commit
2b5c3c48cc
|
@ -4,12 +4,12 @@ info:
|
|||
name: EEA - Information Disclosure
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
description: EEA is susceptible to information disclosure.
|
||||
description: EEA is susceptible to information disclosure including the username and password.
|
||||
reference:
|
||||
- https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
cwe-id: CWE-200
|
||||
tags: config,exposure,cnvd,cnvd2021
|
||||
|
||||
|
|
|
@ -1,17 +1,17 @@
|
|||
id: lutron-default-login
|
||||
|
||||
info:
|
||||
name: Lutron - Default Login
|
||||
name: Lutron - Default Account
|
||||
author: geeknik
|
||||
severity: high
|
||||
severity: critical
|
||||
description: Multiple Lutron devices contain a default login vulnerability. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
|
||||
reference:
|
||||
- https://www.lutron.com
|
||||
- https://vulners.com/openvas/OPENVAS:1361412562310113206
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
|
||||
cvss-score: 5.8
|
||||
cwe-id: CWE-522
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cwe-id: CWE-1391
|
||||
tags: default-login,lutron,iot
|
||||
|
||||
requests:
|
||||
|
|
|
@ -8,9 +8,9 @@ info:
|
|||
reference:
|
||||
- https://docs.commscope.com/bundle/fastiron-08092-securityguide/page/GUID-32D3BB01-E600-4FBE-B555-7570B5024D34.html
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
||||
cvss-score: 8.3
|
||||
cwe-id: CWE-522
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cwe-id: CWE-1391
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: title:"ruckus"
|
||||
|
|
|
@ -6,8 +6,8 @@ info:
|
|||
severity: high
|
||||
description: MyBB installation panel was detected.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
|
||||
cvss-score: 8.6
|
||||
cwe-id: CWE-200
|
||||
metadata:
|
||||
verified: true
|
||||
|
|
|
@ -3,12 +3,12 @@ id: osticket-install
|
|||
info:
|
||||
name: osTicket Installer Panel - Detect
|
||||
author: ritikchaddha
|
||||
severity: high
|
||||
severity: critical
|
||||
description: osTicket installer panel was detected.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cwe-id: CWE-200
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
|
||||
cvss-score: 9.4
|
||||
cwe-id: CWE-284
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.title:"osTicket Installer"
|
||||
|
|
|
@ -7,7 +7,7 @@ info:
|
|||
description: |
|
||||
SaltStack config panel was detected.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
metadata:
|
||||
|
|
|
@ -6,8 +6,8 @@ info:
|
|||
severity: info
|
||||
description: Apache Solr admin panel was detected.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
|
||||
cvss-score: 8.6
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
metadata:
|
||||
verified: true
|
||||
|
|
|
@ -6,7 +6,7 @@ info:
|
|||
severity: info
|
||||
description: The Wagtail panel has been detected.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
metadata:
|
||||
|
|
|
@ -3,7 +3,7 @@ id: couchbase-buckets-api
|
|||
info:
|
||||
name: Couchbase Buckets Unauthenticated REST API - Detect
|
||||
author: geeknik
|
||||
severity: info
|
||||
severity: medium
|
||||
description: Couchbase Buckets REST API without authentication was detected.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
|
|
|
@ -10,9 +10,9 @@ info:
|
|||
- https://docs.djangoproject.com/en/1.11/topics/logging/#django-security
|
||||
- https://github.com/projectdiscovery/nuclei-templates/blob/master/file/logs/django-framework-
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cwe-id: CWE-200exceptions.yaml
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
metadata:
|
||||
verified: true
|
||||
tags: exposure,config,django
|
||||
|
|
|
@ -8,8 +8,8 @@ info:
|
|||
reference:
|
||||
- https://gruntjs.com/sample-gruntfile
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
tags: config,exposure
|
||||
|
||||
|
|
|
@ -3,12 +3,12 @@ id: htpasswd-detection
|
|||
info:
|
||||
name: Apache htpasswd Config - Detect
|
||||
author: geeknik
|
||||
severity: info
|
||||
severity: high
|
||||
description: Apache htpasswd configuration was detected.
|
||||
reference: https://httpd.apache.org/docs/current/programs/htpasswd.html
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
cwe-id: CWE-200
|
||||
tags: config,exposure
|
||||
|
||||
|
|
|
@ -7,8 +7,8 @@ info:
|
|||
description: Apache httpd configuration information was detected.
|
||||
reference: https://httpd.apache.org/docs/current/configuring.html
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
tags: config,exposure,httpd
|
||||
|
||||
|
|
|
@ -7,8 +7,8 @@ info:
|
|||
description: Jetbrains IDE DataSources configuration information was detected.
|
||||
reference: https://www.jetbrains.com
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
tags: config,exposure,jetbrains
|
||||
|
||||
|
|
|
@ -8,8 +8,8 @@ info:
|
|||
reference:
|
||||
- https://issues.jboss.org/browse/KEYCLOAK-571
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
tags: keycloak,config
|
||||
|
||||
|
|
|
@ -8,8 +8,8 @@ info:
|
|||
reference:
|
||||
- https://netbeans.apache.org/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
tags: netbeans,config,exposure
|
||||
|
||||
|
|
|
@ -8,8 +8,8 @@ info:
|
|||
reference:
|
||||
- https://owncloud.com/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
tags: config,exposure
|
||||
|
||||
|
|
|
@ -7,8 +7,8 @@ info:
|
|||
description: npm configuration information was detected. All npm packages contain a file, usually in the project root, called package.json - this file holds various metadata relevant to the project.
|
||||
reference: https://www.npmjs.com
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
tags: config,exposure
|
||||
|
||||
|
|
|
@ -7,8 +7,8 @@ info:
|
|||
description: phpspec configuration information was detected.
|
||||
reference: https://phpspec.net/en/stable/cookbook/configuration.html
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
metadata:
|
||||
verified: true
|
||||
|
|
|
@ -7,8 +7,8 @@ info:
|
|||
description: Pipfile configuration information was detected.
|
||||
reference: https://pypi.org/project
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
metadata:
|
||||
verified: true
|
||||
|
|
|
@ -9,8 +9,8 @@ info:
|
|||
- https://raw.githubusercontent.com/maurosoria/dirsearch/master/db/dicc.txt
|
||||
- https://github.com/rubocop/rubocop
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
metadata:
|
||||
verified: true
|
||||
|
|
|
@ -1,39 +0,0 @@
|
|||
id: lutron-iot-default-login
|
||||
|
||||
info:
|
||||
name: Lutron IOT Device Default Login Panel - Detect
|
||||
author: geeknik
|
||||
severity: high
|
||||
description: Lutron IOT Device Default login panel was detected.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
reference:
|
||||
- https://www.lutron.com
|
||||
tags: iot,default-login,lutron,panel
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/login?login=lutron&password=lutron"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "<TITLE>LUTRON</TITLE>"
|
||||
- ">DeviceIP</A>"
|
||||
- ">Get Database Info as XML</A>"
|
||||
condition: and
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "text/html"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2023/01/29
|
|
@ -1,27 +0,0 @@
|
|||
id: addeventlistener-detect
|
||||
|
||||
info:
|
||||
name: DOM EventListener - Cross-Site Scripting
|
||||
author: yavolo,dwisiswant0
|
||||
severity: info
|
||||
description: EventListener contains a cross-site scripting vulnerability via the document object model (DOM). An attacker can execute arbitrary script which can then allow theft of cookie-based authentication credentials and launch of other attacks.
|
||||
reference:
|
||||
- https://portswigger.net/web-security/dom-based/controlling-the-web-message-source
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
tags: xss,misc
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
part: body
|
||||
regex:
|
||||
- (([\w\_]+)\.)?add[Ee]vent[Ll]istener\(["']?[\w\_]+["']? # Test cases: https://www.regextester.com/?fam=121118
|
||||
|
||||
# Enhanced by md on 2022/09/19
|
|
@ -3,7 +3,7 @@ id: command-api-explorer
|
|||
info:
|
||||
name: Command API Explorer Panel - Detect
|
||||
author: DhiyaneshDK
|
||||
severity: low
|
||||
severity: info
|
||||
description: Command API Explorer panel was detected.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
|
|
|
@ -3,7 +3,7 @@ id: dgraph-dashboard-exposure
|
|||
info:
|
||||
name: Dgraph Ratel Dashboard Exposure Panel - Detect
|
||||
author: dhiyaneshDk
|
||||
severity: low
|
||||
severity: info
|
||||
description: Dgraph Ratel Dashboard Exposure panel was detected.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
|
|
|
@ -3,9 +3,9 @@ id: office365-open-redirect
|
|||
info:
|
||||
name: Office365 Autodiscover - Open Redirect
|
||||
author: dhiyaneshDk
|
||||
severity: low
|
||||
severity: medium
|
||||
description: Office365 Autodiscover contains an open redirect vulnerability. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
|
||||
remediation: See https://learn.microsoft.com/en-us/outlook/troubleshoot/connectivity/how-to-suppress-autodiscover-redirect-warning for a workaround.
|
||||
remediation: See the workaround detailed in the Medium post in the references.
|
||||
reference:
|
||||
- https://medium.com/@heinjame/office365-open-redirect-from-autodiscover-64284d26c168
|
||||
classification:
|
||||
|
|
|
@ -3,11 +3,11 @@ id: pghero-dashboard-exposure
|
|||
info:
|
||||
name: PgHero Dashboard Exposure Panel - Detect
|
||||
author: DhiyaneshDk
|
||||
severity: low
|
||||
severity: medium
|
||||
description: PgHero Dashboard Exposure panel was detected.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cwe-id: CWE-200
|
||||
reference:
|
||||
- https://github.com/ankane/pghero
|
||||
|
|
|
@ -6,8 +6,8 @@ info:
|
|||
severity: medium
|
||||
description: Fastvue Dashboard panel was detected without authentication.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cwe-id: CWE-200
|
||||
metadata:
|
||||
verified: true
|
||||
|
|
|
@ -8,8 +8,8 @@ info:
|
|||
reference:
|
||||
- https://github.com/Tinram/MySQL-Brute
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||
cvss-score: 0.0
|
||||
cwe-id: CWE-200
|
||||
tags: network,mysql,bruteforce,db
|
||||
|
||||
|
|
|
@ -9,9 +9,9 @@ info:
|
|||
- https://sir.kr/g5_pds/4788?page=5
|
||||
- https://github.com/gnuboard/gnuboard5/commit/8182cac90d2ee2f9da06469ecba759170e782ee3
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.html:"Gnuboard"
|
||||
|
|
|
@ -10,9 +10,9 @@ info:
|
|||
- https://huntr.dev/bounties/ed317cde-9bd1-429e-b6d3-547e72534dd5/
|
||||
- https://vulners.com/huntr/25775287-88CD-4F00-B978-692D627DFF04
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.html:"gnuboard5"
|
||||
|
|
|
@ -9,9 +9,9 @@ info:
|
|||
reference:
|
||||
- https://huntr.dev/bounties/ad2a9b32-fe6c-43e9-9b05-2c77c58dde6a/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.html:"gnuboard5"
|
||||
|
|
|
@ -8,9 +8,9 @@ info:
|
|||
reference:
|
||||
- https://www.dionach.com/blog/moodle-jmol-plugin-multiple-vulnerabilities/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: moodle,xss
|
||||
|
||||
requests:
|
||||
|
|
|
@ -9,9 +9,9 @@ info:
|
|||
- https://twitter.com/JacksonHHax/status/1391367064154042377
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-32478
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: moodle,xss
|
||||
|
||||
requests:
|
||||
|
|
|
@ -10,9 +10,9 @@ info:
|
|||
- https://www.exploit-db.com/exploits/49546
|
||||
- https://www.sourcecodester.com/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.html:"Car Rental Management System"
|
||||
|
|
|
@ -3,7 +3,7 @@ id: kavita-lfi
|
|||
info:
|
||||
name: Kavita - Local File Inclusion
|
||||
author: arafatansari
|
||||
severity: medium
|
||||
severity: high
|
||||
description: |
|
||||
Kavita - Path Traversal is vulnerable to local file inclusion via abusing the Path Traversal filename parameter of the /api/image/cover-upload.
|
||||
reference:
|
||||
|
|
|
@ -3,14 +3,14 @@ id: keycloak-xss
|
|||
info:
|
||||
name: Keycloak <= 8.0 - Cross-Site Scripting
|
||||
author: incogbyte
|
||||
severity: info
|
||||
severity: medium
|
||||
description: Keycloak 8.0 and prior contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and thus steal cookie-based authentication credentials and launch other attacks.
|
||||
reference:
|
||||
- https://cure53.de/pentest-report_keycloak.pdf
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: keycloak,xss
|
||||
|
||||
requests:
|
||||
|
|
|
@ -8,9 +8,9 @@ info:
|
|||
reference:
|
||||
- https://www.exploit-db.com/exploits/26305
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: edb,xss,squirrelmail,plugin
|
||||
|
||||
requests:
|
||||
|
|
|
@ -8,9 +8,9 @@ info:
|
|||
reference:
|
||||
- https://www.exploit-db.com/exploits/34814
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: xss,squirrelmail,plugin,edb
|
||||
|
||||
requests:
|
||||
|
|
|
@ -3,13 +3,13 @@ id: ecology-arbitrary-file-upload
|
|||
info:
|
||||
name: Ecology - Arbitrary File Upload
|
||||
author: ritikchaddha
|
||||
severity: medium
|
||||
severity: critical
|
||||
description: Ecology contains an arbitrary file upload vulnerability. An attacker can upload arbitrary files to the server, which in turn can be used to make the application execute file content as code, As a result, an attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
|
||||
reference:
|
||||
- https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 8.8
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cwe-id: CWE-434
|
||||
metadata:
|
||||
fofa-query: app="泛微-协同办公OA"
|
||||
|
|
|
@ -9,9 +9,9 @@ info:
|
|||
- https://wpscan.com/vulnerability/4a310b4f-79fa-4b74-93f8-e4522921abe1
|
||||
- https://wordpress.org/plugins/404-to-301
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wpscan,wp-plugin,xss,wp,wordpress,authenticated
|
||||
|
||||
requests:
|
||||
|
|
|
@ -12,9 +12,9 @@ info:
|
|||
verified: true
|
||||
google-query: inurl:/wp-content/plugins/wp-analytify
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wp,wordpress,analytify,wpscan,wp-plugin,xss
|
||||
|
||||
requests:
|
||||
|
|
|
@ -12,9 +12,9 @@ info:
|
|||
metadata:
|
||||
verified: true
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: xss,,wp,wpscan,wordpress,wp-plugin
|
||||
|
||||
|
||||
|
|
|
@ -13,9 +13,9 @@ info:
|
|||
metadata:
|
||||
verified: true
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wordpress,wp-plugin,xss,wp,wpscan
|
||||
|
||||
requests:
|
||||
|
|
|
@ -11,9 +11,9 @@ info:
|
|||
metadata:
|
||||
verified: true
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: xss,wp,wordpress,authenticated,woocommerce,wpscan,wp-plugin
|
||||
|
||||
requests:
|
||||
|
|
|
@ -9,9 +9,9 @@ info:
|
|||
- https://wpscan.com/vulnerability/a59e7102-13d6-4f1e-b7b1-75eae307e516
|
||||
- https://wordpress.org/plugins/clearfy
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: xss,wp,wordpress,authenticated,clearfy-cache,wpscan,wp-plugin
|
||||
|
||||
requests:
|
||||
|
|
|
@ -11,9 +11,9 @@ info:
|
|||
metadata:
|
||||
verified: true
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wp-plugin,xss,wp,wordpress,authenticated,curcy,wpscan
|
||||
|
||||
requests:
|
||||
|
|
|
@ -8,9 +8,9 @@ info:
|
|||
reference:
|
||||
- https://wpscan.com/vulnerability/8354b34e-40f4-4b70-bb09-38e2cf572ce9
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: xss,wordpress,wpscan
|
||||
|
||||
requests:
|
||||
|
|
|
@ -8,9 +8,9 @@ info:
|
|||
reference:
|
||||
- https://wpscan.com/vulnerability/d13f26f0-5d91-49d7-b514-1577d4247648
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wp,wordpress,wp-plugin,xss,wpscan
|
||||
|
||||
requests:
|
||||
|
|
|
@ -11,9 +11,9 @@ info:
|
|||
metadata:
|
||||
verified: true
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: authenticated,wpscan,wp-plugin,xss,wp,wordpress
|
||||
|
||||
requests:
|
||||
|
|
|
@ -11,9 +11,9 @@ info:
|
|||
metadata:
|
||||
verified: true
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wordpress,xss,authenticated,wp-plugin,wpscan,wp
|
||||
|
||||
requests:
|
||||
|
|
|
@ -9,9 +9,9 @@ info:
|
|||
reference:
|
||||
- https://wpscan.com/vulnerability/4631519b-2060-43a0-b69b-b3d7ed94c705
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: xss,wp,wpscan,wordpress,wp-plugin,sassy
|
||||
|
||||
requests:
|
||||
|
|
|
@ -10,9 +10,9 @@ info:
|
|||
reference:
|
||||
- https://wpscan.com/vulnerability/b694b9c0-a367-468c-99c2-6ba35bcf21ea
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wordpress,xss,wp-plugin,authenticated,wpscan
|
||||
|
||||
requests:
|
||||
|
|
|
@ -11,9 +11,9 @@ info:
|
|||
metadata:
|
||||
verified: true
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: shortpixel,authenticated,wpscan,xss,wp-plugin,wp,wordpress
|
||||
|
||||
requests:
|
||||
|
|
|
@ -9,9 +9,9 @@ info:
|
|||
- https://wpscan.com/vulnerability/bc05dde0-98a2-46e3-b2c8-7bdc8c32394b
|
||||
- https://wordpress.org/plugins/woocommerce-pdf-invoices-packing-slips/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: xss,wp,wordpress,woocommerce,authenticated,wpscan,wp-plugin
|
||||
|
||||
requests:
|
||||
|
|
|
@ -8,9 +8,9 @@ info:
|
|||
reference:
|
||||
- https://twitter.com/naglinagli/status/1382082473744564226
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wordpress,wordfence,xss,bypass
|
||||
|
||||
requests:
|
||||
|
|
|
@ -6,9 +6,9 @@ info:
|
|||
severity: medium
|
||||
description: WordPress Wordfence 7.4.6 is vulnerable to cross-site scripting.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wordpress,wp-plugin,xss,wordfence
|
||||
|
||||
requests:
|
||||
|
|
|
@ -10,9 +10,9 @@ info:
|
|||
- https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html
|
||||
- https://wpscan.com/vulnerability/e4b796fa-3215-43ff-a6aa-71f6e1db25e5
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wordpress,xss,wp,wpscan
|
||||
|
||||
requests:
|
||||
|
|
|
@ -10,9 +10,9 @@ info:
|
|||
reference:
|
||||
- https://wpscan.com/vulnerability/de330a59-d64d-40be-86df-98997949e5e4
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wp-plugin,xss,wp,wordpress,authenticated,wpscan
|
||||
|
||||
requests:
|
||||
|
|
|
@ -10,9 +10,9 @@ info:
|
|||
- https://www.exploit-db.com/expl oits/38568
|
||||
- https://wpscan.com/vulnerability/c465e5c1-fe43-40e9-894a-97b8ac462381
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wp-plugin,wp,edb,wpscan,wordpress,xss
|
||||
|
||||
requests:
|
||||
|
|
|
@ -8,9 +8,9 @@ info:
|
|||
reference:
|
||||
- https://www.securify.nl/en/advisory/cross-site-scripting-in-code-snippets-wordpress-plugin/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||||
cvss-score: 7.2
|
||||
cwe-id: CWE-79
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cwe-id: CWE-80
|
||||
tags: wordpress,xss,wp-plugin,authenticated
|
||||
|
||||
requests:
|
||||
|
|
Loading…
Reference in New Issue