Merge pull request #10724 from projectdiscovery/missing-cpe-tag

Add missing cpes, vendor and product information
patch-11
Prince Chaddha 2024-09-12 12:11:52 +07:00 committed by GitHub
commit 5df3467244
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1077 changed files with 5438 additions and 1153 deletions

View File

@ -8,8 +8,12 @@ info:
jshERP that can reveal sensitive information including system credentials without credentials. jshERP that can reveal sensitive information including system credentials without credentials.
reference: reference:
- https://cn-sec.com/archives/1798444.html - https://cn-sec.com/archives/1798444.html
classification:
cpe: cpe:2.3:a:jishenghua:jsherp:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1
vendor: jishenghua
product: jsherp
shodan-query: http.favicon.hash:-1298131932 shodan-query: http.favicon.hash:-1298131932
fofa-query: jshERP-boot fofa-query: jshERP-boot
tags: cnvd,cnvd2020,jsherp,disclosure tags: cnvd,cnvd2020,jsherp,disclosure
@ -36,4 +40,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 490a00463044022001094e317be5b989e3d7461dd099453f1237356ce28affa5ee58239edd6affa502205957345e5569e5b78bc928736bd415c0445ca550661c57cd1e27f9d66d6520a3:922c64590222798bb761d5b6d8e72950 # digest: 490a00463044022001094e317be5b989e3d7461dd099453f1237356ce28affa5ee58239edd6affa502205957345e5569e5b78bc928736bd415c0445ca550661c57cd1e27f9d66d6520a3:922c64590222798bb761d5b6d8e72950

View File

@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:h:ruijie:rg-uac:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1
fofa-query: title="RG-UAC登录页面" fofa-query: title="RG-UAC登录页面"
product: rg-uac
vendor: ruijie
tags: cnvd2021,cnvd,ruijie,disclosure tags: cnvd2021,cnvd,ruijie,disclosure
http: http:

View File

@ -8,9 +8,13 @@ info:
ShopXO is an open source enterprise-level open source e-commerce system. ShopXO has an arbitrary file reading vulnerability, which can be used by attackers to obtain sensitive information. ShopXO is an open source enterprise-level open source e-commerce system. ShopXO has an arbitrary file reading vulnerability, which can be used by attackers to obtain sensitive information.
reference: reference:
- https://mp.weixin.qq.com/s/69cDWCDoVXRhehqaHPgYog - https://mp.weixin.qq.com/s/69cDWCDoVXRhehqaHPgYog
classification:
cpe: cpe:2.3:a:shopxo:shopxo:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: shopxo
product: shopxo
shodan-query: title:"ShopXO企业级B2C电商系统提供商" shodan-query: title:"ShopXO企业级B2C电商系统提供商"
fofa-query: app="ShopXO企业级B2C电商系统提供商" fofa-query: app="ShopXO企业级B2C电商系统提供商"
tags: cnvd2021,cnvd,shopxo,lfi tags: cnvd2021,cnvd,shopxo,lfi
@ -31,4 +35,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 490a0046304402206735e750a62b437583ca1e1cae33666b4c2ce3b8a8310c3d1212a98fcb018a69022066c8a339f06f76b3df20a5c624b054d356f219e1e77661921c541dc2d7ee4dc5:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402206735e750a62b437583ca1e1cae33666b4c2ce3b8a8310c3d1212a98fcb018a69022066c8a339f06f76b3df20a5c624b054d356f219e1e77661921c541dc2d7ee4dc5:922c64590222798bb761d5b6d8e72950

View File

@ -12,9 +12,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6 cvss-score: 8.6
cwe-id: CWE-22 cwe-id: CWE-22
cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 2 max-request: 2
fofa-query: app="Landray OA system" fofa-query: app="Landray OA system"
product: landray_office_automation
vendor: landray
tags: cnvd,cnvd2021,landray,lfi tags: cnvd,cnvd2021,landray,lfi
http: http:

View File

@ -9,11 +9,16 @@ info:
reference: reference:
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Cology%20LoginSSO.jsp%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CNVD-2021-33202.md - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Cology%20LoginSSO.jsp%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CNVD-2021-33202.md
- https://www.cnblogs.com/0day-li/p/14637680.html - https://www.cnblogs.com/0day-li/p/14637680.html
classification:
cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
fofa-query: app="泛微-协同办公OA" fofa-query: app="泛微-协同办公OA"
product: e-cology
vendor: weaver
tags: cnvd2021,cnvd,e-cology,sqli tags: cnvd2021,cnvd,e-cology,sqli
variables: variables:
num: "999999999" num: "999999999"

View File

@ -13,11 +13,14 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10 cvss-score: 10
cwe-id: CWE-89 cwe-id: CWE-89
cpe: cpe:2.3:a:easycorp:zentao:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: http.title:"zentao" shodan-query: http.title:"zentao"
fofa-query: "Zentao" fofa-query: "Zentao"
product: zentao
vendor: easycorp
tags: cnvd,cnvd2022,zentao,sqli tags: cnvd,cnvd2022,zentao,sqli
variables: variables:
num: "999999999" num: "999999999"

View File

@ -6,9 +6,13 @@ info:
severity: high severity: high
description: | description: |
e-office is a standard collaborative mobile office platform. Ltd. e-office has an arbitrary file reading vulnerability, which can be exploited by attackers to obtain sensitive information. e-office is a standard collaborative mobile office platform. Ltd. e-office has an arbitrary file reading vulnerability, which can be exploited by attackers to obtain sensitive information.
classification:
cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: weaver
product: e-office
fofa-query: app="泛微-协同办公OA" fofa-query: app="泛微-协同办公OA"
tags: cnvd,cnvd2022,weaver,e-office,oa,lfi tags: cnvd,cnvd2022,weaver,e-office,oa,lfi

View File

@ -9,9 +9,13 @@ info:
reference: reference:
- https://github.com/wy876/POC/blob/main/AJ-Report%E5%BC%80%E6%BA%90%E6%95%B0%E6%8D%AE%E5%A4%A7%E5%B1%8F%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md - https://github.com/wy876/POC/blob/main/AJ-Report%E5%BC%80%E6%BA%90%E6%95%B0%E6%8D%AE%E5%A4%A7%E5%B1%8F%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
- https://github.com/vulhub/vulhub/blob/master/aj-report/CNVD-2024-15077/README.md - https://github.com/vulhub/vulhub/blob/master/aj-report/CNVD-2024-15077/README.md
classification:
cpe: cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: anji-plus
product: aj-report
fofa-query: title="AJ-Report" fofa-query: title="AJ-Report"
tags: cnvd,cnvd2024,aj-report,rce tags: cnvd,cnvd2024,aj-report,rce
@ -42,4 +46,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 4a0a00473045022100a0ad6d10ef5ed64fff1a44a4efb42b8c18de347907d77e68fec2a9f796030e8c022003c9c9bcfc6d56d3a3c7988f48874841753487e2ce57d91740ffbe99e3627448:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100a0ad6d10ef5ed64fff1a44a4efb42b8c18de347907d77e68fec2a9f796030e8c022003c9c9bcfc6d56d3a3c7988f48874841753487e2ce57d91740ffbe99e3627448:922c64590222798bb761d5b6d8e72950

View File

@ -7,10 +7,14 @@ info:
description: Checks for a valid login on self hosted Grafana instance. description: Checks for a valid login on self hosted Grafana instance.
reference: reference:
- https://owasp.org/www-community/attacks/Credential_stuffing - https://owasp.org/www-community/attacks/Credential_stuffing
classification:
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1
shodan-query: title:"Grafana" shodan-query: title:"Grafana"
fofa-query: title="Grafana" fofa-query: title="Grafana"
product: grafana
vendor: grafana
tags: self-hosted,creds-stuffing,login-check,grafana tags: self-hosted,creds-stuffing,login-check,grafana
variables: variables:
username: "{{username}}" username: "{{username}}"

View File

@ -16,10 +16,13 @@ info:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27748 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27748
classification: classification:
cve-id: CVE-2021-27748 cve-id: CVE-2021-27748
cpe: cpe:2.3:a:ibm:websphere:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 3 max-request: 3
shodan-query: http.html:"IBM WebSphere Portal" shodan-query: http.html:"IBM WebSphere Portal"
product: websphere
vendor: ibm
tags: cve2021,cve,hcl,ibm,ssrf,websphere tags: cve2021,cve,hcl,ibm,ssrf,websphere
flow: http(1) && http(2) flow: http(1) && http(2)

View File

@ -19,10 +19,13 @@ info:
cve-id: CVE-2022-29299 cve-id: CVE-2022-29299
epss-score: 0.00175 epss-score: 0.00175
epss-percentile: 0.5456 epss-percentile: 0.5456
cpe: cpe:2.3:o:contec:solarview_compact_firmware:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: http.favicon.hash:-244067125 shodan-query: http.favicon.hash:-244067125
product: solarview_compact_firmware
vendor: contec
tags: cve2022,cve,xss,solarview,edb tags: cve2022,cve,xss,solarview,edb
http: http:

View File

@ -16,10 +16,13 @@ info:
classification: classification:
cve-id: CVE-2023-1434 cve-id: CVE-2023-1434
cwe-id: CWE-79 cwe-id: CWE-79
cpe: cpe:2.3:a:odoo:odoo:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: title:"Odoo" shodan-query: title:"Odoo"
product: odoo
vendor: odoo
tags: cve2023,cve,odoo,xss tags: cve2023,cve,odoo,xss
http: http:

View File

@ -21,10 +21,13 @@ info:
cvss-score: 6.1 cvss-score: 6.1
cve-id: CVE-2023-24367 cve-id: CVE-2023-24367
cwe-id: CWE-79 cwe-id: CWE-79
cpe: cpe:2.3:a:temenos:t24:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: title:"T24 Sign in" shodan-query: title:"T24 Sign in"
product: t24
vendor: temenos
tags: cve,cve2023,xss,temenos tags: cve,cve2023,xss,temenos
http: http:

View File

@ -16,10 +16,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss-score: 7.3 cvss-score: 7.3
cve-id: CVE-2023-32117 cve-id: CVE-2023-32117
cpe: cpe:2.3:a:softlabbd:integrate_google_drive:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
publicwww-query: "/wp-content/plugins/integrate-google-drive/" publicwww-query: "/wp-content/plugins/integrate-google-drive/"
product: integrate_google_drive
vendor: softlabbd
tags: cve,cve2023,wordpress,wpscan,wp-plugin,wp,integrate-google-drive tags: cve,cve2023,wordpress,wpscan,wp-plugin,wp,integrate-google-drive
http: http:

View File

@ -17,10 +17,13 @@ info:
cwe-id: CWE-601 cwe-id: CWE-601
epss-score: 0.00076 epss-score: 0.00076
epss-percentile: 0.32361 epss-percentile: 0.32361
cpe: cpe:2.3:a:uncannyowl:uncanny_toolkit_for_learndash:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
publicwww-query: "/wp-content/plugins/uncanny-learndash-toolkit/" publicwww-query: "/wp-content/plugins/uncanny-learndash-toolkit/"
product: uncanny_toolkit_for_learndash
vendor: uncannyowl
tags: cve2023,cve,wordpress,uncanny-learndash-toolkit,wpscan,redirect tags: cve2023,cve,wordpress,uncanny-learndash-toolkit,wpscan,redirect
http: http:

View File

@ -10,9 +10,13 @@ info:
reference: reference:
- https://blog.qualys.com/product-tech/2023/12/08/opencms-unauthenticated-xxe-vulnerability-cve-2023-42344 - https://blog.qualys.com/product-tech/2023/12/08/opencms-unauthenticated-xxe-vulnerability-cve-2023-42344
- https://labs.watchtowr.com/xxe-you-can-depend-on-me-opencms/ - https://labs.watchtowr.com/xxe-you-can-depend-on-me-opencms/
classification:
cpe: cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
vendor: alkacon
product: opencms
fofa-query: "OpenCms-9.5.3" fofa-query: "OpenCms-9.5.3"
tags: cve,cve2023,xxe,opencms tags: cve,cve2023,xxe,opencms
@ -21,13 +25,15 @@ http:
path: path:
- "{{BaseURL}}/opencms/cmisatom/cmis-online/query" - "{{BaseURL}}/opencms/cmisatom/cmis-online/query"
- "{{BaseURL}}/cmisatom/cmis-online/query" - "{{BaseURL}}/cmisatom/cmis-online/query"
headers: headers:
Content-Type: "application/xml;charset=UTF-8" Content-Type: "application/xml;charset=UTF-8"
Referer: "{{RootURL}}" Referer: "{{RootURL}}"
body: | body: |
<?xml version='1.0' encoding='UTF-8'?><!DOCTYPE root [<!ENTITY test SYSTEM 'file:///etc/passwd'>]><cmis:query xmlns:cmis="<http://docs.oasis-open.org/ns/cmis/core/200908/>"><cmis:statement>&test;</cmis:statement><cmis:searchAllVersions>false</cmis:searchAllVersions><cmis:includeAllowableActions>false</cmis:includeAllowableActions><cmis:includeRelationships>none</cmis:includeRelationships><cmis:renditionFilter>cmis:none</cmis:renditionFilter><cmis:maxItems>100</cmis:maxItems><cmis:skipCount>0</cmis:skipCount></cmis:query> <?xml version='1.0' encoding='UTF-8'?><!DOCTYPE root [<!ENTITY test SYSTEM 'file:///etc/passwd'>]><cmis:query xmlns:cmis="<http://docs.oasis-open.org/ns/cmis/core/200908/>"><cmis:statement>&test;</cmis:statement><cmis:searchAllVersions>false</cmis:searchAllVersions><cmis:includeAllowableActions>false</cmis:includeAllowableActions><cmis:includeRelationships>none</cmis:includeRelationships><cmis:renditionFilter>cmis:none</cmis:renditionFilter><cmis:maxItems>100</cmis:maxItems><cmis:skipCount>0</cmis:skipCount></cmis:query>
stop-at-first-match: true stop-at-first-match: true
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
@ -36,4 +42,5 @@ http:
- "root:.*:0:0:" - "root:.*:0:0:"
- "invalidArgument" - "invalidArgument"
condition: and condition: and
# digest: 4b0a00483046022100f7dbfd49302b6ff73e5301cdb82e1fea60540cdbacb1e9a04069885d75bbc145022100c7ec2bc827d6116bdc018f12ea636664f6d8688600854967a7d4cc2734c100d4:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100f7dbfd49302b6ff73e5301cdb82e1fea60540cdbacb1e9a04069885d75bbc145022100c7ec2bc827d6116bdc018f12ea636664f6d8688600854967a7d4cc2734c100d4:922c64590222798bb761d5b6d8e72950

View File

@ -21,10 +21,13 @@ info:
cvss-score: 7.1 cvss-score: 7.1
cve-id: CVE-2023-47115 cve-id: CVE-2023-47115
cwe-id: CWE-79 cwe-id: CWE-79
cpe: cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 6 max-request: 6
shodan-query: http.favicon.hash:-1649949475 shodan-query: http.favicon.hash:-1649949475
product: label_studio
vendor: humansignal
tags: cve,cve2023,xss,authenticated,intrusive,label-studio tags: cve,cve2023,xss,authenticated,intrusive,label-studio
http: http:

View File

@ -19,10 +19,13 @@ info:
cwe-id: CWE-77 cwe-id: CWE-77
epss-score: 0.00305 epss-score: 0.00305
epss-percentile: 0.69699 epss-percentile: 0.69699
cpe: cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
shodan-query: ssl.cert.issuer.cn:"QNAP NAS",title:"QNAP Turbo NAS" shodan-query: ssl.cert.issuer.cn:"QNAP NAS",title:"QNAP Turbo NAS"
product: qts
vendor: qnap
tags: cve,cve2023,qnap,qts,quts,rce,intrusive tags: cve,cve2023,qnap,qts,quts,rce,intrusive
variables: variables:
file: '{{rand_base(6)}}' file: '{{rand_base(6)}}'

View File

@ -17,11 +17,14 @@ info:
cwe-id: CWE-434 cwe-id: CWE-434
epss-score: 0.00054 epss-score: 0.00054
epss-percentile: 0.21518 epss-percentile: 0.21518
cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 4 max-request: 4
framework: wordpress framework: wordpress
publicwww-query: "/wp-content/plugins/elementor/" publicwww-query: "/wp-content/plugins/elementor/"
product: website_builder
vendor: elementor
tags: cve,cve2023,elementor,file-upload,intrusive,rce,wpscan,wordpress,wp-plugin,authenticated tags: cve,cve2023,elementor,file-upload,intrusive,rce,wpscan,wordpress,wp-plugin,authenticated
variables: variables:
filename: "{{rand_base(6)}}" filename: "{{rand_base(6)}}"

View File

@ -20,6 +20,7 @@ info:
cwe-id: CWE-89 cwe-id: CWE-89
epss-score: 0.00063 epss-score: 0.00063
epss-percentile: 0.26569 epss-percentile: 0.26569
cpe: cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
@ -27,6 +28,8 @@ info:
fofa-query: body="/wp-content/plugins/ultimate-member" fofa-query: body="/wp-content/plugins/ultimate-member"
publicwww-query: "/wp-content/plugins/ultimate-member/" publicwww-query: "/wp-content/plugins/ultimate-member/"
zoomeye-query: app:"WordPress Ultimate Member Plugin" zoomeye-query: app:"WordPress Ultimate Member Plugin"
product: ultimate_member
vendor: ultimatemember
tags: cve,cve2024,ultimate-member,wpscan,wordpress,wp-plugin,sqli tags: cve,cve2024,ultimate-member,wpscan,wordpress,wp-plugin,sqli
http: http:

View File

@ -16,10 +16,13 @@ info:
cwe-id: CWE-601 cwe-id: CWE-601
epss-score: 0.00076 epss-score: 0.00076
epss-percentile: 0.32361 epss-percentile: 0.32361
cpe: cpe:2.3:a:gradio_project:gradio:*:*:*:*:python:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: html:"__gradio_mode__" shodan-query: html:"__gradio_mode__"
product: gradio
vendor: gradio_project
tags: cve,cve2024,ssrf,oast,gradio tags: cve,cve2024,ssrf,oast,gradio
http: http:

View File

@ -17,10 +17,13 @@ info:
cve-id: CVE-2024-1380 cve-id: CVE-2024-1380
epss-score: 0.00043 epss-score: 0.00043
epss-percentile: 0.0866 epss-percentile: 0.0866
cpe: cpe:2.3:a:relevanssi:relevanssi:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
fofa-query: "/wp-content/plugins/relevanssi/" fofa-query: "/wp-content/plugins/relevanssi/"
product: relevanssi
vendor: relevanssi
tags: cve,cve2024,wp,wordpress,wp-plugin,relevanssi,exposure tags: cve,cve2024,wp,wordpress,wp-plugin,relevanssi,exposure
http: http:

View File

@ -24,10 +24,13 @@ info:
cwe-id: CWE-29 cwe-id: CWE-29
epss-score: 0.00087 epss-score: 0.00087
epss-percentile: 0.36659 epss-percentile: 0.36659
cpe: cpe:2.3:a:gradio_project:gradio:*:*:*:*:python:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
shodan-query: html:"__gradio_mode__" shodan-query: html:"__gradio_mode__"
product: gradio
vendor: gradio_project
tags: cve,cve2024,intrusive,unauth,gradio,lfi,lfr tags: cve,cve2024,intrusive,unauth,gradio,lfi,lfr
http: http:

View File

@ -18,10 +18,13 @@ info:
cve-id: CVE-2024-1698 cve-id: CVE-2024-1698
epss-score: 0.00045 epss-score: 0.00045
epss-percentile: 0.12615 epss-percentile: 0.12615
cpe: cpe:2.3:a:wpdeveloper:notificationx:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
fofa-query: body="/wp-content/plugins/notificationx" fofa-query: body="/wp-content/plugins/notificationx"
product: notificationx
vendor: wpdeveloper
tags: cve,cve2024,wpscan,wordpress,wp-plugin,notificationx,sqli tags: cve,cve2024,wpscan,wordpress,wp-plugin,notificationx,sqli
http: http:

View File

@ -19,10 +19,13 @@ info:
cwe-id: CWE-284 cwe-id: CWE-284
epss-score: 0.08221 epss-score: 0.08221
epss-percentile: 0.94345 epss-percentile: 0.94345
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
shodan-query: http.component:"Adobe ColdFusion" shodan-query: http.component:"Adobe ColdFusion"
product: coldfusion
vendor: adobe
tags: cve,cve2024,adobe,coldfusion,lfr tags: cve,cve2024,adobe,coldfusion,lfr
http: http:

View File

@ -19,10 +19,13 @@ info:
cwe-id: CWE-78 cwe-id: CWE-78
epss-score: 0.00043 epss-score: 0.00043
epss-percentile: 0.0866 epss-percentile: 0.0866
cpe: cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 3 max-request: 3
fofa-query: "app=\"ATLASSIAN-Confluence\"" fofa-query: "app=\"ATLASSIAN-Confluence\""
product: confluence_data_center
vendor: atlassian
tags: cve,cve2024,atlassian,confluence,rce,authenticated,intrusive tags: cve,cve2024,atlassian,confluence,rce,authenticated,intrusive
variables: variables:
username: "{{username}}" username: "{{username}}"

View File

@ -16,12 +16,14 @@ info:
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2024-23163 cve-id: CVE-2024-23163
cwe-id: CWE-287 cwe-id: CWE-287
cpe: cpe:2.3:a:gestsup:gestsup:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: gestsup vendor: gestsup
fofa-query: title="GestSup" fofa-query: title="GestSup"
shodan-query: http.favicon.hash:-283003760 shodan-query: http.favicon.hash:-283003760
product: gestsup
tags: cve,cve2024,account-takeover,gestsup tags: cve,cve2024,account-takeover,gestsup
variables: variables:

View File

@ -17,10 +17,13 @@ info:
cwe-id: CWE-27 cwe-id: CWE-27
epss-score: 0.00043 epss-score: 0.00043
epss-percentile: 0.09551 epss-percentile: 0.09551
cpe: cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: html:"Traccar" shodan-query: html:"Traccar"
product: traccar
vendor: traccar
tags: cve,cve2024,traccar,rce,intrusive,file-upload tags: cve,cve2024,traccar,rce,intrusive,file-upload
variables: variables:

View File

@ -13,10 +13,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss-score: 7.3 cvss-score: 7.3
cwe-id: CWE-23 cwe-id: CWE-23
cpe: cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 3 max-request: 3
shodan-query: http.component:"TeamCity" shodan-query: http.component:"TeamCity"
product: teamcity
vendor: jetbrains
tags: cve,cve2024,teamcity,jetbrains,auth-bypass tags: cve,cve2024,teamcity,jetbrains,auth-bypass
http: http:

View File

@ -9,9 +9,13 @@ info:
reference: reference:
- https://github.com/dirk1983/chatgpt/issues/114 - https://github.com/dirk1983/chatgpt/issues/114
- https://nvd.nist.gov/vuln/detail/CVE-2024-27564 - https://nvd.nist.gov/vuln/detail/CVE-2024-27564
classification:
cpe: cpe:2.3:a:chanzhaoyu:chatgpt_web:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
vendor: chanzhaoyu
product: chatgpt_web
fofa-query: "title=\"ChatGPT个人专用版\"" fofa-query: "title=\"ChatGPT个人专用版\""
tags: cve,cve2024,chatgpt,ssrf,oast,oos,lfi tags: cve,cve2024,chatgpt,ssrf,oast,oos,lfi
@ -38,4 +42,5 @@ http:
- contains(header, "image/jpeg") - contains(header, "image/jpeg")
- status_code == 200 - status_code == 200
condition: and condition: and
# digest: 490a0046304402205ae8c7b8e367577b1052683aa4b48d038bc2308c7299d24c0f6530b33b0ac9af022058dcc4c45ed777943b6e87ac9605afbd095f2bad41f6963d208ad6f85e702375:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402205ae8c7b8e367577b1052683aa4b48d038bc2308c7299d24c0f6530b33b0ac9af022058dcc4c45ed777943b6e87ac9605afbd095f2bad41f6963d208ad6f85e702375:922c64590222798bb761d5b6d8e72950

View File

@ -18,9 +18,12 @@ info:
cve-id: CVE-2024-29269 cve-id: CVE-2024-29269
epss-score: 0.00054 epss-score: 0.00054
epss-percentile: 0.21518 epss-percentile: 0.21518
cpe: cpe:2.3:h:telesquare:tlr-2005ksh:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1
shodan-query: title:"Login to TLR-2005KSH" shodan-query: title:"Login to TLR-2005KSH"
product: tlr-2005ksh
vendor: telesquare
tags: cve,cve2024,telesquare,tlr,rce tags: cve,cve2024,telesquare,tlr,rce
http: http:

View File

@ -18,10 +18,13 @@ info:
classification: classification:
cve-id: CVE-2024-29868 cve-id: CVE-2024-29868
cwe-id: CWE-338 cwe-id: CWE-338
cpe: cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 2 max-request: 2
shodan-query: http.title:"apache streampipes" shodan-query: http.title:"apache streampipes"
fofa-query: title="apache streampipes" fofa-query: title="apache streampipes"
product: streampipes
vendor: apache
tags: cve,cve2024,apache,streampipes,account-takeover tags: cve,cve2024,apache,streampipes,account-takeover
flow: http(1) && http(2) flow: http(1) && http(2)

View File

@ -21,10 +21,13 @@ info:
cve-id: CVE-2024-3136 cve-id: CVE-2024-3136
epss-score: 0.00065 epss-score: 0.00065
epss-percentile: 0.28259 epss-percentile: 0.28259
cpe: cpe:2.3:a:stylemixthemes:masterstudy_lms:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
publicwww-query: "/wp-content/plugins/masterstudy-lms-learning-management-system" publicwww-query: "/wp-content/plugins/masterstudy-lms-learning-management-system"
product: masterstudy_lms
vendor: stylemixthemes
tags: cve,cve2024,wp,wordpress,unauth,lfi tags: cve,cve2024,wp,wordpress,unauth,lfi
variables: variables:
randomstr: "{{randstr_1}}" randomstr: "{{randstr_1}}"

View File

@ -17,10 +17,13 @@ info:
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00053 epss-score: 0.00053
epss-percentile: 0.21091 epss-percentile: 0.21091
cpe: cpe:2.3:a:cdata:arc:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
shodan-query: "title:\"CData Arc\"" shodan-query: "title:\"CData Arc\""
product: arc
vendor: cdata
tags: cve,cve2024,cdata,lfi tags: cve,cve2024,cdata,lfi
flow: http(1) && http(2) flow: http(1) && http(2)

View File

@ -19,10 +19,13 @@ info:
cve-id: CVE-2024-32113 cve-id: CVE-2024-32113
epss-score: 0.00115 epss-score: 0.00115
epss-percentile: 0.45112 epss-percentile: 0.45112
cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
fofa-query: app="Apache_OFBiz" fofa-query: app="Apache_OFBiz"
product: ofbiz
vendor: apache
tags: cve,cve2024,apache,obiz,rce tags: cve,cve2024,apache,obiz,rce
http: http:

View File

@ -15,10 +15,13 @@ info:
classification: classification:
epss-score: 0.00053 epss-score: 0.00053
epss-percentile: 0.21091 epss-percentile: 0.21091
cpe: cpe:2.3:a:raidenmaild:raidenmaild:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: html:"RaidenMAILD" shodan-query: html:"RaidenMAILD"
product: raidenmaild
vendor: raidenmaild
tags: cve,cve2024,lfi,raiden,mail,server tags: cve,cve2024,lfi,raiden,mail,server
http: http:

View File

@ -18,10 +18,13 @@ info:
cwe-id: CWE-89 cwe-id: CWE-89
epss-score: 0.00043 epss-score: 0.00043
epss-percentile: 0.0866 epss-percentile: 0.0866
cpe: cpe:2.3:a:plechevandrey:wp-recall:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
publicwww-query: "/wp-content/plugins/wp-recall/" publicwww-query: "/wp-content/plugins/wp-recall/"
product: wp-recall
vendor: plechevandrey
tags: cve,cve2024,wp-plugin,wp-recall,wordpress,wp,sqli tags: cve,cve2024,wp-plugin,wp-recall,wordpress,wp,sqli
variables: variables:

View File

@ -17,10 +17,13 @@ info:
cwe-id: CWE-200 cwe-id: CWE-200
epss-score: 0.00045 epss-score: 0.00045
epss-percentile: 0.15047 epss-percentile: 0.15047
cpe: cpe:2.3:h:dlink:dns-320l:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
fofa-query: body="Text:In order to access the ShareCenter" fofa-query: body="Text:In order to access the ShareCenter"
product: dns-320l
vendor: dlink
tags: cve,cve2024,dlink,exposure tags: cve,cve2024,dlink,exposure
http: http:

View File

@ -12,10 +12,13 @@ info:
classification: classification:
epss-score: 0.00043 epss-score: 0.00043
epss-percentile: 0.0866 epss-percentile: 0.0866
cpe: cpe:2.3:h:dlink:dir-845l:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: "DIR-845L" shodan-query: "DIR-845L"
product: dir-845l
vendor: dlink
tags: cve,cve2024,dlink,info-leak tags: cve,cve2024,dlink,info-leak
http: http:

View File

@ -9,9 +9,13 @@ info:
reference: reference:
- https://en.0day.today/exploit/39610 - https://en.0day.today/exploit/39610
- https://www.sourcecodester.com/sql/17287/prison-management-system.html - https://www.sourcecodester.com/sql/17287/prison-management-system.html
classification:
cpe: cpe:2.3:a:prison_management_system_project:prison_management_system:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
vendor: prison_management_system_project
product: prison_management_system
shodan-query: title:"Prison Management System" shodan-query: title:"Prison Management System"
tags: cve,cve2024,cms,sqli tags: cve,cve2024,cms,sqli
@ -23,7 +27,6 @@ http:
Content-Type: application/x-www-form-urlencoded Content-Type: application/x-www-form-urlencoded
txtusername=admin%27+or+%271%27+%3D%271&txtpassword={{randstr}}&btnlogin= txtusername=admin%27+or+%271%27+%3D%271&txtpassword={{randstr}}&btnlogin=
- | - |
GET /Admin/index.php HTTP/1.1 GET /Admin/index.php HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
@ -40,4 +43,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 4b0a00483046022100859ec311a5b87c8613179df918539075c5fd10a9d17a0273f0970d74ab5ea0e90221008c39c278e0ce4d1b08af7daa3356e7901998adf7c17a2919323d4a935efff082:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100859ec311a5b87c8613179df918539075c5fd10a9d17a0273f0970d74ab5ea0e90221008c39c278e0ce4d1b08af7daa3356e7901998adf7c17a2919323d4a935efff082:922c64590222798bb761d5b6d8e72950

View File

@ -17,10 +17,13 @@ info:
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2024-33605 cve-id: CVE-2024-33605
cwe-id: CWE-22 cwe-id: CWE-22
cpe: cpe:2.3:o:sharp:mx-3550v_firmware:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: "Set-Cookie: MFPSESSIONID=" shodan-query: "Set-Cookie: MFPSESSIONID="
product: mx-3550v_firmware
vendor: sharp
tags: cve,cve2024,sharp,printer,traversal tags: cve,cve2024,sharp,printer,traversal
http: http:

View File

@ -14,10 +14,13 @@ info:
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2024-34102 cve-id: CVE-2024-34102
cwe-id: CWE-611 cwe-id: CWE-611
cpe: cpe:2.3:a:adobe:magento:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
fofa-query: app="Adobe-Magento" fofa-query: app="Adobe-Magento"
product: magento
vendor: adobe
tags: cve,cve2024,adobe,magento,xxe tags: cve,cve2024,adobe,magento,xxe
http: http:

View File

@ -10,14 +10,16 @@ info:
- https://github.com/n2ryx/CVE/blob/main/Lylme_pagev1.9.5.md - https://github.com/n2ryx/CVE/blob/main/Lylme_pagev1.9.5.md
- https://github.com/tanjiti/sec_profile - https://github.com/tanjiti/sec_profile
- https://github.com/ATonysan/poc-exp/blob/main/60NavigationPage_CVE-2024-34982_ArbitraryFileUploads.py - https://github.com/ATonysan/poc-exp/blob/main/60NavigationPage_CVE-2024-34982_ArbitraryFileUploads.py
classification:
cpe: cpe:2.3:a:lylme:lylme_spage:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: lylme
product: lylme_spage
fofa-query: icon_hash="-282504889" fofa-query: icon_hash="-282504889"
tags: cve,cve2024,lylme-spage,rce,intrusive tags: cve,cve2024,lylme-spage,rce,intrusive
flow: http(1) && http(2) flow: http(1) && http(2)
variables: variables:
string: "{{randstr}}" string: "{{randstr}}"
filename: "{{to_lower(rand_text_alpha(5))}}" filename: "{{to_lower(rand_text_alpha(5))}}"
@ -69,4 +71,5 @@ http:
- 'contains(body, "{{string}}" )' - 'contains(body, "{{string}}" )'
- 'contains(header, "text/html")' - 'contains(header, "text/html")'
condition: and condition: and
# digest: 4a0a004730450220440784f1e1d309bfb1eee99fbcaf02afe7bfa185b48f07233df0f14cac9e9d9b0221009072b53098bb58d0d3efd14db1a3fc5f7b0b4593a0426fa060db0c42edd6f029:922c64590222798bb761d5b6d8e72950 # digest: 4a0a004730450220440784f1e1d309bfb1eee99fbcaf02afe7bfa185b48f07233df0f14cac9e9d9b0221009072b53098bb58d0d3efd14db1a3fc5f7b0b4593a0426fa060db0c42edd6f029:922c64590222798bb761d5b6d8e72950

View File

@ -10,16 +10,18 @@ info:
reference: reference:
- https://vulners.com/wpvulndb/CVE-2024-3552 - https://vulners.com/wpvulndb/CVE-2024-3552
- https://wpscan.com/vulnerability/34b03ee4-de81-4fec-9f3d-e1bd5b94d136/ - https://wpscan.com/vulnerability/34b03ee4-de81-4fec-9f3d-e1bd5b94d136/
classification:
cpe: cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: salephpscripts
product: web_directory_free
publicwww-query: "/wp-content/plugins/web-directory-free" publicwww-query: "/wp-content/plugins/web-directory-free"
tags: cve,cve2024,wordpress,wp-plugin,wpscan,wp,web-directory-free tags: cve,cve2024,wordpress,wp-plugin,wpscan,wp,web-directory-free
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:
- raw: - raw:
- | - |
GET / HTTP/1.1 GET / HTTP/1.1
@ -47,4 +49,5 @@ http:
- 'status_code == 200' - 'status_code == 200'
- regex('^\[\]$', body) - regex('^\[\]$', body)
condition: and condition: and
# digest: 4a0a0047304502205f1531596b6325ac2d986cd6245136e53aa97e8a3978b6a394bffeb78042691602210093b20af969ed64d70d37d6bcea2a4ea4e185ec3d9814c49ec0e4ed34262d6ba6:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502205f1531596b6325ac2d986cd6245136e53aa97e8a3978b6a394bffeb78042691602210093b20af969ed64d70d37d6bcea2a4ea4e185ec3d9814c49ec0e4ed34262d6ba6:922c64590222798bb761d5b6d8e72950

View File

@ -19,10 +19,13 @@ info:
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00045 epss-score: 0.00045
epss-percentile: 0.16306 epss-percentile: 0.16306
cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
fofa-query: app="Apache_OFBiz" fofa-query: app="Apache_OFBiz"
product: ofbiz
vendor: apache
tags: cve,cve2024,apache,obiz,lfi tags: cve,cve2024,apache,obiz,lfi
http: http:

View File

@ -9,12 +9,15 @@ info:
reference: reference:
- https://github.com/phtcloud-dev/CVE-2024-36837 - https://github.com/phtcloud-dev/CVE-2024-36837
- https://nvd.nist.gov/vuln/detail/CVE-2024-36837 - https://nvd.nist.gov/vuln/detail/CVE-2024-36837
classification:
cpe: cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: crmeb
product: crmeb
fofa-query: title="CRMEB" fofa-query: title="CRMEB"
tags: cve,cve2024,crmeb,sqli tags: cve,cve2024,crmeb,sqli
variables: variables:
num: "{{rand_int(9000000, 9999999)}}" num: "{{rand_int(9000000, 9999999)}}"
@ -40,4 +43,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 490a0046304402203044d17d81b224dafab0f052edc09852ae126401a2350dcbed817e3a8d32b6840220266a399dff53e7dd81a0eeea14d4f29ab5039fee825cd84700698d76b30c8e7f:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402203044d17d81b224dafab0f052edc09852ae126401a2350dcbed817e3a8d32b6840220266a399dff53e7dd81a0eeea14d4f29ab5039fee825cd84700698d76b30c8e7f:922c64590222798bb761d5b6d8e72950

View File

@ -10,9 +10,13 @@ info:
- https://www.wiz.io/blog/probllama-ollama-vulnerability-cve-2024-37032 - https://www.wiz.io/blog/probllama-ollama-vulnerability-cve-2024-37032
- https://nvd.nist.gov/vuln/detail/CVE-2024-37032 - https://nvd.nist.gov/vuln/detail/CVE-2024-37032
- https://github.com/Bi0x/CVE-2024-37032 - https://github.com/Bi0x/CVE-2024-37032
classification:
cpe: cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: ollama
product: ollama
shodan-query: ollama shodan-query: ollama
tags: cve,cve2024,ollama,rce tags: cve,cve2024,ollama,rce
@ -24,7 +28,6 @@ http:
Content-Type: application/json Content-Type: application/json
{"name": "http://{{interactsh-url}}/rogue/{{randstr}}", "insecure": true} {"name": "http://{{interactsh-url}}/rogue/{{randstr}}", "insecure": true}
- | - |
POST /api/push HTTP/1.1 POST /api/push HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
@ -38,4 +41,5 @@ http:
- contains(interactsh_protocol, 'http') - contains(interactsh_protocol, 'http')
- contains_all(header, 'application/x-ndjson') && contains(body_2, 'retrieving manifest') - contains_all(header, 'application/x-ndjson') && contains(body_2, 'retrieving manifest')
condition: and condition: and
# digest: 4a0a00473045022100a5fa33a756b90484a6e38030d236f0441e68f5e0568a583ecbce5ccc179ec12e022067ed5562eb8a263a887821208641b1c7337d73b10359302495c184e4d1145db2:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100a5fa33a756b90484a6e38030d236f0441e68f5e0568a583ecbce5ccc179ec12e022067ed5562eb8a263a887821208641b1c7337d73b10359302495c184e4d1145db2:922c64590222798bb761d5b6d8e72950

View File

@ -9,9 +9,13 @@ info:
reference: reference:
- https://github.com/argoproj/argo-cd/security/advisories/GHSA-87p9-x75h-p4j2 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-87p9-x75h-p4j2
- https://nvd.nist.gov/vuln/detail/CVE-2024-37152 - https://nvd.nist.gov/vuln/detail/CVE-2024-37152
classification:
cpe: cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: argoproj
product: argo_cd
shodan-query: html:"Argo CD" shodan-query: html:"Argo CD"
tags: cve,cve2024,argo-cd,info-leak tags: cve,cve2024,argo-cd,info-leak
@ -38,4 +42,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 4b0a00483046022100ff51e4d4de0176d7b75272c7382661952fa7f28124b1a6113d2d52675ba7d7ca022100dc729bfc997db746bf206fe0a1ae9ef36b3af92ebad27d690c90a41b636944aa:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100ff51e4d4de0176d7b75272c7382661952fa7f28124b1a6113d2d52675ba7d7ca022100dc729bfc997db746bf206fe0a1ae9ef36b3af92ebad27d690c90a41b636944aa:922c64590222798bb761d5b6d8e72950

View File

@ -12,10 +12,13 @@ info:
classification: classification:
epss-score: 0.00043 epss-score: 0.00043
epss-percentile: 0.09357 epss-percentile: 0.09357
cpe: cpe:2.3:a:rhubcom:turbomeeting:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
shodan-query: html:"TurboMeeting" shodan-query: html:"TurboMeeting"
product: turbomeeting
vendor: rhubcom
tags: cve,cve2024,rce,turbomeeting,authenticated tags: cve,cve2024,rce,turbomeeting,authenticated
variables: variables:

View File

@ -8,9 +8,13 @@ info:
A Boolean-based SQL injection vulnerability in the "RHUB TurboMeeting" web application. This vulnerability could allow an attacker to execute arbitrary SQL commands on the database server, potentially allowing them to access sensitive data or compromise the server. A Boolean-based SQL injection vulnerability in the "RHUB TurboMeeting" web application. This vulnerability could allow an attacker to execute arbitrary SQL commands on the database server, potentially allowing them to access sensitive data or compromise the server.
reference: reference:
- https://github.com/google/security-research/security/advisories/GHSA-vx5j-8pgx-v42v - https://github.com/google/security-research/security/advisories/GHSA-vx5j-8pgx-v42v
classification:
cpe: cpe:2.3:a:rhubcom:turbomeeting:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
vendor: rhubcom
product: turbomeeting
shodan-query: html:"TurboMeeting" shodan-query: html:"TurboMeeting"
tags: cve,cve2024,sqli,turbomeeting tags: cve,cve2024,sqli,turbomeeting
@ -22,7 +26,6 @@ http:
Content-Type: application/x-www-form-urlencoded Content-Type: application/x-www-form-urlencoded
meeting_id=1'/**/OR/**/1=1/**/UNION/**/select/**/password/**/from/**/employee/**/where/**/email='admin'/**/AND/**/substr(password,2,1)='b'/** meeting_id=1'/**/OR/**/1=1/**/UNION/**/select/**/password/**/from/**/employee/**/where/**/email='admin'/**/AND/**/substr(password,2,1)='b'/**
- | - |
POST /as/wapi/vmp HTTP/1.1 POST /as/wapi/vmp HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
@ -41,4 +44,5 @@ http:
part: body_2 part: body_2
words: words:
- '<__Status__>FAILED</__Status__>' - '<__Status__>FAILED</__Status__>'
# digest: 490a0046304402200529dc5c8778e012e9cbb7ffa30d733dc1c0587b432825bef1f5231c3e8986c30220102ab38598176c7395f39eb02a1ab74dc442f237b847feb8dc497b297446afa6:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402200529dc5c8778e012e9cbb7ffa30d733dc1c0587b432825bef1f5231c3e8986c30220102ab38598176c7395f39eb02a1ab74dc442f237b847feb8dc497b297446afa6:922c64590222798bb761d5b6d8e72950

View File

@ -15,10 +15,13 @@ info:
classification: classification:
epss-score: 0.00045 epss-score: 0.00045
epss-percentile: 0.16306 epss-percentile: 0.16306
cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
fofa-query: app="Apache_OFBiz" fofa-query: app="Apache_OFBiz"
product: ofbiz
vendor: apache
tags: cve,cve2024,ofbiz,apache,rce,kev tags: cve,cve2024,ofbiz,apache,rce,kev
http: http:

View File

@ -13,12 +13,15 @@ info:
reference: reference:
- https://dokan.co/docs/wordpress/changelog/ - https://dokan.co/docs/wordpress/changelog/
- https://nvd.nist.gov/vuln/detail/CVE-2024-3922 - https://nvd.nist.gov/vuln/detail/CVE-2024-3922
classification:
cpe: cpe:2.3:a:wedevs:dokan:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
vendor: wedevs
product: dokan
publicwww-query: "/wp-content/plugins/dokan-pro/" publicwww-query: "/wp-content/plugins/dokan-pro/"
tags: cve,cve2024,dokan,wp-plugin,wordpress,wp,dokan-pro,sqli tags: cve,cve2024,dokan,wp-plugin,wordpress,wp,dokan-pro,sqli
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:
@ -47,4 +50,5 @@ http:
- 'duration>=6' - 'duration>=6'
- 'status_code == 302' - 'status_code == 302'
condition: and condition: and
# digest: 4a0a00473045022100dddd0ec4841ea543e8407a98030b788b48c7c9ed9dd3effa76716f9339223b8a022076cb03daa28b52dab09d0014ed45363b0db7d14951be1ec39218c42cc49ee34f:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100dddd0ec4841ea543e8407a98030b788b48c7c9ed9dd3effa76716f9339223b8a022076cb03daa28b52dab09d0014ed45363b0db7d14951be1ec39218c42cc49ee34f:922c64590222798bb761d5b6d8e72950

View File

@ -15,10 +15,13 @@ info:
cwe-id: CWE-89 cwe-id: CWE-89
epss-score: 0.00043 epss-score: 0.00043
epss-percentile: 0.09387 epss-percentile: 0.09387
cpe: cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
fofa-query: icon_hash="1300107149" || icon_hash="1453309674" || cert.issuer.cn="1Panel Intermediate CA" fofa-query: icon_hash="1300107149" || icon_hash="1453309674" || cert.issuer.cn="1Panel Intermediate CA"
product: 1panel
vendor: fit2cloud
tags: cve,cve2024,sqli,1panel,authenticated tags: cve,cve2024,sqli,1panel,authenticated
variables: variables:

View File

@ -15,10 +15,13 @@ info:
classification: classification:
epss-score: 0.00046 epss-score: 0.00046
epss-percentile: 0.16798 epss-percentile: 0.16798
cpe: cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
fofa-query: app="APACHE-CloudStack" fofa-query: app="APACHE-CloudStack"
product: cloudstack
vendor: apache
tags: cve,cve2024,apache,cloudstack,auth-bypass tags: cve,cve2024,apache,cloudstack,auth-bypass
variables: variables:

View File

@ -14,10 +14,13 @@ info:
classification: classification:
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2024-43425 cve-id: CVE-2024-43425
cpe: cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: title:"Moodle" shodan-query: title:"Moodle"
product: moodle
vendor: moodle
tags: cve,cve2024,moodile,rce,authenticated tags: cve,cve2024,moodile,rce,authenticated
flow: http(1) && http(2) && http(3) && http(4) && http(5) && http(6) flow: http(1) && http(2) && http(3) && http(4) && http(5) && http(6)

View File

@ -19,10 +19,13 @@ info:
cwe-id: CWE-79 cwe-id: CWE-79
epss-score: 0.00065 epss-score: 0.00065
epss-percentile: 0.28259 epss-percentile: 0.28259
cpe: cpe:2.3:a:oscommerce:oscommerce:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
shodan-query: html:"osCommerce" shodan-query: html:"osCommerce"
product: oscommerce
vendor: oscommerce
tags: packetstorm,xss,rxss,oscommerce,cve2024,cve tags: packetstorm,xss,rxss,oscommerce,cve2024,cve
http: http:

View File

@ -12,10 +12,14 @@ info:
- https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/ - https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/
- https://github.com/sinsinology/CVE-2024-4358 - https://github.com/sinsinology/CVE-2024-4358
- https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358 - https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358
classification:
cpe: cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
shodan-query: title:"Log in | Telerik Report Server" shodan-query: title:"Log in | Telerik Report Server"
product: telerik_report_server
vendor: progress
tags: cve,cve2024,telerik,progress,auth-bypass,instrusive tags: cve,cve2024,telerik,progress,auth-bypass,instrusive
variables: variables:
user: "{{rand_base(6)}}" user: "{{rand_base(6)}}"

View File

@ -17,10 +17,13 @@ info:
cve-id: CVE-2024-4434 cve-id: CVE-2024-4434
epss-score: 0.00063 epss-score: 0.00063
epss-percentile: 0.2659 epss-percentile: 0.2659
cpe: cpe:2.3:a:thimpress:learnpress:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
publicwww-query: "/wp-content/plugins/learnpress" publicwww-query: "/wp-content/plugins/learnpress"
product: learnpress
vendor: thimpress
tags: cve,cve2024,wp,wp-plugin,wordpress,sqli,learnpress tags: cve,cve2024,wp,wp-plugin,wordpress,sqli,learnpress
variables: variables:

View File

@ -21,10 +21,13 @@ info:
cve-id: CVE-2024-4443 cve-id: CVE-2024-4443
epss-score: 0.00063 epss-score: 0.00063
epss-percentile: 0.27036 epss-percentile: 0.27036
cpe: cpe:2.3:a:businessdirectoryplugin:business_directory:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
publicwww-query: "/wp-content/plugins/business-directory-plugin/" publicwww-query: "/wp-content/plugins/business-directory-plugin/"
product: business_directory
vendor: businessdirectoryplugin
tags: cve,cve2024,sqli,business-directory,wordpress,wp-plugin tags: cve,cve2024,sqli,business-directory,wordpress,wp-plugin
http: http:

View File

@ -20,10 +20,13 @@ info:
cwe-id: CWE-22 cwe-id: CWE-22
epss-score: 0.00066 epss-score: 0.00066
epss-percentile: 0.29461 epss-percentile: 0.29461
cpe: cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: html:"WhatsUp Gold" shodan-query: html:"WhatsUp Gold"
product: whatsup_gold
vendor: progress
tags: cve,cve2024,rce,progress,whatsup,lfi tags: cve,cve2024,rce,progress,whatsup,lfi
http: http:

View File

@ -18,10 +18,13 @@ info:
cwe-id: CWE-89 cwe-id: CWE-89
epss-score: 0.00043 epss-score: 0.00043
epss-percentile: 0.09367 epss-percentile: 0.09367
cpe: cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: http.title:"Dolibarr" shodan-query: http.title:"Dolibarr"
product: dolibarr_erp\\/crm
vendor: dolibarr
tags: cve,cve2024,dolibarr,erp,sqli,authenticated tags: cve,cve2024,dolibarr,erp,sqli,authenticated
variables: variables:

View File

@ -16,10 +16,13 @@ info:
cve-id: CVE-2024-5522 cve-id: CVE-2024-5522
epss-score: 0.04 epss-score: 0.04
epss-percentile: 9 epss-percentile: 9
cpe: cpe:2.3:a:bplugins:html5_video_player:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
publicwww-query: "/wp-content/plugins/html5-video-player" publicwww-query: "/wp-content/plugins/html5-video-player"
product: html5_video_player
vendor: bplugins
tags: wpscan,cve,cve2024,wordpress,wp-plugin,wp,sqli,html5-video-player tags: wpscan,cve,cve2024,wordpress,wp-plugin,wp,sqli,html5-video-player
variables: variables:

View File

@ -15,10 +15,13 @@ info:
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2024-6028 cve-id: CVE-2024-6028
cwe-id: CWE-89 cwe-id: CWE-89
cpe: cpe:2.3:a:ays-pro:quiz_maker:*:*:*:*:wordpress:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
publicwww-query: "/wp-content/plugins/quiz-maker/" publicwww-query: "/wp-content/plugins/quiz-maker/"
product: quiz_maker
vendor: ays-pro
tags: cve,cve2024,wordpress,wp,wp-plugin,quiz-maker,sqli tags: cve,cve2024,wordpress,wp,wp-plugin,quiz-maker,sqli
http: http:

View File

@ -11,10 +11,13 @@ info:
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2024-6396 cve-id: CVE-2024-6396
cwe-id: CWE-29 cwe-id: CWE-29
cpe: cpe:2.3:a:aimstack:aim:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 3 max-request: 3
verified: true verified: true
fofa-query: icon_hash="-1047157256" fofa-query: icon_hash="-1047157256"
product: aim
vendor: aimstack
tags: cve,cve2024,aim,aimhubio,file-write tags: cve,cve2024,aim,aimhubio,file-write
variables: variables:

View File

@ -19,8 +19,11 @@ info:
cwe-id: CWE-200 cwe-id: CWE-200
epss-score: 0.00045 epss-score: 0.00045
epss-percentile: 0.16001 epss-percentile: 0.16001
cpe: cpe:2.3:h:netgear:wn604:*:*:*:*:*:*:*:*
metadata: metadata:
fofa-query: title=="Netgear" fofa-query: title=="Netgear"
product: wn604
vendor: netgear
tags: cve,cve2024,netgear tags: cve,cve2024,netgear
http: http:

View File

@ -17,10 +17,13 @@ info:
cwe-id: CWE-89 cwe-id: CWE-89
epss-score: 0.00043 epss-score: 0.00043
epss-percentile: 0.09569 epss-percentile: 0.09569
cpe: cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 4 max-request: 4
shodan-query: title:"WhatsUp Gold" http.favicon.hash:-2107233094 shodan-query: title:"WhatsUp Gold" http.favicon.hash:-2107233094
product: whatsup_gold
vendor: progress
tags: cve,cve2024,whatsup-gold,auth-bypass,sqli,intrusive tags: cve,cve2024,whatsup-gold,auth-bypass,sqli,intrusive
flow: | flow: |

View File

@ -8,10 +8,14 @@ info:
Arbitrary file read via Calibres content server in Calibre <= 7.14.0. Arbitrary file read via Calibres content server in Calibre <= 7.14.0.
reference: reference:
- https://starlabs.sg/advisories/24/24-6781/ - https://starlabs.sg/advisories/24/24-6781/
classification:
cpe: cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true
vendor: calibre-ebook
product: calibre
shodan-query: html:"Calibre" shodan-query: html:"Calibre"
fofa-query: "Server: calibre" fofa-query: "Server: calibre"
verified: true
max-requeset: 1 max-requeset: 1
tags: cve,cve2024,calibre,lfi tags: cve,cve2024,calibre,lfi
@ -53,4 +57,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 490a0046304402202ca6fce004009bb7f0650dea15c513da500a417c0c88ac7b0e5e45f237a4e7db022076d6e09297483225abdcab453844dd78e248409367b78b3e4b02e80034988c3d:922c64590222798bb761d5b6d8e72950 # digest: 490a0046304402202ca6fce004009bb7f0650dea15c513da500a417c0c88ac7b0e5e45f237a4e7db022076d6e09297483225abdcab453844dd78e248409367b78b3e4b02e80034988c3d:922c64590222798bb761d5b6d8e72950

View File

@ -8,8 +8,12 @@ info:
Unauthenticated remote code execution via Calibres content server in Calibre <= 7.14.0. Unauthenticated remote code execution via Calibres content server in Calibre <= 7.14.0.
reference: reference:
- https://starlabs.sg/advisories/24/24-6781/ - https://starlabs.sg/advisories/24/24-6781/
classification:
cpe: cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
vendor: calibre-ebook
product: calibre
shodan-query: html:"Calibre" shodan-query: html:"Calibre"
fofa-query: "Server: calibre" fofa-query: "Server: calibre"
max-requeset: 1 max-requeset: 1
@ -59,4 +63,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 4b0a00483046022100ab0c6eb74bbcbd25752d1cb038e1250aae3a1ca7939f89b55c54300ce331fb7f022100e4d96a62a8a103243f43549987b0cbd496172100fa325a425975b072d0482332:922c64590222798bb761d5b6d8e72950 # digest: 4b0a00483046022100ab0c6eb74bbcbd25752d1cb038e1250aae3a1ca7939f89b55c54300ce331fb7f022100e4d96a62a8a103243f43549987b0cbd496172100fa325a425975b072d0482332:922c64590222798bb761d5b6d8e72950

View File

@ -12,13 +12,18 @@ info:
- https://www.automationanywhere.com/products/automation-360 - https://www.automationanywhere.com/products/automation-360
- https://www.rapid7.com/blog/post/2024/07/26/cve-2024-6922-automation-anywhere-automation-360-server-side-request-forgery/ - https://www.rapid7.com/blog/post/2024/07/26/cve-2024-6922-automation-anywhere-automation-360-server-side-request-forgery/
- https://nvd.nist.gov/vuln/detail/CVE-2024-6922 - https://nvd.nist.gov/vuln/detail/CVE-2024-6922
classification:
cpe: cpe:2.3:a:automationanywhere:automation_360:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: http.favicon.hash:-1005691603 shodan-query: http.favicon.hash:-1005691603
fofa-query: icon_hash="-1005691603" fofa-query: icon_hash="-1005691603"
product: automation_360
vendor: automationanywhere
tags: cve,cve2024,ssrf,oast,automation,anywhere tags: cve,cve2024,ssrf,oast,automation,anywhere
http: http:
- raw: - raw:
- | - |

View File

@ -9,9 +9,12 @@ info:
- https://www.generex.de/media/pages/packages/documents/manuals/f65348d5b6-1628841637/manual_CS141_en.pdf - https://www.generex.de/media/pages/packages/documents/manuals/f65348d5b6-1628841637/manual_CS141_en.pdf
classification: classification:
cwe-id: CWE-798 cwe-id: CWE-798
cpe: cpe:2.3:h:generex:cs141:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 3 max-request: 3
shodan-query: http.html:"CS141" shodan-query: http.html:"CS141"
product: cs141
vendor: generex
tags: hiawatha,iot,default-login tags: hiawatha,iot,default-login
http: http:

View File

@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 8 max-request: 8
shodan-query: http.component:"Adobe Experience Manager" shodan-query: http.component:"Adobe Experience Manager"
product: experience_manager
vendor: adobe
tags: aem,default-login,adobe tags: aem,default-login,adobe
http: http:

View File

@ -12,11 +12,14 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 2 max-request: 2
shodan-query: shodan-query:
- http.title:"AEM Sign In" - http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager" - http.component:"Adobe Experience Manager"
product: experience_manager_cloud_service
vendor: adobe
tags: default-login,misconfig,aem,adobe tags: default-login,misconfig,aem,adobe
http: http:

View File

@ -4,12 +4,15 @@ info:
name: Apache Apollo - Default Login name: Apache Apollo - Default Login
author: ritikchaddha author: ritikchaddha
severity: high severity: high
classification:
cpe: cpe:2.3:a:apache:activemq_apollo:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: apache
product: activemq_apollo
shodan-query: title:"Apache Apollo" shodan-query: title:"Apache Apollo"
tags: apache,apollo,default-login,misconfig tags: apache,apollo,default-login,misconfig
variables: variables:
username: 'admin' username: 'admin'
password: 'admin' password: 'admin'
@ -22,7 +25,6 @@ http:
Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Type: application/x-www-form-urlencoded; charset=UTF-8
username={{username}}&password={{password}} username={{username}}&password={{password}}
- | - |
GET /console/index.html HTTP/1.1 GET /console/index.html HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
@ -45,4 +47,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 490a004630440220316d56568350165547ed1cb488565e14ecae67a775aea47af5d671124b563a5b022040877ad8cc3beae83a8717a9b7d014c5216d3b5acabd097d97d2cdeea26ee151:922c64590222798bb761d5b6d8e72950 # digest: 490a004630440220316d56568350165547ed1cb488565e14ecae67a775aea47af5d671124b563a5b022040877ad8cc3beae83a8717a9b7d014c5216d3b5acabd097d97d2cdeea26ee151:922c64590222798bb761d5b6d8e72950

View File

@ -6,9 +6,13 @@ info:
severity: high severity: high
description: | description: |
CloudStack instance discovered using weak default credentials, allows the attacker to gain admin privilege. CloudStack instance discovered using weak default credentials, allows the attacker to gain admin privilege.
classification:
cpe: cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: apache
product: cloudstack
shodan-query: http.title:"Apache CloudStack" shodan-query: http.title:"Apache CloudStack"
tags: default-login,apache,cloudstack tags: default-login,apache,cloudstack
@ -23,13 +27,11 @@ http:
command=login&username={{username}}&password={{password}}&domain=%2F&response=json command=login&username={{username}}&password={{password}}&domain=%2F&response=json
attack: pitchfork attack: pitchfork
payloads: payloads:
username: username:
- admin - admin
password: password:
- password - password
host-redirects: true host-redirects: true
matchers: matchers:
- type: dsl - type: dsl
@ -38,4 +40,5 @@ http:
- "contains(content_type, 'application/json')" - "contains(content_type, 'application/json')"
- "contains_all(body, 'sessionkey','domainid','userid')" - "contains_all(body, 'sessionkey','domainid','userid')"
condition: and condition: and
# digest: 4a0a00473045022100e14781f645e94e9addfd689f626c0fd7410a4c6abab76c419506a12a7e77b3c702203e536f8fc02f29d3744e77e3403890bbb63998656b7582421280bb32f31466a9:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100e14781f645e94e9addfd689f626c0fd7410a4c6abab76c419506a12a7e77b3c702203e536f8fc02f29d3744e77e3403890bbb63998656b7582421280bb32f31466a9:922c64590222798bb761d5b6d8e72950

View File

@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1
shodan-query: http.title:"DolphinScheduler" shodan-query: http.title:"DolphinScheduler"
product: dolphinscheduler
vendor: apache
tags: apache,dolphinscheduler,default-login,oss tags: apache,dolphinscheduler,default-login,oss
http: http:

View File

@ -11,10 +11,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:apache:karaf:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: realm="karaf" shodan-query: realm="karaf"
product: karaf
vendor: apache
tags: default-login,apache,karaf tags: default-login,apache,karaf
http: http:

View File

@ -9,9 +9,13 @@ info:
reference: reference:
- https://github.com/hanc00l/pocGoby2Xray/blob/main/xraypoc/Apache_Kylin_Console_Default_password.yml - https://github.com/hanc00l/pocGoby2Xray/blob/main/xraypoc/Apache_Kylin_Console_Default_password.yml
- https://github.com/Wker666/Demo/blob/main/script/%E6%BC%8F%E6%B4%9E%E6%8E%A2%E6%B5%8B/Kylin/Apache%20Kylin%20Console%20%E6%8E%A7%E5%88%B6%E5%8F%B0%E5%BC%B1%E5%8F%A3%E4%BB%A4.wker - https://github.com/Wker666/Demo/blob/main/script/%E6%BC%8F%E6%B4%9E%E6%8E%A2%E6%B5%8B/Kylin/Apache%20Kylin%20Console%20%E6%8E%A7%E5%88%B6%E5%8F%B0%E5%BC%B1%E5%8F%A3%E4%BB%A4.wker
classification:
cpe: cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 6 max-request: 6
vendor: apache
product: kylin
fofa-query: app="APACHE-kylin" fofa-query: app="APACHE-kylin"
tags: kylin,default-login,apache tags: kylin,default-login,apache

View File

@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:apache:ranger:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1
shodan-query: http.title:"Ranger - Sign In" shodan-query: http.title:"Ranger - Sign In"
product: ranger
vendor: apache
tags: apache,ranger,default-login tags: apache,ranger,default-login
http: http:

View File

@ -8,8 +8,12 @@ info:
reference: reference:
- https://www.rapid7.com/db/vulnerabilities/apache-tomcat-default-ovwebusr-password/ - https://www.rapid7.com/db/vulnerabilities/apache-tomcat-default-ovwebusr-password/
- https://github.com/danielmiessler/SecLists/blob/master/Passwords/Default-Credentials/tomcat-betterdefaultpasslist.txt - https://github.com/danielmiessler/SecLists/blob/master/Passwords/Default-Credentials/tomcat-betterdefaultpasslist.txt
classification:
cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 405 max-request: 405
vendor: apache
product: tomcat
shodan-query: title:"Apache Tomcat" shodan-query: title:"Apache Tomcat"
tags: tomcat,apache,default-login tags: tomcat,apache,default-login

View File

@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:ctrip:apollo:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 2 max-request: 2
shodan-query: http.favicon.hash:11794165 shodan-query: http.favicon.hash:11794165
product: apollo
vendor: ctrip
tags: apollo,default-login tags: apollo,default-login
http: http:

View File

@ -6,9 +6,13 @@ info:
severity: high severity: high
description: | description: |
ASUS RT-N16 contains a default login vulnerability. Default admin login password 'admin' was found. ASUS RT-N16 contains a default login vulnerability. Default admin login password 'admin' was found.
classification:
cpe: cpe:2.3:h:asus:rt-n16:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: asus
product: rt-n16
shodan-query: "RT-N16" shodan-query: "RT-N16"
tags: default-login,asus,rt-n16 tags: default-login,asus,rt-n16
@ -40,4 +44,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 4a0a0047304502200b8798bc6edb6d74920650e18ac885759f155e31874f0c2ae1ab825e5f9ab621022100ea2e7c324d3921ccc0dcb7436c5e57ae3aec0e3396d4c5cf1f7a010f6e688192:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502200b8798bc6edb6d74920650e18ac885759f155e31874f0c2ae1ab825e5f9ab621022100ea2e7c324d3921ccc0dcb7436c5e57ae3aec0e3396d4c5cf1f7a010f6e688192:922c64590222798bb761d5b6d8e72950

View File

@ -7,9 +7,12 @@ info:
description: Azkaban is a batch workflow job scheduler created at LinkedIn to run Hadoop jobs. Default web client credentials were discovered. description: Azkaban is a batch workflow job scheduler created at LinkedIn to run Hadoop jobs. Default web client credentials were discovered.
classification: classification:
cwe-id: CWE-798 cwe-id: CWE-798
cpe: cpe:2.3:a:azkaban_project:azkaban:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1 max-request: 1
shodan-query: http.title:"Azkaban Web Client" shodan-query: http.title:"Azkaban Web Client"
product: azkaban
vendor: azkaban_project
tags: default-login,azkaban tags: default-login,azkaban
http: http:

View File

@ -6,8 +6,12 @@ info:
severity: high severity: high
description: | description: |
Barco ClickShare contains a default login vulnerability. Default login password 'admin' was found. Barco ClickShare contains a default login vulnerability. Default login password 'admin' was found.
classification:
cpe: cpe:2.3:o:barco:clickshare_cs-100_huddle_firmware:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 3 max-request: 3
vendor: barco
product: clickshare_cs-100_huddle_firmware
shodan-query: "ClickShareSession" shodan-query: "ClickShareSession"
tags: default-login,barco,clickshare tags: default-login,barco,clickshare
@ -16,14 +20,12 @@ http:
- | - |
GET /login HTTP/1.1 GET /login HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
- | - |
POST /login/log_me_in HTTP/1.1 POST /login/log_me_in HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded Content-Type: application/x-www-form-urlencoded
csrf_protection_token={{token}}&username={{username}}&password={{password}}&eula_accepted=true csrf_protection_token={{token}}&username={{username}}&password={{password}}&eula_accepted=true
- | - |
GET /configuration_wizard HTTP/1.1 GET /configuration_wizard HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
@ -34,7 +36,6 @@ http:
- admin - admin
password: password:
- admin - admin
matchers: matchers:
- type: dsl - type: dsl
dsl: dsl:
@ -51,4 +52,5 @@ http:
regex: regex:
- '="csrf_protection_token" value="([0-9a-z]+)" \/>' - '="csrf_protection_token" value="([0-9a-z]+)" \/>'
internal: true internal: true
# digest: 490a004630440220110d1053dd5b584c6b956c2a7dd5cab571c2d140f37443d9e2c36d2897de6278022019c145b0a677c04a818d1cf14b7150105adb9ad64809c40f071a61232af232ef:922c64590222798bb761d5b6d8e72950 # digest: 490a004630440220110d1053dd5b584c6b956c2a7dd5cab571c2d140f37443d9e2c36d2897de6278022019c145b0a677c04a818d1cf14b7150105adb9ad64809c40f071a61232af232ef:922c64590222798bb761d5b6d8e72950

View File

@ -9,9 +9,13 @@ info:
reference: reference:
- https://www.exploitalert.com/view-details.html?id=34749 - https://www.exploitalert.com/view-details.html?id=34749
- https://cxsecurity.com/issue/WLB-2020010100 - https://cxsecurity.com/issue/WLB-2020010100
classification:
cpe: cpe:2.3:a:batflat:batflat:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: batflat
product: batflat
google-query: intext:"Powered by Batflat." google-query: intext:"Powered by Batflat."
tags: default-login,batflat tags: default-login,batflat

View File

@ -9,9 +9,13 @@ info:
reference: reference:
- https://www.bloofox.com/automated_setup.113.html - https://www.bloofox.com/automated_setup.113.html
- https://www.bloofox.com - https://www.bloofox.com
classification:
cpe: cpe:2.3:a:bloofox:bloofoxcms:*:*:*:*:*:*:*:*
metadata: metadata:
verified: "true" verified: "true"
max-request: 1 max-request: 1
vendor: bloofox
product: bloofoxcms
fofa-query: "Powered by bloofoxCMS" fofa-query: "Powered by bloofoxCMS"
tags: bloofox,cms,default-login tags: bloofox,cms,default-login

View File

@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:cloudera:hue:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 8 max-request: 8
shodan-query: title:"Hue - Welcome to Hue" shodan-query: title:"Hue - Welcome to Hue"
product: hue
vendor: cloudera
tags: hue,default-login,oss,cloudera tags: hue,default-login,oss,cloudera
http: http:

View File

@ -10,10 +10,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 16 max-request: 16
fofa-query: app="APACHE-CouchDB" fofa-query: app="APACHE-CouchDB"
product: couchdb
vendor: apache
tags: default-login,couchdb,misconfig tags: default-login,couchdb,misconfig
http: http:

View File

@ -6,9 +6,13 @@ info:
severity: high severity: high
description: | description: |
CrushFTP Anonymous login credentials were discovered. CrushFTP Anonymous login credentials were discovered.
classification:
cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
vendor: crushftp
product: crushftp
shodan-query: html:"CrushFTP" shodan-query: html:"CrushFTP"
tags: default-logins,anonymous,crushftp,default-login tags: default-logins,anonymous,crushftp,default-login
@ -17,8 +21,6 @@ http:
- | - |
GET /WebInterface/ HTTP/1.1 GET /WebInterface/ HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
- | - |
POST /WebInterface/function/ HTTP/1.1 POST /WebInterface/function/ HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
@ -38,7 +40,6 @@ http:
words: words:
- "text/xml" - "text/xml"
extractors: extractors:
- type: regex - type: regex
name: auth name: auth
@ -47,4 +48,5 @@ http:
group: 1 group: 1
regex: regex:
- 'currentAuth=([0-9a-zA-Z]+)' - 'currentAuth=([0-9a-zA-Z]+)'
# digest: 4a0a0047304502200c5a041237930d9a2d13bbdd1937389e71363cf051dc4e6811eaa132f7484060022100b71429de7b114bd8165650fc5ef949e6ab6138c5dd79e57fb16c60fa32c18ada:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502200c5a041237930d9a2d13bbdd1937389e71363cf051dc4e6811eaa132f7484060022100b71429de7b114bd8165650fc5ef949e6ab6138c5dd79e57fb16c60fa32c18ada:922c64590222798bb761d5b6d8e72950

View File

@ -6,9 +6,13 @@ info:
severity: high severity: high
description: | description: |
CrushFTP default login credentials were discovered. CrushFTP default login credentials were discovered.
classification:
cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
vendor: crushftp
product: crushftp
shodan-query: html:"CrushFTP" shodan-query: html:"CrushFTP"
tags: default-login,crushftp tags: default-login,crushftp
@ -17,8 +21,6 @@ http:
- | - |
GET /WebInterface/ HTTP/1.1 GET /WebInterface/ HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
- | - |
POST /WebInterface/function/ HTTP/1.1 POST /WebInterface/function/ HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
@ -27,15 +29,14 @@ http:
command=login&username={{username}}&password={{password}}&encoded=true&language=en&random=0.34712915617878926 command=login&username={{username}}&password={{password}}&encoded=true&language=en&random=0.34712915617878926
attack: pitchfork attack: pitchfork
payloads: payloads:
username: username:
- crushadmin - crushadmin
password: password:
- crushadmin - crushadmin
stop-at-first-match: true stop-at-first-match: true
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
@ -56,4 +57,5 @@ http:
group: 1 group: 1
regex: regex:
- 'currentAuth=([0-9a-zA-Z]+)' - 'currentAuth=([0-9a-zA-Z]+)'
# digest: 4a0a0047304502206cda74422b8792aa62859df68d922613d4db22ba6e374a674cc2896bb813426f0221008cd32f2eb5cdc98370da14ba0f39a260c3868ac8bd6bbc336c08d41f3122b9a4:922c64590222798bb761d5b6d8e72950 # digest: 4a0a0047304502206cda74422b8792aa62859df68d922613d4db22ba6e374a674cc2896bb813426f0221008cd32f2eb5cdc98370da14ba0f39a260c3868ac8bd6bbc336c08d41f3122b9a4:922c64590222798bb761d5b6d8e72950

View File

@ -9,9 +9,13 @@ info:
As a result, many Dataease can log in with this built-in account. As a result, many Dataease can log in with this built-in account.
reference: reference:
- https://github.com/dataease/dataease/issues/5995 - https://github.com/dataease/dataease/issues/5995
classification:
cpe: cpe:2.3:a:dataease_project:dataease:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: dataease_project
product: dataease
shodan-query: html:"Dataease" shodan-query: html:"Dataease"
tags: default-login,dataease tags: default-login,dataease
@ -42,4 +46,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 4a0a00473045022100f845a84ad7189dffccd1afea970ebb8f5e601b044da1562e014ab66c8f70e3a9022066c79ccdd3db85aae25fffd20633c098d785a2769347ea37c120f0fb36b1fc0e:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022100f845a84ad7189dffccd1afea970ebb8f5e601b044da1562e014ab66c8f70e3a9022066c79ccdd3db85aae25fffd20633c098d785a2769347ea37c120f0fb36b1fc0e:922c64590222798bb761d5b6d8e72950

View File

@ -11,10 +11,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:datahub_project:datahub:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: http.title:"DataHub" shodan-query: http.title:"DataHub"
product: datahub
vendor: datahub_project
tags: datahub,default-login tags: datahub,default-login
http: http:

View File

@ -11,10 +11,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:dataiku:data_science_studio:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
shodan-query: title:"dataiku" shodan-query: title:"dataiku"
product: data_science_studio
vendor: dataiku
tags: default-login,dataiku tags: default-login,dataiku
http: http:

View File

@ -9,9 +9,13 @@ info:
reference: reference:
- https://www.alibabacloud.com/blog/what-is-the-default-username-and-password-for-elasticsearch_599610 - https://www.alibabacloud.com/blog/what-is-the-default-username-and-password-for-elasticsearch_599610
- https://www.elastic.co/guide/en/elasticsearch/reference/current/built-in-users.html - https://www.elastic.co/guide/en/elasticsearch/reference/current/built-in-users.html
classification:
cpe: cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: elastic
product: elasticsearch
shodan-query: http.title:"Elastic" || http.favicon.hash:1328449667 shodan-query: http.title:"Elastic" || http.favicon.hash:1328449667
tags: default-login,elasticsearch tags: default-login,elasticsearch

View File

@ -6,9 +6,13 @@ info:
severity: high severity: high
description: | description: |
Esafenet electronic document security management system default credentials were discovered. Esafenet electronic document security management system default credentials were discovered.
classification:
cpe: cpe:2.3:a:esafenet:cdg:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 32 max-request: 32
vendor: esafenet
product: cdg
fofa-query: esafenet fofa-query: esafenet
tags: esafenet,cdg,default-login tags: esafenet,cdg,default-login

View File

@ -9,9 +9,13 @@ info:
reference: reference:
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5782.php - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5782.php
- https://www.exploit-db.com/exploits/51684 - https://www.exploit-db.com/exploits/51684
classification:
cpe: cpe:2.3:h:eurotel:etl3100:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
vendor: eurotel
product: etl3100
shodan-query: html:"ETL3100" shodan-query: html:"ETL3100"
fofa-query: body="ETL3100" fofa-query: body="ETL3100"
tags: misconfig,default-login,eurotel tags: misconfig,default-login,eurotel

View File

@ -8,9 +8,13 @@ info:
Attackers can log in through admin:admin, check the system status, and configure the device. Attackers can log in through admin:admin, check the system status, and configure the device.
reference: reference:
- https://github.com/wushigudan/poc/blob/main/%E9%A3%9E%E9%B1%BC%E6%98%9F%E9%BB%98%E8%AE%A4%E5%AF%86%E7%A0%81.py - https://github.com/wushigudan/poc/blob/main/%E9%A3%9E%E9%B1%BC%E6%98%9F%E9%BB%98%E8%AE%A4%E5%AF%86%E7%A0%81.py
classification:
cpe: cpe:2.3:h:feiyuxing:vec40g:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: feiyuxing
product: vec40g
fofa-query: title="飞鱼星企业级智能上网行为管理系统" fofa-query: title="飞鱼星企业级智能上网行为管理系统"
tags: feiyuxing,default-login,iot tags: feiyuxing,default-login,iot

View File

@ -8,9 +8,13 @@ info:
A default password vulnerability refers to a security flaw that arises when a system or device is shipped or set up with a pre-configured, default password that is commonly known or easily guessable. A default password vulnerability refers to a security flaw that arises when a system or device is shipped or set up with a pre-configured, default password that is commonly known or easily guessable.
reference: reference:
- https://www.exploitalert.com/view-details.html?id=39466 - https://www.exploitalert.com/view-details.html?id=39466
classification:
cpe: cpe:2.3:o:franklinfueling:ts-550_evo_firmware:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 1 max-request: 1
vendor: franklinfueling
product: ts-550_evo_firmware
google-query: inurl:"relay_status.html" google-query: inurl:"relay_status.html"
tags: default-login,franklin tags: default-login,franklin

View File

@ -8,10 +8,13 @@ info:
This template checks for the default credentials (username: 11111, password: x-admin) on Fuji Xerox ApeosPort series printers. If the credentials are valid, the response will have a 200 HTTP status code. Tested on a Fuji Xerox ApeosPort-V C2275 T2. This template checks for the default credentials (username: 11111, password: x-admin) on Fuji Xerox ApeosPort series printers. If the credentials are valid, the response will have a 200 HTTP status code. Tested on a Fuji Xerox ApeosPort-V C2275 T2.
reference: reference:
- https://4it.com.au/kb/article/fuji-xerox-default-password/ - https://4it.com.au/kb/article/fuji-xerox-default-password/
classification:
cpe: cpe:2.3:h:fujixerox:apeosport-v_c3375:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1
verified: true verified: true
vendor: fuji-xerox max-request: 1
vendor: fujixerox
product: apeosport-v_c3375
fofa-query: '"prop.htm" && "docucentre"' fofa-query: '"prop.htm" && "docucentre"'
tags: default-login,fuji,fuji-xerox,printer tags: default-login,fuji,fuji-xerox,printer
@ -36,4 +39,5 @@ http:
- type: status - type: status
status: status:
- 200 - 200
# digest: 4a0a00473045022021dddab097e239a58636b5c6b839cb7e8e8217298f30238bc710a0d23916c515022100a53010047899140f9321c168495bd9117f6b5989d5a0c51d773d10034cfac106:922c64590222798bb761d5b6d8e72950 # digest: 4a0a00473045022021dddab097e239a58636b5c6b839cb7e8e8217298f30238bc710a0d23916c515022100a53010047899140f9321c168495bd9117f6b5989d5a0c51d773d10034cfac106:922c64590222798bb761d5b6d8e72950

View File

@ -11,10 +11,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3 cvss-score: 8.3
cwe-id: CWE-522 cwe-id: CWE-522
cpe: cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*
metadata: metadata:
verified: true verified: true
max-request: 2 max-request: 2
fofa-query: app="GeoServer" fofa-query: app="GeoServer"
product: geoserver
vendor: geoserver
tags: geoserver,default-login tags: geoserver,default-login
http: http:

View File

@ -8,9 +8,13 @@ info:
Gitblit Default login credentials were discovered. Gitblit Default login credentials were discovered.
reference: reference:
- https://www.gitblit.com/administration.html - https://www.gitblit.com/administration.html
classification:
cpe: cpe:2.3:a:gitblit:gitblit:*:*:*:*:*:*:*:*
metadata: metadata:
max-request: 1
verified: true verified: true
max-request: 1
vendor: gitblit
product: gitblit
shodan-query: title:"Gitblit" shodan-query: title:"Gitblit"
tags: gitblit,default-login tags: gitblit,default-login
@ -46,4 +50,5 @@ http:
- type: dsl - type: dsl
dsl: dsl:
- "len(body) == 0" - "len(body) == 0"
# digest: 4a0a004730450220691d3ee89f1594b342246ca8ab8be803b73a21e02aba3351ad7b37b30b3f6212022100cc37beb5ccfc7c249f775ab36ff557cd283ed426c4481be17cf0ac8c03dd6307:922c64590222798bb761d5b6d8e72950 # digest: 4a0a004730450220691d3ee89f1594b342246ca8ab8be803b73a21e02aba3351ad7b37b30b3f6212022100cc37beb5ccfc7c249f775ab36ff557cd283ed426c4481be17cf0ac8c03dd6307:922c64590222798bb761d5b6d8e72950

Some files were not shown because too many files have changed in this diff Show More