Dashboard Content Enhancement (#4020)

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

* Remove empty cve lines and relocate tags

* Remove blank cve lines & move tags

* Fix merge errors

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-2551.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Syntax cleanup

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Syntax and a title change

* Enhancement: cves/2021/CVE-2021-38702.yaml by mp

* Fix references

* Enhancement: cves/2021/CVE-2021-38704.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-44529.yaml by mp

* Conflicts resolved

* Fix quoting

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-23779.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp

* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Update CVE-2020-25223.yaml

* Update CVE-2020-26214.yaml

* Update CVE-2020-25506.yaml

* Update CVE-2020-2551.yaml

* Update CVE-2020-26919.yaml

* Update CVE-2021-44529.yaml

* Update CVE-2020-28871.yaml

* Update CVE-2020-28188.yaml

* Update CVE-2021-45967.yaml

* Update hue-default-credential.yaml

* Update CVE-2021-44529.yaml

* misc syntax update

* Syntax  restore some characters

* Spacing

* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp

* Enhancement: cves/2019/CVE-2019-10068.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-11580.yaml by mp

* Enhancement: cves/2019/CVE-2019-11581.yaml by mp

* Enhancement: cves/2019/CVE-2019-12314.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Link wrapping issue

* Enhancement: cves/2019/CVE-2019-13462.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16759.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cves/2019/CVE-2019-16278.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-12725.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs

* Enhancement: cves/2021/CVE-2021-33807.yaml by mp

* Enhancement: cves/2010/CVE-2010-0943.yaml by mp

* Enhancement: cves/2008/CVE-2008-6172.yaml by mp

* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: network/cisco-smi-exposure.yaml by mp

* Enhancement: cves/2021/CVE-2021-37704.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2019/CVE-2019-16313.yaml by mp

* Enhancement: cves/2021/CVE-2021-3017.yaml by mp

* Enhancement: cves/2010/CVE-2010-1353.yaml by mp

* Enhancement: cves/2010/CVE-2010-5278.yaml by mp

* Enhancement: cves/2021/CVE-2021-37573.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2018/CVE-2018-11709.yaml by mp

* Enhancement: cves/2014/CVE-2014-2321.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Manual enhancement

* Manual enhancement push due to dashboard failure

* Testing of dashboard accidentally commited to dashboard branch

* Spacing
Put some CVEs in the classification

* Add missing cve-id fields to templates in cve/

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
patch-1
MostInterestingBotInTheWorld 2022-04-01 04:51:42 -04:00 committed by GitHub
parent 10bcb838c3
commit 6ddfbac2b4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
91 changed files with 361 additions and 159 deletions

View File

@ -6,6 +6,8 @@ info:
severity: medium severity: medium
description: The Virtual Keyboard plugin for SquirrelMail is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. description: The Virtual Keyboard plugin for SquirrelMail is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
reference: https://www.exploit-db.com/exploits/21811 reference: https://www.exploit-db.com/exploits/21811
classification:
cve-id: CVE-2002-1131
tags: xss,squirrelmail,cve,cve2002 tags: xss,squirrelmail,cve,cve2002
requests: requests:

View File

@ -8,6 +8,8 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2005-4385 - https://nvd.nist.gov/vuln/detail/CVE-2005-4385
author: geeknik author: geeknik
severity: medium severity: medium
classification:
cve-id: CVE-2005-4385
tags: cofax,xss,cve,cve2005 tags: cofax,xss,cve,cve2005
requests: requests:

View File

@ -8,6 +8,8 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2006-1681 - https://nvd.nist.gov/vuln/detail/CVE-2006-1681
author: geeknik author: geeknik
severity: medium severity: medium
classification:
cve-id: CVE-2006-1681
tags: cherokee,httpd,xss,cve,cve2006 tags: cherokee,httpd,xss,cve,cve2006
requests: requests:

View File

@ -6,6 +6,8 @@ info:
severity: high severity: high
description: "PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable." description: "PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable."
reference: https://www.exploit-db.com/exploits/27948 reference: https://www.exploit-db.com/exploits/27948
classification:
cve-id: CVE-2006-2842
tags: cve2006,lfi,squirrelmail,cve tags: cve2006,lfi,squirrelmail,cve
requests: requests:

View File

@ -6,6 +6,8 @@ info:
reference: https://www.securityfocus.com/archive/1/459590/100/0/threaded reference: https://www.securityfocus.com/archive/1/459590/100/0/threaded
author: geeknik author: geeknik
severity: medium severity: medium
classification:
cve-id: CVE-2007-0885
tags: cve,cve2007,jira,xss tags: cve,cve2007,jira,xss
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/4307 - https://www.exploit-db.com/exploits/4307
- https://www.cvedetails.com/cve/CVE-2007-4504 - https://www.cvedetails.com/cve/CVE-2007-4504
classification:
cve-id: CVE-2007-4504
tags: cve,cve2007,joomla,lfi tags: cve,cve2007,joomla,lfi
requests: requests:

View File

@ -6,6 +6,8 @@ info:
severity: critical severity: critical
description: Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character. description: Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character.
reference: https://www.guildhab.top/?p=2326 reference: https://www.guildhab.top/?p=2326
classification:
cve-id: CVE-2007-4556
tags: cve,cve2007,apache,rce,struts tags: cve,cve2007,apache,rce,struts
requests: requests:

View File

@ -5,10 +5,12 @@ info:
author: dhiyaneshDK author: dhiyaneshDK
severity: medium severity: medium
description: Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865. description: Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865.
tags: cve,cve2007,xss,pgadmin,phppgadmin
reference: https://www.exploit-db.com/exploits/30090 reference: https://www.exploit-db.com/exploits/30090
metadata: metadata:
shodan-query: 'http.title:"phpPgAdmin"' shodan-query: 'http.title:"phpPgAdmin"'
classification:
cve-id: CVE-2007-5728
tags: cve,cve2007,xss,pgadmin,phppgadmin
requests: requests:
- method: GET - method: GET

View File

@ -6,6 +6,8 @@ info:
severity: medium severity: medium
description: Cross-site scripting (XSS) vulnerability in index.php in AppServ Open Project 2.5.10 and earlier allows remote attackers to inject arbitrary web script or HTML via the appservlang parameter. description: Cross-site scripting (XSS) vulnerability in index.php in AppServ Open Project 2.5.10 and earlier allows remote attackers to inject arbitrary web script or HTML via the appservlang parameter.
reference: https://exchange.xforce.ibmcloud.com/vulnerabilities/42546 reference: https://exchange.xforce.ibmcloud.com/vulnerabilities/42546
classification:
cve-id: CVE-2008-2398
tags: cve,cve2008,xss tags: cve,cve2008,xss
requests: requests:

View File

@ -6,7 +6,10 @@ info:
description: | description: |
Directory traversal vulnerability in cmsimple/cms.php in CMSimple 3.1, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number. Directory traversal vulnerability in cmsimple/cms.php in CMSimple 3.1, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.
reference: https://www.exploit-db.com/exploits/5700 reference: https://www.exploit-db.com/exploits/5700
classification:
cve-id: CVE-2008-2650
tags: cve,cve2008,lfi tags: cve,cve2008,lfi
requests: requests:
- raw: - raw:
- | - |

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/6618 - https://www.exploit-db.com/exploits/6618
- https://www.cvedetails.com/cve/CVE-2008-4668 - https://www.cvedetails.com/cve/CVE-2008-4668
classification:
cve-id: CVE-2008-4668
tags: cve,cve2008,joomla,lfi tags: cve,cve2008,joomla,lfi
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/5435 - https://www.exploit-db.com/exploits/5435
- https://www.cvedetails.com/cve/CVE-2008-4764 - https://www.cvedetails.com/cve/CVE-2008-4764
classification:
cve-id: CVE-2008-4764
tags: cve,cve2008,joomla,lfi tags: cve,cve2008,joomla,lfi
requests: requests:

View File

@ -4,11 +4,13 @@ info:
name: phpPgAdmin 4.2.1 - '_language' Local File Inclusion name: phpPgAdmin 4.2.1 - '_language' Local File Inclusion
author: dhiyaneshDK author: dhiyaneshDK
severity: medium severity: medium
description: "Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php."
reference: https://www.exploit-db.com/exploits/7363 reference: https://www.exploit-db.com/exploits/7363
tags: cve2008,lfi,phppgadmin classification:
cve-id: CVE-2008-5587
metadata: metadata:
shodan-query: 'http.title:"phpPgAdmin"' shodan-query: 'http.title:"phpPgAdmin"'
description: "Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php." tags: cve2008,lfi,phppgadmin
requests: requests:
- method: GET - method: GET

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/6809 - https://www.exploit-db.com/exploits/6809
- https://www.cvedetails.com/cve/CVE-2008-6080 - https://www.cvedetails.com/cve/CVE-2008-6080
classification:
cve-id: CVE-2008-6080
tags: cve,cve2008,joomla,lfi tags: cve,cve2008,joomla,lfi
requests: requests:

View File

@ -4,14 +4,13 @@ info:
name: Joomla! Component RWCards 3.0.11 - Local File Inclusion name: Joomla! Component RWCards 3.0.11 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter. description: "A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter."
remediation: Upgrade to the latest version.
reference: reference:
- https://www.exploit-db.com/exploits/6817 - https://www.exploit-db.com/exploits/6817
- https://www.cvedetails.com/cve/CVE-2008-6172 - https://www.cvedetails.com/cve/CVE-2008-6172
tags: cve,cve2008,joomla,lfi
classification: classification:
cve-id: CVE-2008-6172 cve-id: CVE-2008-6172
tags: cve,cve2008,joomla,lfi
requests: requests:
- method: GET - method: GET
@ -29,4 +28,4 @@ requests:
status: status:
- 200 - 200
# Enhanced by mp on 2022/01/27 # Enhanced by mp on 2022/03/30

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/6980 - https://www.exploit-db.com/exploits/6980
- https://www.cvedetails.com/cve/CVE-2008-6222 - https://www.cvedetails.com/cve/CVE-2008-6222
classification:
cve-id: CVE-2008-6222
tags: cve,cve2008,joomla,lfi tags: cve,cve2008,joomla,lfi
requests: requests:

View File

@ -8,6 +8,8 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2008-6668 - https://nvd.nist.gov/vuln/detail/CVE-2008-6668
author: geeknik author: geeknik
severity: high severity: high
classification:
cve-id: CVE-2008-6668
tags: nweb2fax,lfi,cve,cve2008,traversal tags: nweb2fax,lfi,cve,cve2008,traversal
requests: requests:

View File

@ -6,6 +6,8 @@ info:
description: cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action. description: cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action.
reference: https://www.exploit-db.com/exploits/8023 reference: https://www.exploit-db.com/exploits/8023
severity: critical severity: critical
classification:
cve-id: CVE-2009-0545
tags: cve,cve2009,zeroshell,kerbynet,rce tags: cve,cve2009,zeroshell,kerbynet,rce
requests: requests:

View File

@ -4,11 +4,12 @@ info:
name: Horde - Horde_Image::factory driver Argument LFI name: Horde - Horde_Image::factory driver Argument LFI
author: pikpikcu author: pikpikcu
severity: high severity: high
description: | description: Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
reference: reference:
- https://www.exploit-db.com/exploits/16154 - https://www.exploit-db.com/exploits/16154
- https://nvd.nist.gov/vuln/detail/CVE-2009-0932?cpeVersion=2.2 - https://nvd.nist.gov/vuln/detail/CVE-2009-0932?cpeVersion=2.2
classification:
cve-id: CVE-2009-0932
tags: cve,cve2009,horde,lfi,traversal tags: cve,cve2009,horde,lfi,traversal
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.phpmyadmin.net/security/PMASA-2009-3/ - https://www.phpmyadmin.net/security/PMASA-2009-3/
- https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433 - https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433
classification:
cve-id: CVE-2009-1151
tags: cve,cve2009,phpmyadmin,rce,deserialization tags: cve,cve2009,phpmyadmin,rce,deserialization
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/8367 - https://www.exploit-db.com/exploits/8367
- https://www.cvedetails.com/cve/CVE-2009-1496 - https://www.cvedetails.com/cve/CVE-2009-1496
classification:
cve-id: CVE-2009-1496
tags: cve,cve2009,joomla,lfi tags: cve,cve2009,joomla,lfi
requests: requests:

View File

@ -6,6 +6,8 @@ info:
severity: high severity: high
description: Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter. description: Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
reference: https://www.exploit-db.com/exploits/32954 reference: https://www.exploit-db.com/exploits/32954
classification:
cve-id: CVE-2009-1558
tags: cve,cve2009,iot,lfi,linksys,camera,cisco,firmware,traversal tags: cve,cve2009,iot,lfi,linksys,camera,cisco,firmware,traversal
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.securityfocus.com/archive/1/505803/100/0/threaded - https://www.securityfocus.com/archive/1/505803/100/0/threaded
- https://www.tenable.com/cve/CVE-2009-1872 - https://www.tenable.com/cve/CVE-2009-1872
classification:
cve-id: CVE-2009-1872
tags: cve,cve2009,adobe,xss,coldfusion tags: cve,cve2009,adobe,xss,coldfusion
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/8898 - https://www.exploit-db.com/exploits/8898
- https://www.cvedetails.com/cve/CVE-2009-2015 - https://www.cvedetails.com/cve/CVE-2009-2015
classification:
cve-id: CVE-2009-2015
tags: cve,cve2009,joomla,lfi tags: cve,cve2009,joomla,lfi
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/8946 - https://www.exploit-db.com/exploits/8946
- https://www.cvedetails.com/cve/CVE-2009-2100 - https://www.cvedetails.com/cve/CVE-2009-2100
classification:
cve-id: CVE-2009-2100
tags: cve,cve2009,joomla,lfi tags: cve,cve2009,joomla,lfi
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/9564 - https://www.exploit-db.com/exploits/9564
- https://www.cvedetails.com/cve/CVE-2009-3053 - https://www.cvedetails.com/cve/CVE-2009-3053
classification:
cve-id: CVE-2009-3053
tags: cve,cve2009,joomla,lfi tags: cve,cve2009,joomla,lfi
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/9706 - https://www.exploit-db.com/exploits/9706
- https://www.cvedetails.com/cve/CVE-2009-3318 - https://www.cvedetails.com/cve/CVE-2009-3318
classification:
cve-id: CVE-2009-3318
tags: cve,cve2009,joomla,lfi tags: cve,cve2009,joomla,lfi
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/8870 - https://www.exploit-db.com/exploits/8870
- https://www.cvedetails.com/cve/CVE-2009-4202 - https://www.cvedetails.com/cve/CVE-2009-4202
classification:
cve-id: CVE-2009-4202
tags: cve,cve2009,joomla,lfi,photo tags: cve,cve2009,joomla,lfi,photo
requests: requests:

View File

@ -8,6 +8,8 @@ info:
- https://www.exploit-db.com/exploits/10216 - https://www.exploit-db.com/exploits/10216
author: geeknik author: geeknik
severity: high severity: high
classification:
cve-id: CVE-2009-4223
tags: cve,cve2009,krweb,rfi tags: cve,cve2009,krweb,rfi
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: | reference: |
- https://www.exploit-db.com/exploits/33440 - https://www.exploit-db.com/exploits/33440
- https://www.cvedetails.com/cve/CVE-2009-4679 - https://www.cvedetails.com/cve/CVE-2009-4679
classification:
cve-id: CVE-2009-4679
tags: cve,cve2009,joomla,lfi,nexus tags: cve,cve2009,joomla,lfi,nexus
requests: requests:

View File

@ -1,16 +1,17 @@
id: CVE-2010-0943 id: CVE-2010-0943
info: info:
name: Joomla! Component com_jashowcase - Directory Traversal name: Joomla! Component com_jashowcase - Directory Traversal
author: daffainfo author: daffainfo
severity: high severity: high
description: A directory traversal vulnerability in the JA Showcase (com_jashowcase) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a jashowcase action to index.php. description: A directory traversal vulnerability in the JA Showcase (com_jashowcase) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter in a jashowcase action to index.php.
remediation: Apply all relevant security patches and product upgrades.
reference: reference:
- https://www.exploit-db.com/exploits/11090 - https://www.exploit-db.com/exploits/11090
- https://www.cvedetails.com/cve/CVE-2010-0943 - https://www.cvedetails.com/cve/CVE-2010-0943
tags: cve,cve2010,joomla,lfi
classification: classification:
cve-id: CVE-2010-0943 cve-id: CVE-2010-0943
tags: cve,cve2010,joomla,lfi
requests: requests:
- method: GET - method: GET
path: path:
@ -23,4 +24,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/13
# Enhanced by mp on 2022/03/30

View File

@ -1,16 +1,17 @@
id: CVE-2010-1353 id: CVE-2010-1353
info: info:
name: Joomla! Component LoginBox - Local File Inclusion name: Joomla! Component LoginBox - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. description: "A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php."
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12068 - https://www.exploit-db.com/exploits/12068
- https://www.cvedetails.com/cve/CVE-2010-1353 - https://www.cvedetails.com/cve/CVE-2010-1353
tags: cve,cve2010,joomla,lfi
classification: classification:
cve-id: CVE-2010-1353 cve-id: CVE-2010-1353
tags: cve,cve2010,joomla,lfi
requests: requests:
- method: GET - method: GET
path: path:
@ -23,4 +24,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14
# Enhanced by mp on 2022/03/30

View File

@ -4,14 +4,13 @@ info:
name: Joomla! Component Sweetykeeper 1.5 - Local File Inclusion name: Joomla! Component Sweetykeeper 1.5 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: A directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. description: "A directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php."
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12182 - https://www.exploit-db.com/exploits/12182
- https://www.cvedetails.com/cve/CVE-2010-1474 - https://www.cvedetails.com/cve/CVE-2010-1474
tags: cve,cve2010,joomla,lfi
classification: classification:
cve-id: CVE-2010-1474 cve-id: CVE-2010-1474
tags: cve,cve2010,joomla,lfi
requests: requests:
- method: GET - method: GET
@ -25,4 +24,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14
# Enhanced by mp on 2022/03/30

View File

@ -4,13 +4,13 @@ info:
name: Joomla! Component ZiMB Comment 0.8.1 - Local File Inclusion name: Joomla! Component ZiMB Comment 0.8.1 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: A directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. description: "A directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php."
reference: reference:
- https://www.exploit-db.com/exploits/12283 - https://www.exploit-db.com/exploits/12283
- https://www.cvedetails.com/cve/CVE-2010-1602 - https://www.cvedetails.com/cve/CVE-2010-1602
tags: cve,cve2010,joomla,lfi
classification: classification:
cve-id: CVE-2010-1602 cve-id: CVE-2010-1602
tags: cve,cve2010,joomla,lfi
requests: requests:
- method: GET - method: GET
@ -25,4 +25,4 @@ requests:
status: status:
- 200 - 200
# Enhanced by mp on 2022/03/07 # Enhanced by mp on 2022/03/30

View File

@ -4,14 +4,13 @@ info:
name: MODx manager - Local File Inclusion name: MODx manager - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: A directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl and possibly earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter when magic_quotes_gpc is disabled. description: "A directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl and possibly earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter when magic_quotes_gpc is disabled."
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/34788 - https://www.exploit-db.com/exploits/34788
- https://www.cvedetails.com/cve/CVE-2010-5278 - https://www.cvedetails.com/cve/CVE-2010-5278
tags: cve,cve2010,lfi
classification: classification:
cve-id: CVE-2010-5278 cve-id: CVE-2010-5278
tags: cve,cve2010,lfi
requests: requests:
- method: GET - method: GET
@ -31,4 +30,4 @@ requests:
condition: and condition: and
part: body part: body
# Enhanced by mp on 2022/02/18 # Enhanced by mp on 2022/03/30

View File

@ -8,9 +8,9 @@ info:
- https://yosmelvin.wordpress.com/2017/09/21/f660-modem-hack/ - https://yosmelvin.wordpress.com/2017/09/21/f660-modem-hack/
- https://jalalsela.com/zxhn-h108n-router-web-shell-secrets/ - https://jalalsela.com/zxhn-h108n-router-web-shell-secrets/
severity: high severity: high
tags: iot,cve,cve2014,zte
classification: classification:
cve-id: CVE-2014-2321 cve-id: CVE-2014-2321
tags: iot,cve,cve2014,zte
requests: requests:
- method: GET - method: GET
@ -30,4 +30,4 @@ requests:
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/23 # Enhanced by mp on 2022/03/31

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/35721 - https://www.exploit-db.com/exploits/35721
- https://nvd.nist.gov/vuln/detail/CVE-2015-0554 - https://nvd.nist.gov/vuln/detail/CVE-2015-0554
classification:
cve-id: CVE-2015-0554
tags: cve,cve2015,pirelli,router,disclosure tags: cve,cve2015,pirelli,router,disclosure
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://blog.csdn.net/JiangBuLiu/article/details/94457980 - https://blog.csdn.net/JiangBuLiu/article/details/94457980
- http://www.elasticsearch.com/blog/elasticsearch-1-4-3-1-3-8-released/ - http://www.elasticsearch.com/blog/elasticsearch-1-4-3-1-3-8-released/
classification:
cve-id: CVE-2015-1427
tags: cve,cve2015,elastic,rce,elasticsearch tags: cve,cve2015,elastic,rce,elasticsearch
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://nvd.nist.gov/vuln/detail/CVE-2015-1880 - https://nvd.nist.gov/vuln/detail/CVE-2015-1880
- https://www.c2.lol/articles/xss-in-fortigates-ssl-vpn-login-page - https://www.c2.lol/articles/xss-in-fortigates-ssl-vpn-login-page
classification:
cve-id: CVE-2015-1880
tags: cve,cve2015,xss,fortigates,ssl tags: cve,cve2015,xss,fortigates,ssl
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/35996 - https://www.exploit-db.com/exploits/35996
- https://nvd.nist.gov/vuln/detail/CVE-2015-2067 - https://nvd.nist.gov/vuln/detail/CVE-2015-2067
classification:
cve-id: CVE-2015-2067
tags: cve,cve2015,lfi,magento,magmi,plugin tags: cve,cve2015,lfi,magento,magmi,plugin
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/35996 - https://www.exploit-db.com/exploits/35996
- https://nvd.nist.gov/vuln/detail/CVE-2015-2068 - https://nvd.nist.gov/vuln/detail/CVE-2015-2068
classification:
cve-id: CVE-2015-2068
tags: cve,cve2015,magento,magmi,xss,plugin tags: cve,cve2015,magento,magmi,xss,plugin
requests: requests:

View File

@ -4,11 +4,13 @@ info:
name: Navis DocumentCloud 0.1 - Unauthenticated Reflected Cross-Site Scripting (XSS) name: Navis DocumentCloud 0.1 - Unauthenticated Reflected Cross-Site Scripting (XSS)
author: daffainfo author: daffainfo
severity: medium severity: medium
description: "Cross-site scripting (XSS) vulnerability in js/window.php in the Navis DocumentCloud plugin before 0.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter."
reference: reference:
- https://advisories.dxw.com/advisories/publicly-exploitable-xss-in-wordpress-plugin-navis-documentcloud/ - https://advisories.dxw.com/advisories/publicly-exploitable-xss-in-wordpress-plugin-navis-documentcloud/
- https://nvd.nist.gov/vuln/detail/CVE-2015-2807 - https://nvd.nist.gov/vuln/detail/CVE-2015-2807
classification:
cve-id: CVE-2015-2807
tags: cve,cve2015,wordpress,wp-plugin,xss tags: cve,cve2015,wordpress,wp-plugin,xss
description: "Cross-site scripting (XSS) vulnerability in js/window.php in the Navis DocumentCloud plugin before 0.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter."
requests: requests:
- method: GET - method: GET

View File

@ -6,6 +6,8 @@ info:
severity: high severity: high
reference: https://github.com/t0kx/exploit-CVE-2015-3306 reference: https://github.com/t0kx/exploit-CVE-2015-3306
description: The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands. description: The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
classification:
cve-id: CVE-2015-3306
tags: cve,cve2015,ftp,rce,network,proftpd tags: cve,cve2015,ftp,rce,network,proftpd
network: network:

View File

@ -6,6 +6,8 @@ info:
severity: high severity: high
description: Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors. description: Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors.
reference: https://www.exploit-db.com/exploits/37054/ reference: https://www.exploit-db.com/exploits/37054/
classification:
cve-id: CVE-2015-3337
tags: cve,cve2015,elastic,lfi,elasticsearch,plugin tags: cve,cve2015,elastic,lfi,elasticsearch,plugin
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://vulners.com/cve/CVE-2015-3648/ - https://vulners.com/cve/CVE-2015-3648/
- https://www.securityfocus.com/bid/75019 - https://www.securityfocus.com/bid/75019
classification:
cve-id: CVE-2015-3648
tags: cve,cve2015,lfi,resourcespace tags: cve,cve2015,lfi,resourcespace
requests: requests:

View File

@ -5,10 +5,12 @@ info:
author: ELSFA7110,meme-lord author: ELSFA7110,meme-lord
severity: high severity: high
description: FragmentListener in the HttpKernel component in Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the _controller attribute is set, which allows remote attackers to bypass URL signing and security rules by including (1) no hash or (2) an invalid hash in a request to /_fragment. description: FragmentListener in the HttpKernel component in Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the _controller attribute is set, which allows remote attackers to bypass URL signing and security rules by including (1) no hash or (2) an invalid hash in a request to /_fragment.
tags: cve,cve2015,symfony,rce
reference: reference:
- https://symfony.com/blog/cve-2015-4050-esi-unauthorized-access - https://symfony.com/blog/cve-2015-4050-esi-unauthorized-access
- https://nvd.nist.gov/vuln/detail/CVE-2015-4050 - https://nvd.nist.gov/vuln/detail/CVE-2015-4050
classification:
cve-id: CVE-2015-4050
tags: cve,cve2015,symfony,rce
requests: requests:
- method: GET - method: GET

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.exploit-db.com/exploits/37274 - https://www.exploit-db.com/exploits/37274
- https://www.cvedetails.com/cve/CVE-2015-4414 - https://www.cvedetails.com/cve/CVE-2015-4414
classification:
cve-id: CVE-2015-4414
tags: cve,cve2015,wordpress,wp-plugin,lfi tags: cve,cve2015,wordpress,wp-plugin,lfi
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16 - https://wpscan.com/vulnerability/afc0d5b5-280f-424f-bc3e-d04452e56e16
- https://nvd.nist.gov/vuln/detail/CVE-2015-5461 - https://nvd.nist.gov/vuln/detail/CVE-2015-5461
classification:
cve-id: CVE-2015-5461
tags: redirect,cve,cve2015,wordpress,wp-plugin tags: redirect,cve,cve2015,wordpress,wp-plugin
requests: requests:

View File

@ -7,6 +7,8 @@ info:
reference: reference:
- https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-5531 - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-5531
- https://nvd.nist.gov/vuln/detail/CVE-2015-5531 - https://nvd.nist.gov/vuln/detail/CVE-2015-5531
classification:
cve-id: CVE-2015-5531
tags: cve,cve2015,elasticsearch tags: cve,cve2015,elasticsearch
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://nodesecurity.io/advisories/geddy-directory-traversal - https://nodesecurity.io/advisories/geddy-directory-traversal
- https://github.com/geddy/geddy/issues/697 - https://github.com/geddy/geddy/issues/697
classification:
cve-id: CVE-2015-5688
tags: cve,cve2015,geddy,lfi tags: cve,cve2015,geddy,lfi
requests: requests:

View File

@ -7,9 +7,10 @@ info:
- https://seclists.org/fulldisclosure/2015/Dec/117 - https://seclists.org/fulldisclosure/2015/Dec/117
- https://ics-cert.us-cert.gov/advisories/ICSA-15-286-01 - https://ics-cert.us-cert.gov/advisories/ICSA-15-286-01
- https://nvd.nist.gov/vuln/detail/CVE-2015-6477 - https://nvd.nist.gov/vuln/detail/CVE-2015-6477
author: geeknik author: geeknik
severity: medium severity: medium
classification:
cve-id: CVE-2015-6477
tags: cve,cve2015,xss,iot,nordex,nc2 tags: cve,cve2015,xss,iot,nordex,nc2
requests: requests:

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://packetstormsecurity.com/files/133371/ - https://packetstormsecurity.com/files/133371/
- https://nvd.nist.gov/vuln/detail/CVE-2015-6920 - https://nvd.nist.gov/vuln/detail/CVE-2015-6920
classification:
cve-id: CVE-2015-6920
tags: cve,cve2015,wordpress,wp-plugin,xss tags: cve,cve2015,wordpress,wp-plugin,xss
requests: requests:

View File

@ -4,11 +4,13 @@ info:
name: Pie-Register <= 2.0.18 - Unauthenticated Reflected Cross-Site Scripting (XSS) name: Pie-Register <= 2.0.18 - Unauthenticated Reflected Cross-Site Scripting (XSS)
author: daffainfo author: daffainfo
severity: medium severity: medium
description: "Cross-site scripting (XSS) vulnerability in pie-register/pie-register.php in the Pie Register plugin before 2.0.19 for WordPress allows remote attackers to inject arbitrary web script or HTML via the invitaion_code parameter in a pie-register page to the default URI."
reference: reference:
- https://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html - https://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html
- https://nvd.nist.gov/vuln/detail/CVE-2015-7377 - https://nvd.nist.gov/vuln/detail/CVE-2015-7377
classification:
cve-id: CVE-2015-7377
tags: cve,cve2015,wordpress,wp-plugin,xss tags: cve,cve2015,wordpress,wp-plugin,xss
description: "Cross-site scripting (XSS) vulnerability in pie-register/pie-register.php in the Pie Register plugin before 2.0.19 for WordPress allows remote attackers to inject arbitrary web script or HTML via the invitaion_code parameter in a pie-register page to the default URI."
requests: requests:
- method: GET - method: GET

View File

@ -8,6 +8,8 @@ info:
- https://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html - https://packetstormsecurity.com/files/133981/Kentico-CMS-8.2-Cross-Site-Scripting-Open-Redirect.html
- https://nvd.nist.gov/vuln/detail/CVE-2015-7823 - https://nvd.nist.gov/vuln/detail/CVE-2015-7823
severity: low severity: low
classification:
cve-id: CVE-2015-7823
tags: cve,cve2015,kentico,redirect tags: cve,cve2015,kentico,redirect
requests: requests:

View File

@ -1,46 +1,42 @@
id: CVE-2017-5487 id: CVE-2017-5487
info: info:
name: WordPress Core < 4.7.1 - Username Enumeration name: WordPress Core < 4.7.1 - Username Enumeration
author: Manas_Harsh,daffainfo,geeknik author: Manas_Harsh,daffainfo,geeknik
severity: medium severity: medium
description: wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. description: "WordPress Core < 4.7.1 is susceptible to user enumeration because it does not properly restrict listings of post authors via wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request."
tags: cve,cve2017,wordpress
reference: reference:
- https://nvd.nist.gov/vuln/detail/CVE-2017-5487
- https://www.exploit-db.com/exploits/41497 - https://www.exploit-db.com/exploits/41497
- https://nvd.nist.gov/vuln/detail/CVE-2017-5487
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.30 cvss-score: 5.30
cve-id: CVE-2017-5487 cve-id: CVE-2017-5487
cwe-id: CWE-200 cwe-id: CWE-200
tags: cve,cve2017,wordpress
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/wp-json/wp/v2/users/" - "{{BaseURL}}/wp-json/wp/v2/users/"
- "{{BaseURL}}/?rest_route=/wp/v2/users/" - "{{BaseURL}}/?rest_route=/wp/v2/users/"
stop-at-first-match: true stop-at-first-match: true
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: status - type: status
status: status:
- 200 - 200
- type: word - type: word
part: header part: header
words: words:
- "application/json" - "application/json"
- type: word - type: word
words: words:
- '"id":' - '"id":'
- '"name":' - '"name":'
- '"avatar_urls":' - '"avatar_urls":'
condition: and condition: and
extractors: extractors:
- type: json - type: json
json: json:
- '.[].name' - '.[].name'
# Enahnced by mp 03/31/2022

View File

@ -8,6 +8,8 @@ info:
reference: reference:
- https://www.vpnmentor.com/blog/critical-vulnerability-found-majority-lg-nas-devices/ - https://www.vpnmentor.com/blog/critical-vulnerability-found-majority-lg-nas-devices/
- https://medium.com/@0x616163/lg-n1a1-unauthenticated-remote-command-injection-cve-2018-14839-9d2cf760e247 - https://medium.com/@0x616163/lg-n1a1-unauthenticated-remote-command-injection-cve-2018-14839-9d2cf760e247
classification:
cve-id: CVE-2018-10818
tags: cve,cve2018,lg-nas,rce,oast,injection tags: cve,cve2018,lg-nas,rce,oast,injection
requests: requests:

View File

@ -1,17 +1,19 @@
id: CVE-2018-11709 id: CVE-2018-11709
info: info:
name: wpForo Forum <= 1.4.11 - Reflected Cross-Site Scripting (XSS) name: WordPress wpForo Forum <= 1.4.11 - Reflected Cross-Site Scripting
author: daffainfo author: daffainfo
severity: medium severity: medium
description: wpforo_get_request_uri in wpf-includes/functions.php in the wpForo Forum plugin before 1.4.12 for WordPress allows Unauthenticated Reflected Cross-Site Scripting (XSS) via the URI. description: WordPress wpForo Forum plugin before 1.4.12 for WordPress allows unauthenticated reflected cross-site scripting via the URI.
reference: https://nvd.nist.gov/vuln/detail/CVE-2018-11709 reference:
tags: cve,cve2018,wordpress,xss,wp-plugin - https://nvd.nist.gov/vuln/detail/CVE-2018-11709
- https://wordpress.org/plugins/wpforo/#developers
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10 cvss-score: 6.10
cve-id: CVE-2018-11709 cve-id: CVE-2018-11709
cwe-id: CWE-79 cwe-id: CWE-79
tags: cve,cve2018,wordpress,xss,wp-plugin
requests: requests:
- method: GET - method: GET
@ -33,3 +35,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/03/31

View File

@ -5,6 +5,8 @@ info:
author: madrobot author: madrobot
severity: high severity: high
description: Nuxeo Authentication Bypass Remote Code Execution < 10.3 using a SSTI description: Nuxeo Authentication Bypass Remote Code Execution < 10.3 using a SSTI
classification:
cve-id: CVE-2018-16341
tags: cve,cve2018,nuxeo,ssti,rce,bypass tags: cve,cve2018,nuxeo,ssti,rce,bypass
requests: requests:

View File

@ -1,12 +1,10 @@
id: CVE-2019-10068 id: CVE-2019-10068
info: info:
name: Kentico CMS Insecure Deserialization RCE name: Kentico CMS Insecure Deserialization Remote Code Execution
author: davidmckennirey author: davidmckennirey
severity: critical severity: critical
description: | description: Kentico CMS is susceptible to remote code execution via a .NET deserialization vulnerability.
Searches for Kentico CMS installations that are vulnerable to a .NET deserialization vulnerability that could be exploited to achieve remote command execution. Credit to Manoj Cherukuri and Justin LeMay from Aon Cyber Solutions for discovery of the vulnerability.
tags: cve,cve2019,rce,deserialization,kentico,iis
reference: reference:
- https://www.aon.com/cyber-solutions/aon_cyber_labs/unauthenticated-remote-code-execution-in-kentico-cms/ - https://www.aon.com/cyber-solutions/aon_cyber_labs/unauthenticated-remote-code-execution-in-kentico-cms/
- https://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html - https://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html
@ -17,6 +15,7 @@ info:
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-10068 cve-id: CVE-2019-10068
cwe-id: CWE-502 cwe-id: CWE-502
tags: cve,cve2019,rce,deserialization,kentico,iis
requests: requests:
- method: POST - method: POST
@ -38,3 +37,5 @@ requests:
- 'System.Web.Services.Protocols.SoapException' - 'System.Web.Services.Protocols.SoapException'
part: body part: body
condition: and condition: and
# Enhanced by mp on 2022/03/29

View File

@ -1,19 +1,20 @@
id: CVE-2019-10232 id: CVE-2019-10232
info: info:
name: Pre-authenticated SQL injection in GLPI <= 9.3.3 name: Teclib GLPI <= 9.3.3 Unauthenticated SQL Injection
author: RedTeamBrasil author: RedTeamBrasil
severity: critical severity: critical
description: Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication. description: "Teclib GLPI <= 9.3.3 exposes a script (/scripts/unlock_tasks.php) that incorrectly sanitizes user controlled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records."
reference: reference:
- https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf - https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf
- https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c - https://github.com/glpi-project/glpi/commit/684d4fc423652ec7dde21cac4d41c2df53f56b3c
tags: cve,cve2019,glpi,sqli,injection - https://nvd.nist.gov/vuln/detail/CVE-2019-10232
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-10232 cve-id: CVE-2019-10232
cwe-id: CWE-89 cwe-id: CWE-89
tags: cve,cve2019,glpi,sqli,injection
requests: requests:
- method: GET - method: GET
@ -35,3 +36,5 @@ requests:
part: body part: body
regex: regex:
- "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB" - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB"
# Enhanced by mp on 2022/03/29

View File

@ -1,20 +1,21 @@
id: CVE-2019-10758 id: CVE-2019-10758
info: info:
name: Mongo-Express Remote Code Execution - CVE-2019-10758 name: mongo-express Remote Code Execution
author: princechaddha author: princechaddha
severity: critical severity: critical
description: mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment. description: "mongo-express before 0.54.0 is vulnerable to remote code execution via endpoints that uses the `toBSON` method and misuse the `vm` dependency to perform `exec` commands in a non-safe environment."
reference: reference:
- https://github.com/vulhub/vulhub/tree/master/mongo-express/CVE-2019-10758 - https://github.com/vulhub/vulhub/tree/master/mongo-express/CVE-2019-10758
- https://nvd.nist.gov/vuln/detail/CVE-2019-10758 - https://nvd.nist.gov/vuln/detail/CVE-2019-10758
remediation: This issue will be fixed by updating to the latest version of mongo-express remediation: Upgrade mongo-express to version 0.54.0 or higher.
metadata: metadata:
shodan-query: http.title:"Mongo Express" shodan-query: http.title:"Mongo Express"
tags: cve,cve2019,mongo,mongo-express
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
cvss-score: 9.90 cvss-score: 9.90
cve-id: CVE-2019-10758 cve-id: CVE-2019-10758
tags: cve,cve2019,mongo,mongo-express
requests: requests:
- raw: - raw:
@ -30,3 +31,5 @@ requests:
part: interactsh_protocol # Confirms the HTTP Interaction part: interactsh_protocol # Confirms the HTTP Interaction
words: words:
- "http" - "http"
# Enhanced by mp on 2022/03/29

View File

@ -1,17 +1,20 @@
id: CVE-2019-11510 id: CVE-2019-11510
info: info:
name: Pulse Connect Secure SSL VPN arbitrary file read vulnerability name: Pulse Connect Secure SSL VPN Arbitrary File Read
author: organiccrap author: organiccrap
severity: critical severity: critical
reference: https://blog.orange.tw/2019/09/attacking-ssl-vpn-part-3-golden-pulse-secure-rce-chain.html description: "Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 all contain an arbitrary file reading vulnerability that could allow unauthenticated remote attackers to send a specially crafted URI to gain improper access."
tags: cve,cve2019,pulsesecure,lfi reference:
- https://blog.orange.tw/2019/09/attacking-ssl-vpn-part-3-golden-pulse-secure-rce-chain.html
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/
- https://nvd.nist.gov/vuln/detail/CVE-2019-11510
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.00 cvss-score: 10.00
cve-id: CVE-2019-11510 cve-id: CVE-2019-11510
cwe-id: CWE-22 cwe-id: CWE-22
description: "In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability ." tags: cve,cve2019,pulsesecure,lfi
requests: requests:
- method: GET - method: GET
@ -26,3 +29,6 @@ requests:
regex: regex:
- "root:.*:0:0:" - "root:.*:0:0:"
part: body part: body
# Enhanced by mp on 2022/03/29

View File

@ -1,30 +1,19 @@
id: CVE-2019-11580 id: CVE-2019-11580
info: info:
name: Atlassian Crowd & Crowd Data Center - Unauthenticated RCE name: Atlassian Crowd and Crowd Data Center Unauthenticated Remote Code Execution
author: dwisiswant0 author: dwisiswant0
severity: critical severity: critical
tags: cve,cve2019,atlassian,rce description: "Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability."
description: |
Atlassian Crowd and Crowd Data Center
had the pdkinstall development plugin incorrectly enabled in release builds.
Attackers who can send unauthenticated or authenticated requests
to a Crowd or Crowd Data Center instance can exploit this vulnerability
to install arbitrary plugins, which permits remote code execution on
systems running a vulnerable version of Crowd or Crowd Data Center.
All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x),
from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),
from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x),
from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x),
and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
reference: reference:
- https://github.com/jas502n/CVE-2019-11580 - https://github.com/jas502n/CVE-2019-11580
- https://jira.atlassian.com/browse/CWD-5388 - https://jira.atlassian.com/browse/CWD-5388
- https://nvd.nist.gov/vuln/detail/CVE-2019-11580
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-11580 cve-id: CVE-2019-11580
tags: cve,cve2019,atlassian,rce
requests: requests:
- method: GET - method: GET
@ -41,3 +30,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/03/29

View File

@ -1,17 +1,20 @@
id: CVE-2019-11581 id: CVE-2019-11581
info: info:
name: Atlassian Jira template injection name: Atlassian Jira Server-Side Template Injection
description: There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability. description: Jira Server and Data Center is susceptible to a server-side template injection vulnerability via the ContactAdministrators and SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
author: ree4pwn author: ree4pwn
severity: critical severity: critical
reference: https://github.com/jas502n/CVE-2019-11581 reference:
tags: cve,cve2019,atlassian,jira,ssti,rce - https://github.com/jas502n/CVE-2019-11581
- https://jira.atlassian.com/browse/JRASERVER-69532
- https://nvd.nist.gov/vuln/detail/CVE-2019-11581
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-11581 cve-id: CVE-2019-11581
cwe-id: CWE-74 cwe-id: CWE-74
tags: cve,cve2019,atlassian,jira,ssti,rce
requests: requests:
- method: GET - method: GET
@ -45,3 +48,5 @@ requests:
- "has not yet configured this contact form" - "has not yet configured this contact form"
part: body part: body
negative: true negative: true
# Enhanced by mp on 2022/03/29

View File

@ -1,20 +1,20 @@
id: CVE-2019-12314 id: CVE-2019-12314
info: info:
name: Deltek Maconomy 2.2.5 LFIl name: Deltek Maconomy 2.2.5 Local File Inclusion
author: madrobot author: madrobot
severity: critical severity: critical
tags: cve,cve2019,lfi description: "Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI."
description: Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI.
reference: reference:
http://packetstormsecurity.com/files/153079/Deltek-Maconomy-2.2.5-Local-File-Inclusion.html - http://packetstormsecurity.com/files/153079/Deltek-Maconomy-2.2.5-Local-File-Inclusion.html
https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt - https://github.com/ras313/CVE-2019-12314/security/advisories/GHSA-8762-rf4g-23xm
https://github.com/ras313/CVE-2019-12314/security/advisories/GHSA-8762-rf4g-23xm - https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-12314 cve-id: CVE-2019-12314
cwe-id: CWE-22 cwe-id: CWE-22
tags: cve,cve2019,lfi
requests: requests:
- method: GET - method: GET
@ -29,3 +29,5 @@ requests:
regex: regex:
- "root:.*:0:0:" - "root:.*:0:0:"
part: body part: body
# Enhanced by mp on 2022/03/29

View File

@ -10,12 +10,12 @@ info:
- https://www.zeroshell.org/new-release-and-critical-vulnerability/ - https://www.zeroshell.org/new-release-and-critical-vulnerability/
- https://www.tarlogic.com/advisories/zeroshell-rce-root.txt - https://www.tarlogic.com/advisories/zeroshell-rce-root.txt
- https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2019-12725/ZeroShell-RCE-EoP.py - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2019-12725/ZeroShell-RCE-EoP.py
tags: cve,cve2019,rce,zeroshell
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-12725 cve-id: CVE-2019-12725
cwe-id: CWE-78 cwe-id: CWE-78
tags: cve,cve2019,rce,zeroshell
requests: requests:
- method: GET - method: GET
@ -33,4 +33,4 @@ requests:
regex: regex:
- "root:.*:0:0:" - "root:.*:0:0:"
# Enhanced by mp on 2022/02/04 # Enhanced by mp on 2022/03/29

View File

@ -2,19 +2,19 @@ id: CVE-2019-13101
info: info:
author: Suman_Kar author: Suman_Kar
name: D-Link DIR-600M - Authentication Bypass name: D-Link DIR-600M Authentication Bypass
description: An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page. description: D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices can be accessed directly without authentication and lead to disclosure of information about the WAN, which can then be leveraged by an attacker to modify the data fields of the page.
severity: critical severity: critical
tags: cve,cve2019,dlink,router,iot
reference: reference:
- https://nvd.nist.gov/vuln/detail/CVE-2019-13101
- https://github.com/d0x0/D-Link-DIR-600M - https://github.com/d0x0/D-Link-DIR-600M
- https://www.exploit-db.com/exploits/47250 - https://www.exploit-db.com/exploits/47250
- https://nvd.nist.gov/vuln/detail/CVE-2019-13101
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-13101 cve-id: CVE-2019-13101
cwe-id: CWE-306 cwe-id: CWE-306
tags: cve,cve2019,dlink,router,iot
requests: requests:
- raw: - raw:
@ -33,3 +33,5 @@ requests:
words: words:
- "/PPPoE/" - "/PPPoE/"
part: body part: body
# Enhanced by mp on 2022/03/29

View File

@ -4,15 +4,16 @@ info:
name: Lansweeper Unauthenticated SQL Injection name: Lansweeper Unauthenticated SQL Injection
author: divya_mudgal author: divya_mudgal
severity: critical severity: critical
reference: https://www.nccgroup.com/ae/our-research/technical-advisory-unauthenticated-sql-injection-in-lansweeper/ reference:
- https://www.nccgroup.com/ae/our-research/technical-advisory-unauthenticated-sql-injection-in-lansweeper/
- https://nvd.nist.gov/vuln/detail/CVE-2019-13462
description: Lansweeper before 7.1.117.4 allows unauthenticated SQL injection. description: Lansweeper before 7.1.117.4 allows unauthenticated SQL injection.
remediation: Upgrade to the latest version.
tags: cve,cve2019,sqli,lansweeper
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.10 cvss-score: 9.10
cve-id: CVE-2019-13462 cve-id: CVE-2019-13462
cwe-id: CWE-89 cwe-id: CWE-89
tags: cve,cve2019,sqli,lansweeper
requests: requests:
- method: GET - method: GET
@ -36,4 +37,4 @@ requests:
status: status:
- 500 - 500
# Enhanced by mp on 2022/02/04 # Enhanced by mp on 2022/03/29

View File

@ -4,14 +4,16 @@ info:
name: Webmin <= 1.920 Unauthenticated Remote Command Execution name: Webmin <= 1.920 Unauthenticated Remote Command Execution
author: bp0lr author: bp0lr
severity: critical severity: critical
description: An issue was discovered in Webmin <=1.920. The 'old' parameter in password_change.cgi contains a command injection vulnerability. description: "Webmin <=1.920. is vulnerable to an unauthenticated remote command execution via the parameter 'old' in password_change.cgi."
reference: https://pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html reference:
tags: cve,cve2019,webmin,rce - https://pentest.com.tr/exploits/DEFCON-Webmin-1920-Unauthenticated-Remote-Command-Execution.html
- https://nvd.nist.gov/vuln/detail/CVE-2019-15107
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-15107 cve-id: CVE-2019-15107
cwe-id: CWE-78 cwe-id: CWE-78
tags: cve,cve2019,webmin,rce
requests: requests:
- raw: # - raw: #
@ -29,3 +31,5 @@ requests:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0:" - "root:.*:0:0:"
# Enhanced by mp on 2022/03/29

View File

@ -1,17 +1,19 @@
id: CVE-2019-15859 id: CVE-2019-15859
info: info:
name: Socomec DIRIS Password Disclosure name: Socomec DIRIS A-40 Devices Password Disclosure
author: geeknik author: geeknik
description: Password disclosure in the web interface on socomec DIRIS A-40 devices before 48250501 allows a remote attacker to get full access to a device via the /password.jsn URI. description: "Socomec DIRIS A-40 devices before 48250501 are susceptible to a password disclosure vulnerability in the web interface that could allow remote attackers to get full access to a device via the /password.jsn URI."
reference: https://seclists.org/fulldisclosure/2019/Oct/10 reference:
- https://seclists.org/fulldisclosure/2019/Oct/10
- https://nvd.nist.gov/vuln/detail/CVE-2019-15859
severity: critical severity: critical
tags: cve,cve2019,disclosure,socomec,diris,iot
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-15859 cve-id: CVE-2019-15859
cwe-id: CWE-200 cwe-id: CWE-200
tags: cve,cve2019,disclosure,socomec,diris,iot
requests: requests:
- method: GET - method: GET
@ -33,3 +35,5 @@ requests:
- "password" - "password"
part: body part: body
condition: and condition: and
# Enhanced by mp on 2022/03/29

View File

@ -4,14 +4,17 @@ info:
author: pikpikcu author: pikpikcu
name: nostromo 1.9.6 - Remote Code Execution name: nostromo 1.9.6 - Remote Code Execution
severity: critical severity: critical
reference: https://www.exploit-db.com/raw/47837 description: "nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via directory traversal in the function http_verify."
tags: cve,cve2019,rce reference:
- https://packetstormsecurity.com/files/155802/nostromo-1.9.6-Remote-Code-Execution.html
- https://www.exploit-db.com/raw/47837
- https://nvd.nist.gov/vuln/detail/CVE-2019-16278
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-16278 cve-id: CVE-2019-16278
cwe-id: CWE-22 cwe-id: CWE-22
description: "Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via a crafted HTTP request." tags: cve,cve2019,rce
requests: requests:
- raw: - raw:
@ -27,3 +30,5 @@ requests:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0:" - "root:.*:0:0:"
# Enhanced by mp on 2022/03/29

View File

@ -1,19 +1,19 @@
id: CVE-2019-16313 id: CVE-2019-16313
info: info:
name: ifw8 Router ROM v4.31 allows credential disclosure name: ifw8 Router ROM v4.31 Credential Discovery
author: pikpikcu author: pikpikcu
severity: high severity: high
description: ifw8 Router ROM v4.31 allows credential disclosure by reading the action/usermanager.htm HTML source code. description: "ifw8 Router ROM v4.31 is vulnerable to credential disclosure via action/usermanager.htm HTML source code."
reference: reference:
- https://github.com/Mr-xn/Penetration_Testing_POC/blob/master/CVE-2019-16313%20%E8%9C%82%E7%BD%91%E4%BA%92%E8%81%94%E4%BC%81%E4%B8%9A%E7%BA%A7%E8%B7%AF%E7%94%B1%E5%99%A8v4.31%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md - https://github.com/Mr-xn/Penetration_Testing_POC/blob/master/CVE-2019-16313%20%E8%9C%82%E7%BD%91%E4%BA%92%E8%81%94%E4%BC%81%E4%B8%9A%E7%BA%A7%E8%B7%AF%E7%94%B1%E5%99%A8v4.31%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
- https://nvd.nist.gov/vuln/detail/CVE-2019-16313 - https://nvd.nist.gov/vuln/detail/CVE-2019-16313
tags: cve,cve2019,exposure,router,iot
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.50 cvss-score: 7.50
cve-id: CVE-2019-16313 cve-id: CVE-2019-16313
cwe-id: CWE-798 cwe-id: CWE-798
tags: cve,cve2019,exposure,router,iot
requests: requests:
- method: GET - method: GET
@ -37,3 +37,5 @@ requests:
group: 1 group: 1
regex: regex:
- '<td class="pwd" data="([a-z]+)">\*\*\*\*\*\*<\/td>' - '<td class="pwd" data="([a-z]+)">\*\*\*\*\*\*<\/td>'
# Enhanced by mp on 2022/03/30

View File

@ -1,17 +1,19 @@
id: CVE-2019-16662 id: CVE-2019-16662
info: info:
name: rConfig 3.9.2 - Remote Code Execution name: rConfig 3.9.2 Remote Code Execution
author: pikpikcu author: pikpikcu
severity: critical severity: critical
reference: https://shells.systems/rconfig-v3-9-2-authenticated-and-unauthenticated-rce-cve-2019-16663-and-cve-2019-16662/ description: "rConfig 3.9.2 is susceptible to a remote code execution vulnerability. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution."
tags: cve,cve2019,rce,intrusive,rconfig reference:
- https://shells.systems/rconfig-v3-9-2-authenticated-and-unauthenticated-rce-cve-2019-16663-and-cve-2019-16662/
- https://nvd.nist.gov/vuln/detail/CVE-2019-16662
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-16662 cve-id: CVE-2019-16662
cwe-id: CWE-78 cwe-id: CWE-78
description: "An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution." tags: cve,cve2019,rce,intrusive,rconfig
requests: requests:
- method: GET - method: GET
@ -26,3 +28,5 @@ requests:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0:" - "root:.*:0:0:"
# Enhanced by mp on 2022/03/29

View File

@ -1,17 +1,19 @@
id: CVE-2019-16759 id: CVE-2019-16759
info: info:
name: RCE in vBulletin v5.0.0-v5.5.4 fix bypass name: vBulletin v5.0.0-v5.5.4 Remote Command Execution
author: madrobot author: madrobot
severity: critical severity: critical
reference: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/vbulletin-remote-code-execution-cve-2020-7373/ description: "vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request."
tags: cve,cve2019,vbulletin,rce reference:
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/vbulletin-remote-code-execution-cve-2020-7373/
- https://nvd.nist.gov/vuln/detail/CVE-2019-16759
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2019-16759 cve-id: CVE-2019-16759
cwe-id: CWE-94 cwe-id: CWE-94
description: "vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request." tags: cve,cve2019,vbulletin,rce
requests: requests:
- raw: - raw:
@ -30,3 +32,5 @@ requests:
- type: word - type: word
words: words:
- "PHP Version" - "PHP Version"
# Enhanced by mp on 2022/03/29

View File

@ -7,6 +7,8 @@ info:
A vulnerability in the application data endpoints of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to gain access to sensitive information. A vulnerability in the application data endpoints of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to gain access to sensitive information.
reference: reference:
- https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-vman-traversal-hQh24tmk.html - https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-vman-traversal-hQh24tmk.html
classification:
cve-id: CVE-2020-26073
tags: cve,cve2020,cisco,lfi tags: cve,cve2020,cisco,lfi
requests: requests:

View File

@ -6,6 +6,8 @@ info:
severity: high severity: high
description: VICIdial's Web Client contains many sensitive files that can be accessed from the client side. These files contain mysqli logs, auth logs, debug information, successful and unsuccessful login attempts with their corresponding IP's, User-Agents, credentials and much more. This information can be leveraged by an attacker to gain further access to VICIdial systems. This vulnerability affects all versions as of 20/5/2021. description: VICIdial's Web Client contains many sensitive files that can be accessed from the client side. These files contain mysqli logs, auth logs, debug information, successful and unsuccessful login attempts with their corresponding IP's, User-Agents, credentials and much more. This information can be leveraged by an attacker to gain further access to VICIdial systems. This vulnerability affects all versions as of 20/5/2021.
reference: https://github.com/JHHAX/VICIdial reference: https://github.com/JHHAX/VICIdial
classification:
cve-id: CVE-2021-28854
tags: cve,cve2021 tags: cve,cve2021
requests: requests:

View File

@ -1,18 +1,18 @@
id: CVE-2021-3017 id: CVE-2021-3017
info: info:
name: Intelbras WIN 300/WRN 342 Disclosure name: Intelbras WIN 300/WRN 342 Credential Disclosure
author: pikpikcu author: pikpikcu
severity: high severity: high
description: The web interface on Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code. description: "Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code."
reference: reference:
- https://poc.wgpsec.org/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/Intelbras/Intelbras%20Wireless%20%E6%9C%AA%E6%8E%88%E6%9D%83%E4%B8%8E%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%20CVE-2021-3017.html - https://poc.wgpsec.org/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/Intelbras/Intelbras%20Wireless%20%E6%9C%AA%E6%8E%88%E6%9D%83%E4%B8%8E%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%20CVE-2021-3017.html
- https://nvd.nist.gov/vuln/detail/CVE-2021-3017 - https://nvd.nist.gov/vuln/detail/CVE-2021-3017
tags: cve,cve2021,exposure,router
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.50 cvss-score: 7.50
cve-id: CVE-2021-3017 cve-id: CVE-2021-3017
tags: cve,cve2021,exposure,router
requests: requests:
- method: GET - method: GET
@ -37,3 +37,5 @@ requests:
part: body part: body
regex: regex:
- 'def_wirelesspassword = "([A-Za-z0-9=]+)";' - 'def_wirelesspassword = "([A-Za-z0-9=]+)";'
# Enhanced by mp on 2022/03/30

View File

@ -6,6 +6,8 @@ info:
severity: high severity: high
description: A directory traversal vulnerability in Ivanti Avalanche allows remote unauthenticated user to access files that reside outside the 'image' folder description: A directory traversal vulnerability in Ivanti Avalanche allows remote unauthenticated user to access files that reside outside the 'image' folder
reference: https://ssd-disclosure.com/ssd-advisory-ivanti-avalanche-directory-traversal/ reference: https://ssd-disclosure.com/ssd-advisory-ivanti-avalanche-directory-traversal/
classification:
cve-id: CVE-2021-30497
tags: cve,cve2021,avalanche,traversal tags: cve,cve2021,avalanche,traversal
requests: requests:

View File

@ -10,6 +10,8 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2021-3285 - https://nvd.nist.gov/vuln/detail/CVE-2021-3285
metadata: metadata:
shodan-query: http.title:"erxes" shodan-query: http.title:"erxes"
classification:
cve-id: CVE-2021-32853
tags: cve,cve2021,xss,erxes,oss tags: cve,cve2021,xss,erxes,oss
requests: requests:

View File

@ -4,16 +4,17 @@ info:
name: Cartadis Gespage 8.2.1 - Directory Traversal name: Cartadis Gespage 8.2.1 - Directory Traversal
author: daffainfo author: daffainfo
severity: high severity: high
description: Cartadis Gespage through 8.2.1 allows Directory Traversal in gespage/doDownloadData and gespage/webapp/doDownloadData. description: "Cartadis Gespage through 8.2.1 allows Directory Traversal in gespage/doDownloadData and gespage/webapp/doDownloadData."
reference: reference:
- https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_gespage_-_cve-2021-33807.pdf - https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_gespage_-_cve-2021-33807.pdf
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33807 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33807
tags: cve,cve2021,lfi,gespage - https://www.gespage.com/cartadis-db/
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.50 cvss-score: 7.50
cve-id: CVE-2021-33807 cve-id: CVE-2021-33807
cwe-id: CWE-22 cwe-id: CWE-22
tags: cve,cve2021,lfi,gespage
requests: requests:
- method: GET - method: GET
@ -36,3 +37,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/03/30

View File

@ -1,18 +1,19 @@
id: CVE-2021-37573 id: CVE-2021-37573
info: info:
name: Tiny Java Web Server - Reflected XSS name: Tiny Java Web Server - Reflected Cross-Site Scripting
author: geeknik author: geeknik
severity: medium severity: medium
description: "A reflected cross-site scripting vulnerability in the web server TTiny Java Web Server and Servlet Container (TJWS) <=1.115 allows an adversary to inject malicious code on the server's \"404 Page not Found\" error page."
reference: reference:
- https://seclists.org/fulldisclosure/2021/Aug/13 - https://seclists.org/fulldisclosure/2021/Aug/13
tags: cve,cve2021,xss,tjws,java - https://nvd.nist.gov/vuln/detail/CVE-2021-37573
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10 cvss-score: 6.10
cve-id: CVE-2021-37573 cve-id: CVE-2021-37573
cwe-id: CWE-79 cwe-id: CWE-79
description: "A reflected cross-site scripting (XSS) vulnerability in the web server TTiny Java Web Server and Servlet Container (TJWS) <=1.115 allows an adversary to inject malicious code on the server's \"404 Page not Found\" error page" tags: cve,cve2021,xss,tjws,java
requests: requests:
- method: GET - method: GET
@ -34,3 +35,5 @@ requests:
part: header part: header
words: words:
- text/html - text/html
# Enhanced by mp on 2022/03/30

View File

@ -1,11 +1,10 @@
id: CVE-2021-37704 id: CVE-2021-37704
info: info:
name: phpfastcache phpinfo exposure name: phpinfo Resource Exposure
author: whoever author: whoever
severity: medium severity: medium
description: phpinfo() exposure in unprotected composer vendor folder via phpfastcache/phpfastcache. description: "phpinfo() is susceptible to resource exposure in unprotected composer vendor folders via phpfastcache/phpfastcache."
tags: cve,cve2021,exposure,phpfastcache,phpinfo
reference: reference:
https://github.com/PHPSocialNetwork/phpfastcache/pull/813 https://github.com/PHPSocialNetwork/phpfastcache/pull/813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37704 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37704
@ -14,6 +13,7 @@ info:
cvss-score: 4.30 cvss-score: 4.30
cve-id: CVE-2021-37704 cve-id: CVE-2021-37704
cwe-id: CWE-668 cwe-id: CWE-668
tags: cve,cve2021,exposure,phpfastcache,phpinfo
requests: requests:
- method: GET - method: GET
@ -39,3 +39,5 @@ requests:
group: 1 group: 1
regex: regex:
- '>PHP Version <\/td><td class="v">([0-9.]+)' - '>PHP Version <\/td><td class="v">([0-9.]+)'
# Enhanced by mp on 2022/03/30

View File

@ -10,6 +10,8 @@ info:
- https://tanzu.vmware.com/security/cve-2022-22963 - https://tanzu.vmware.com/security/cve-2022-22963
- https://nsfocusglobal.com/spring-cloud-function-spel-expression-injection-vulnerability-alert/ - https://nsfocusglobal.com/spring-cloud-function-spel-expression-injection-vulnerability-alert/
- https://github.com/vulhub/vulhub/tree/scf-spel/spring/spring-cloud-function-spel-injection - https://github.com/vulhub/vulhub/tree/scf-spel/spring/spring-cloud-function-spel-injection
classification:
cve-id: CVE-2022-22963
tags: cve,cve2022,springcloud,rce tags: cve,cve2022,springcloud,rce
requests: requests:

View File

@ -4,17 +4,18 @@ info:
name: Cisco Smart Install Endpoints Exposure name: Cisco Smart Install Endpoints Exposure
author: dwisiswant0 author: dwisiswant0
severity: info severity: info
description: | description: Cisco Smart Install endpoints were discovered. Exposure of SMI to untrusted networks could allow complete compromise of the switch.
This template attempts & supports the detection part only by
connecting to the specified Cisco Smart Install port and determines
if it speaks the Smart Install Protocol. Exposure of SMI to
untrusted networks can allow complete compromise of the switch.
reference: reference:
- https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html - https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html
- https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature - https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature
- https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi - https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi
- https://github.com/Cisco-Talos/smi_check/blob/master/smi_check.py#L52-L53 - https://github.com/Cisco-Talos/smi_check/blob/master/smi_check.py#L52-L53
- https://github.com/Sab0tag3d/SIET - https://github.com/Sab0tag3d/SIET
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id:
cwe-id: CWE-200
tags: network,cisco,smi,exposure tags: network,cisco,smi,exposure
network: network:
@ -31,3 +32,5 @@ network:
encoding: hex encoding: hex
words: words:
- "000000040000000000000003000000080000000100000000" - "000000040000000000000003000000080000000100000000"
# Enhanced by mp on 2022/03/30

View File

@ -3,17 +3,18 @@ id: oracle-siebel-xss
info: info:
name: Oracle Siebel Loyalty 8.1 - Cross-Site Scripting name: Oracle Siebel Loyalty 8.1 - Cross-Site Scripting
author: dhiyaneshDK author: dhiyaneshDK
severity: medium severity: high
description: A vulnerability in Oracle Siebel Loyalty allows remote unauthenticated attackers to inject arbitrary Javascript code into the responses returned by the '/loyalty_enu/start.swe/' endpoint. description: "A vulnerability in Oracle Siebel Loyalty allows remote unauthenticated attackers to inject arbitrary Javascript code into the responses returned by the '/loyalty_enu/start.swe/' endpoint."
remediation: Upgrade to Siebel Loyalty version 8.2 or later. remediation: Upgrade to Siebel Loyalty version 8.2 or later.
reference: reference:
- https://packetstormsecurity.com/files/86721/Oracle-Siebel-Loyalty-8.1-Cross-Site-Scripting.html - https://packetstormsecurity.com/files/86721/Oracle-Siebel-Loyalty-8.1-Cross-Site-Scripting.html
- https://exploit-db.com/exploits/47762 - https://exploit-db.com/exploits/47762
tags: xss,oracle - https://docs.oracle.com/cd/E95904_01/books/Secur/siebel-security-hardening.html
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2 cvss-score: 7.2
cwe-id: CWE-79 cwe-id: CWE-79
tags: xss,oracle,siebel
requests: requests:
- method: GET - method: GET
@ -35,4 +36,4 @@ requests:
status: status:
- 200 - 200
# Enhanced by cs on 2022/02/28 # Enhanced by mp on 2022/03/30

View File

@ -1,12 +1,17 @@
id: antsword-backdoor id: antsword-backdoor
info: info:
name: Antsword backdook name: Antsword Backdoor Identified
author: ffffffff0x author: ffffffff0x
severity: critical severity: critical
description: 蚁剑「绕过 disable_functions」插件生成的 shell description: The Antsword application contains a backdoor shell.
remediation: Reinstall Anstsword on a new system due to the target system's compromise. Follow best practices for securing PHP servers/applications via the php.ini and other mechanisms.
reference: https://github.com/AntSwordProject/AntSword-Labs/tree/master/bypass_disable_functions/9 reference: https://github.com/AntSwordProject/AntSword-Labs/tree/master/bypass_disable_functions/9
tags: backdoor,antsword tags: backdoor,antsword
classification:
cwe-id: CWE-553
cvss-score: 10.0
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
requests: requests:
- method: POST - method: POST
@ -26,3 +31,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by cs 2022/03/31

View File

@ -1,15 +1,20 @@
id: microweber-xss id: microweber-xss
info: info:
name: Microweber XSS name: Microweber Cross-Site Scripting
author: gy741 author: gy741
severity: medium severity: high
description: Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11. description: "Microweber prior to 1.2.11 is susceptible to reflected cross-site Scripting via Packagist microweber/microweber."
reference: reference:
- https://github.com/microweber/microweber/issues/809 - https://github.com/microweber/microweber/issues/809
- https://github.com/microweber/microweber - https://github.com/microweber/microweber
metadata: metadata:
shodan-query: 'http.favicon.hash:780351152' shodan-query: 'http.favicon.hash:780351152'
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cve-id:
cwe-id: CWE-79
tags: microweber,xss,oss tags: microweber,xss,oss
requests: requests:
@ -32,3 +37,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/03/30

View File

@ -26,3 +26,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/03/31

View File

@ -1,10 +1,17 @@
id: simple-crm-sql-injection id: simple-crm-sql-injection
info: info:
name: Simple CRM 3.0 - 'email' SQL injection & Authentication Bypass name: Simple CRM 3.0 SQL Injection and Authentication Bypass
author: geeknik author: geeknik
severity: high severity: high
reference: https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt description: Simple CRM 3.0 is susceptible to SQL injection and authentication bypass vulnerabilities.
reference:
- https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cve-id:
cwe-id: CWE-89
tags: sqli,simplecrm,auth-bypass,injection tags: sqli,simplecrm,auth-bypass,injection
requests: requests:
@ -28,3 +35,5 @@ requests:
words: words:
- "text/html" - "text/html"
part: header part: header
# Enhanced by mp on 2022/03/30

View File

@ -1,11 +1,17 @@
id: hide-security-enhancer-lfi id: hide-security-enhancer-lfi
info: info:
name: WP Hide Security Enhancer 1.3.9.2 - Arbitrary File Download Vulnerability name: WordPress Hide Security Enhancer 1.3.9.2 Local File Inclusion
author: dhiyaneshDK author: dhiyaneshDK
severity: high severity: high
description: WP Hide Security Enhancer version 1.3.9.2 or less is victim of an Arbitrary File Download vulnerability. This allows any visitor to download any file in our installation description: WordPress Hide Security Enhancer version 1.3.9.2 or less is susceptible to a local file inclusion vulnerability which could allow malicious visitors to download any file in the installation.
remediation: Upgrade to version 1.4 or later.
reference: https://secupress.me/blog/arbitrary-file-download-vulnerability-in-wp-hide-security-enhancer-1-3-9-2/ reference: https://secupress.me/blog/arbitrary-file-download-vulnerability-in-wp-hide-security-enhancer-1-3-9-2/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cve-id:
cwe-id: CWE-22
tags: wordpress,wp-plugin,lfi,wp tags: wordpress,wp-plugin,lfi,wp
requests: requests:
@ -25,3 +31,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/03/29

View File

@ -1,11 +1,18 @@
id: issuu-panel-lfi id: issuu-panel-lfi
info: info:
name: Wordpress Plugin Issuu Panel - RFI & LFI name: Wordpress Plugin Issuu Panel Remote/Local File Inclusion
author: 0x_Akoko author: 0x_Akoko
severity: high severity: high
description: The WordPress Issuu Plugin includes an arbitrary file disclosure vulnerability that allows unauthenticated attackers to disclose the content of local and remote files. description: The WordPress Issuu Plugin includes an arbitrary file disclosure vulnerability that allows unauthenticated attackers to disclose the content of local and remote files.
reference: https://cxsecurity.com/issue/WLB-2016030131 reference:
- https://cxsecurity.com/issue/WLB-2016030131
- https://wordpress.org/plugins/issuu-panel/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cve-id:
cwe-id: CWE-22
tags: wp-plugin,wordpress,lfi,rfi tags: wp-plugin,wordpress,lfi,rfi
requests: requests:
@ -23,3 +30,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/03/29