diff --git a/artemis/config.py b/artemis/config.py index aa1f43aa5..30a2881a1 100644 --- a/artemis/config.py +++ b/artemis/config.py @@ -681,6 +681,9 @@ class Nuclei: "http/cves/2021/CVE-2021-42566.yaml", "http/cves/2021/CVE-2021-45380.yaml", "http/cves/2023/CVE-2023-35161.yaml", + "http/cves/2023/CVE-2023-39650.yaml", + "http/cves/2023/CVE-2023-43373.yaml", + "http/cves/2023/CVE-2023-43374.yaml", "http/cves/2023/CVE-2023-47684.yaml", "http/vulnerabilities/ibm/eclipse-help-system-xss.yaml", "http/vulnerabilities/ibm/ibm-infoprint-lfi.yaml", diff --git a/artemis/reporting/modules/nuclei/translations/nuclei_messages/pl_PL.py b/artemis/reporting/modules/nuclei/translations/nuclei_messages/pl_PL.py index 6de4e5a01..ecb62f2b4 100644 --- a/artemis/reporting/modules/nuclei/translations/nuclei_messages/pl_PL.py +++ b/artemis/reporting/modules/nuclei/translations/nuclei_messages/pl_PL.py @@ -1008,6 +1008,7 @@ + UPDATE_HINT, "phpPgAdmin 4.2.1 is vulnerable to local file inclusion in libraries/lib.inc.php when register globals is enabled. Remote attackers can read arbitrary files via a .. (dot dot) in the _language parameter to index.php.": "phpPgAdmin w wersji 4.2.1 zawiera podatność umożliwiającą atakującemu odczyt dowolnych plików z dysku." + UPDATE_HINT, + "Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the n_utente_agg parameter at /hoteldruid/interconnessioni.php.": "Hoteldruid w wersji 3.0.5 i potencjalnie wcześniejszych zawiera podatność SQL Injection, umożliwiającą atakującemu pobranie pełnej zawartości bazy danych.", "Keycloak 8.0 and prior contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and thus steal cookie-based authentication credentials and launch other attacks.": "Keycloak w wersji 8.0 i wcześniejszych zawiera podatność " + REFLECTED_XSS_DESCRIPTION + UPDATE_HINT,