From 684ab6105ad757a0997ce3c9b826cc9d184d9b64 Mon Sep 17 00:00:00 2001
From: kazet <krzysztof.zajac@cert.pl>
Date: Wed, 6 Nov 2024 13:23:50 +0100
Subject: [PATCH] More Nuclei translations and sus templates (#1379)

* More Nuclei translations and sus templates

* italian ham
---
 artemis/config.py                                              | 3 +++
 .../modules/nuclei/translations/nuclei_messages/pl_PL.py       | 1 +
 2 files changed, 4 insertions(+)

diff --git a/artemis/config.py b/artemis/config.py
index aa1f43aa5..30a2881a1 100644
--- a/artemis/config.py
+++ b/artemis/config.py
@@ -681,6 +681,9 @@ class Nuclei:
                         "http/cves/2021/CVE-2021-42566.yaml",
                         "http/cves/2021/CVE-2021-45380.yaml",
                         "http/cves/2023/CVE-2023-35161.yaml",
+                        "http/cves/2023/CVE-2023-39650.yaml",
+                        "http/cves/2023/CVE-2023-43373.yaml",
+                        "http/cves/2023/CVE-2023-43374.yaml",
                         "http/cves/2023/CVE-2023-47684.yaml",
                         "http/vulnerabilities/ibm/eclipse-help-system-xss.yaml",
                         "http/vulnerabilities/ibm/ibm-infoprint-lfi.yaml",
diff --git a/artemis/reporting/modules/nuclei/translations/nuclei_messages/pl_PL.py b/artemis/reporting/modules/nuclei/translations/nuclei_messages/pl_PL.py
index 6de4e5a01..ecb62f2b4 100644
--- a/artemis/reporting/modules/nuclei/translations/nuclei_messages/pl_PL.py
+++ b/artemis/reporting/modules/nuclei/translations/nuclei_messages/pl_PL.py
@@ -1008,6 +1008,7 @@
     + UPDATE_HINT,
     "phpPgAdmin 4.2.1 is vulnerable to local file inclusion in libraries/lib.inc.php when register globals is enabled. Remote attackers can read arbitrary files via a .. (dot dot) in the _language parameter to index.php.": "phpPgAdmin w wersji 4.2.1 zawiera podatność umożliwiającą atakującemu odczyt dowolnych plików z dysku."
     + UPDATE_HINT,
+    "Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the n_utente_agg parameter at /hoteldruid/interconnessioni.php.": "Hoteldruid w wersji 3.0.5 i potencjalnie wcześniejszych zawiera podatność SQL Injection, umożliwiającą atakującemu pobranie pełnej zawartości bazy danych.",
     "Keycloak 8.0 and prior contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and thus steal cookie-based authentication credentials and launch other attacks.": "Keycloak w wersji 8.0 i wcześniejszych zawiera podatność "
     + REFLECTED_XSS_DESCRIPTION
     + UPDATE_HINT,