_cve_CVE-2010-2259_exploitation_attempt.yaml index 55e68a9ed..70cc525b4 100644 --- a/rules/web/web_cve_CVE-2010-2259.yaml +++ b/rules/web/web_cve_CVE-2010-2259_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-2259:Joomla! Component com_bfsurvey - Local File Inclusion -id: a95a2207-33da-40df-a4ab-f8a53d8e99d9 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-2259 exploitation attempt +id: 7ead4790-e0f8-41fa-bb14-f1d225964fd4 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the BF Survey (com_bfsurvey) component diff --git a/rules/web/web_cve_CVE-2010-2307.yaml b/rules/web/web_cve_CVE-2010-2307_exploitation_attempt.yaml similarity index 80% rename from rules/web/web_cve_CVE-2010-2307.yaml rename to rules/web/web_cve_CVE-2010-2307_exploitation_attempt.yaml index 3b4a10bec..32008b7c2 100644 --- a/rules/web/web_cve_CVE-2010-2307.yaml +++ b/rules/web/web_cve_CVE-2010-2307_exploitation_attempt.yaml @@ -1,7 +1,6 @@ -title: CVE-2010-2307:Motorola SBV6120E SURFboard Digital Voice Modem SBV6X2X-1.0.0.5-SCM - - Directory Traversal -id: 6251acca-594f-48d0-8ec8-6f156c844e6e -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-2307 exploitation attempt +id: 6e0a4fc5-c7a5-40c6-a080-bc5a452637a9 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Multiple directory traversal vulnerabilities in the web server for Motorola diff --git a/rules/web/web_cve_CVE-2010-2682.yaml b/rules/web/web_cve_CVE-2010-2682_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-2682.yaml rename to rules/web/web_cve_CVE-2010-2682_exploitation_attempt.yaml index 170858c7f..01e0fedc8 100644 --- a/rules/web/web_cve_CVE-2010-2682.yaml +++ b/rules/web/web_cve_CVE-2010-2682_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-2682:Joomla! Component Realtyna Translator 1.0.15 - Local File Inclusion -id: 1f409782-791f-4d8b-a63b-d0d713463cdb -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-2682 exploitation attempt +id: 5f7ea8cf-47e3-46e6-a173-43a99c904e43 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the Realtyna Translator (com_realtyna) diff --git a/rules/web/web_cve_CVE-2010-2861.yaml b/rules/web/web_cve_CVE-2010-2861_exploitation_attempt.yaml similarity index 86% rename from rules/web/web_cve_CVE-2010-2861.yaml rename to rules/web/web_cve_CVE-2010-2861_exploitation_attempt.yaml index 40081783e..7dc8e6df0 100644 --- a/rules/web/web_cve_CVE-2010-2861.yaml +++ b/rules/web/web_cve_CVE-2010-2861_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-2861:Adobe ColdFusion 8.0/8.0.1/9.0/9.0.1 LFI -id: 7ceb4e78-34fa-48a5-be21-a50307631d19 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-2861 exploitation attempt +id: 21032758-8761-4a18-8f66-bace612e2481 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Multiple directory traversal vulnerabilities in the administrator console diff --git a/rules/web/web_cve_CVE-2010-3426.yaml b/rules/web/web_cve_CVE-2010-3426_exploitation_attempt.yaml similarity index 80% rename from rules/web/web_cve_CVE-2010-3426.yaml rename to rules/web/web_cve_CVE-2010-3426_exploitation_attempt.yaml index 42379e8aa..ad2dab17a 100644 --- a/rules/web/web_cve_CVE-2010-3426.yaml +++ b/rules/web/web_cve_CVE-2010-3426_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-3426:Joomla! Component Jphone 1.0 Alpha 3 - Local File Inclusion -id: a991b845-3035-492c-914d-0cb7b0e7bd10 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-3426 exploitation attempt +id: 06621f7e-2987-4625-8c42-d66951a9da9d +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in jphone.php in the JPhone (com_jphone) diff --git a/rules/web/web_cve_CVE-2010-4231.yaml b/rules/web/web_cve_CVE-2010-4231_exploitation_attempt.yaml similarity index 81% rename from rules/web/web_cve_CVE-2010-4231.yaml rename to rules/web/web_cve_CVE-2010-4231_exploitation_attempt.yaml index dbe3d7256..5e4062f30 100644 --- a/rules/web/web_cve_CVE-2010-4231.yaml +++ b/rules/web/web_cve_CVE-2010-4231_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-4231:Camtron CMNC-200 IP Camera - Directory Traversal -id: 8c7f0cbc-c7cd-4bb5-87ef-9e2ff125b7d8 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-4231 exploitation attempt +id: 8eb41b36-2b5a-44e0-a44b-b0ebdbff3e1b +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: The CMNC-200 IP Camera has a built-in web server that is enabled by default. diff --git a/rules/web/web_cve_CVE-2010-4617.yaml b/rules/web/web_cve_CVE-2010-4617_exploitation_attempt.yaml similarity index 82% rename from rules/web/web_cve_CVE-2010-4617.yaml rename to rules/web/web_cve_CVE-2010-4617_exploitation_attempt.yaml index f31d54183..080cc8810 100644 --- a/rules/web/web_cve_CVE-2010-4617.yaml +++ b/rules/web/web_cve_CVE-2010-4617_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-4617:Joomla! Component JotLoader 2.2.1 - Local File Inclusion -id: 35c29803-4068-4a64-a007-d2b6984f8c58 -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-4617 exploitation attempt +id: ed14d2cb-8716-4ab1-a819-36d173e617ab +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in the JotLoader (com_jotloader) component diff --git a/rules/web/web_cve_CVE-2010-5278.yaml b/rules/web/web_cve_CVE-2010-5278_exploitation_attempt.yaml similarity index 85% rename from rules/web/web_cve_CVE-2010-5278.yaml rename to rules/web/web_cve_CVE-2010-5278_exploitation_attempt.yaml index fd292926b..cf20ed0ee 100644 --- a/rules/web/web_cve_CVE-2010-5278.yaml +++ b/rules/web/web_cve_CVE-2010-5278_exploitation_attempt.yaml @@ -1,6 +1,6 @@ -title: CVE-2010-5278:MODx manager - Local File Inclusion -id: 5e042bf8-67ea-4455-8b75-07c57d7ccdad -author: Subhash Popuri (@pbssubhash) +title: CVE-2010-5278 exploitation attempt +id: 57bb7f1b-bb41-400d-a6e4-7eb2b70b3593 +Author: Subhash Popuri (@pbssubhash) date: 25/08/2021 status: experimental description: Directory traversal vulnerability in manager/controllers/default/resource/tvs.php