diff --git a/scripts/http-vuln-cve2006-3392.nse b/scripts/http-vuln-cve2006-3392.nse index 470f09953..9479e4d2c 100644 --- a/scripts/http-vuln-cve2006-3392.nse +++ b/scripts/http-vuln-cve2006-3392.nse @@ -4,7 +4,7 @@ local stdnse = require "stdnse" local vulns = require "vulns" description = [[ -Exploits a file disclosure vulnerability in Webmin (CVE-2010-0738) +Exploits a file disclosure vulnerability in Webmin (CVE-2006-3392) Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML. This allows arbitrary files to be read, without requiring authentication, using "..%01" sequences diff --git a/scripts/http-wordpress-users.nse b/scripts/http-wordpress-users.nse index 808899682..25e32c3c3 100644 --- a/scripts/http-wordpress-users.nse +++ b/scripts/http-wordpress-users.nse @@ -6,10 +6,12 @@ local stdnse = require "stdnse" local string = require "string" description = [[ -Enumerates usernames in Wordpress blog/CMS installations by exploiting an information disclosure vulnerability existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others. +Enumerates usernames in Wordpress blog/CMS installations by exploiting an +information disclosure vulnerability existing in versions 2.6, 3.1, 3.1.1, +3.1.3 and 3.2-beta2 and possibly others. Original advisory: -* http://www.talsoft.com.ar/index.php/research/security-advisories/wordpress-user-id-and-user-name-disclosure +* http://www.talsoft.com.ar/site/research/security-advisories/wordpress-user-id-and-user-name-disclosure/ ]] ---