|
3379 | 3379 | "CWE-94" |
3380 | 3380 | ] |
3381 | 3381 | }, |
| 3382 | + "crowdsecurity/vpatch-CVE-2025-40552": { |
| 3383 | + "name": "crowdsecurity/vpatch-CVE-2025-40552", |
| 3384 | + "description": "Detects authentication bypass in SolarWinds Web Help Desk via WebObjects wopage parameter access to sensitive pages", |
| 3385 | + "label": "SolarWinds Web Help Desk - Authentication Bypass", |
| 3386 | + "behaviors": [ |
| 3387 | + "http:exploit" |
| 3388 | + ], |
| 3389 | + "mitre_attacks": [ |
| 3390 | + "TA0001:T1190" |
| 3391 | + ], |
| 3392 | + "confidence": 3, |
| 3393 | + "spoofable": 0, |
| 3394 | + "cti": true, |
| 3395 | + "service": "http", |
| 3396 | + "created_at": "2026-02-27T09:11:25", |
| 3397 | + "cves": [ |
| 3398 | + "CVE-2025-40552" |
| 3399 | + ], |
| 3400 | + "cwes": [ |
| 3401 | + "CWE-287" |
| 3402 | + ] |
| 3403 | + }, |
| 3404 | + "crowdsecurity/vpatch-CVE-2025-4689": { |
| 3405 | + "name": "crowdsecurity/vpatch-CVE-2025-4689", |
| 3406 | + "description": "Detects WordPress Ads Pro Plugin unauthenticated SQLi + LFI chain via wp-ajax endpoint targeting a_id parameter (CVE-2025-4689)", |
| 3407 | + "label": "WordPress Ads Pro Plugin - SQLI", |
| 3408 | + "behaviors": [ |
| 3409 | + "http:exploit" |
| 3410 | + ], |
| 3411 | + "mitre_attacks": [ |
| 3412 | + "TA0001:T1190" |
| 3413 | + ], |
| 3414 | + "confidence": 3, |
| 3415 | + "spoofable": 0, |
| 3416 | + "cti": true, |
| 3417 | + "service": "http", |
| 3418 | + "created_at": "2026-02-26T09:31:51", |
| 3419 | + "cves": [ |
| 3420 | + "CVE-2025-4689" |
| 3421 | + ], |
| 3422 | + "cwes": [ |
| 3423 | + "CWE-89" |
| 3424 | + ] |
| 3425 | + }, |
3382 | 3426 | "crowdsecurity/vpatch-CVE-2025-47188": { |
3383 | 3427 | "name": "crowdsecurity/vpatch-CVE-2025-47188", |
3384 | 3428 | "description": "Detects OS command injection in Mitel 6000 series SIP Phones via ringtone upload functionality.", |
|
3643 | 3687 | "CWE-89" |
3644 | 3688 | ] |
3645 | 3689 | }, |
| 3690 | + "crowdsecurity/vpatch-CVE-2025-61678": { |
| 3691 | + "name": "crowdsecurity/vpatch-CVE-2025-61678", |
| 3692 | + "description": "Detects FreePBX arbitrary file upload RCE via fwbrand directory traversal in Custom Firmware Management endpoint (CVE-2025-61678)", |
| 3693 | + "label": "FreePBX - RCE", |
| 3694 | + "behaviors": [ |
| 3695 | + "http:exploit" |
| 3696 | + ], |
| 3697 | + "mitre_attacks": [ |
| 3698 | + "TA0001:T1190" |
| 3699 | + ], |
| 3700 | + "confidence": 3, |
| 3701 | + "spoofable": 0, |
| 3702 | + "cti": true, |
| 3703 | + "service": "http", |
| 3704 | + "created_at": "2026-02-26T09:31:51", |
| 3705 | + "cves": [ |
| 3706 | + "CVE-2025-61678" |
| 3707 | + ], |
| 3708 | + "cwes": [ |
| 3709 | + "CWE-22" |
| 3710 | + ] |
| 3711 | + }, |
3646 | 3712 | "crowdsecurity/vpatch-CVE-2025-61882": { |
3647 | 3713 | "name": "crowdsecurity/vpatch-CVE-2025-61882", |
3648 | 3714 | "description": "Detects Oracle E-Business Suite 12.2.3\u201312.2.14 LFI and SSRF/RCE via ieshostedsurvey.jsp and UiServlet endpoints.", |
|
3687 | 3753 | "CWE-23" |
3688 | 3754 | ] |
3689 | 3755 | }, |
| 3756 | + "crowdsecurity/vpatch-CVE-2025-66039": { |
| 3757 | + "name": "crowdsecurity/vpatch-CVE-2025-66039", |
| 3758 | + "description": "Detects FreePBX authentication bypass and SQL injection chain via admin config endpoint (CVE-2025-66039, CVE-2025-61675)", |
| 3759 | + "label": "FreePBX - Authentication Bypass SQLI", |
| 3760 | + "behaviors": [ |
| 3761 | + "http:exploit" |
| 3762 | + ], |
| 3763 | + "mitre_attacks": [ |
| 3764 | + "TA0001:T1190" |
| 3765 | + ], |
| 3766 | + "confidence": 3, |
| 3767 | + "spoofable": 0, |
| 3768 | + "cti": true, |
| 3769 | + "service": "http", |
| 3770 | + "created_at": "2026-02-26T09:31:51", |
| 3771 | + "cves": [ |
| 3772 | + "CVE-2025-66039" |
| 3773 | + ], |
| 3774 | + "cwes": [ |
| 3775 | + "CWE-89" |
| 3776 | + ] |
| 3777 | + }, |
3690 | 3778 | "crowdsecurity/vpatch-CVE-2025-8110": { |
3691 | 3779 | "name": "crowdsecurity/vpatch-CVE-2025-8110", |
3692 | 3780 | "description": "Detects symlink bypass vulnerability in Gogs PutContents API allowing file overwrite and potential RCE (CVE-2025-8110)", |
|
0 commit comments