-
Notifications
You must be signed in to change notification settings - Fork 246
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
transform the exploit database to yaml #26
Comments
Hello, It's a nice idea to change the exploit database, @rezasp please review and suggest Regards. |
xml is kind-of hard to read/write. json is also more for machines, IMHO, So my argument still is: I've been already toying around with semi-automatic extraction cve's regarding joomla. - desc: XSS and SQLi in huge IT gallery v1.1.5 for Joomla
id: CVE-2016-1000113
refs:
- src:
BID:
- entry: '92102'
url: http://www.securityfocus.com/bid/92102
MISC:
- entry: http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro
url: http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro
- entry: http://www.vapidlabs.com/advisory.php?v=164
url: http://www.vapidlabs.com/advisory.php?v=164
vuln_part: core
vulnerable_versions:
from: 1.1.5
to: ''
- desc: XSS in huge IT gallery v1.1.5 for Joomla
id: CVE-2016-1000114
refs:
- src:
BID:
- entry: '92102'
url: http://www.securityfocus.com/bid/92102
MISC:
- entry: http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro
url: http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro
- entry: http://www.vapidlabs.com/advisory.php?v=164
url: http://www.vapidlabs.com/advisory.php?v=164
vuln_part: core
vulnerable_versions:
from: 1.1.5
to: |
The exploit database is hard to maintain,
moving it to yaml, makes it human readable and much easier to maintain and contribute to.
The text was updated successfully, but these errors were encountered: