clean-up
parent
39041648fb
commit
807920c0ac
|
@ -5,7 +5,7 @@ info:
|
|||
author: daffainfo
|
||||
severity: medium
|
||||
reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094
|
||||
tags: cve,2014,wordpress,xss,wp-plugin
|
||||
tags: cve,cve2014,wordpress,xss,wp-plugin
|
||||
description: "Multiple cross-site scripting (XSS) vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter."
|
||||
|
||||
requests:
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: pikpikcu
|
||||
severity: high
|
||||
description: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
|
||||
tags: cve,cves2016,netgear,rce,iot
|
||||
tags: cve,cve2016,netgear,rce,iot
|
||||
reference:
|
||||
- https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2016-6277
|
||||
|
|
|
@ -8,7 +8,7 @@ info:
|
|||
reference:
|
||||
- https://github.com/0xUhaw/CVE-Bins/tree/master/KindEditor
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2019-7543
|
||||
tags: cves,cve2019,kindeditor,xss
|
||||
tags: cve,cve2019,kindeditor,xss
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 6.10
|
||||
|
|
|
@ -8,7 +8,7 @@ info:
|
|||
reference:
|
||||
- https://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2020-28351
|
||||
tags: cves,cve2020,shoretel,xss
|
||||
tags: cve,cve2020,shoretel,xss
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 6.10
|
||||
|
|
|
@ -8,7 +8,7 @@ info:
|
|||
reference:
|
||||
- https://github.com/maxsite/cms/issues/414#issue-726249183
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-35265
|
||||
tags: cves,cve2021,maxsite,xss
|
||||
tags: cve,cve2021,maxsite,xss
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 6.10
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
id: micro-focus-ucmdb-default-credentials
|
||||
id: ucmdb-default-login
|
||||
|
||||
info:
|
||||
name: Micro Focus UCMDB Default Credentials
|
|
@ -1,4 +1,4 @@
|
|||
id: adobe-aem-default-credentials
|
||||
id: aem-default-login
|
||||
|
||||
info:
|
||||
name: Adobe AEM Default Credentials
|
|
@ -1,7 +1,7 @@
|
|||
id: alibaba-canal-default-password
|
||||
id: canal-default-login
|
||||
|
||||
info:
|
||||
name: Alibaba Canal Default Password
|
||||
name: Alibaba Canal Default Credentials
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: alibaba,default-login
|
|
@ -1,6 +1,6 @@
|
|||
id: tomcat-manager-default
|
||||
id: tomcat-default-login
|
||||
info:
|
||||
name: tomcat-manager-default-password
|
||||
name: Tomcat Manager Default Credentials
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: tomcat,apache,default-login
|
|
@ -1,7 +1,7 @@
|
|||
id: arl-default-password
|
||||
id: arl-default-login
|
||||
|
||||
info:
|
||||
name: ARL Default Password
|
||||
name: ARL Default Credentials
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
tags: arl,default-login
|
|
@ -1,4 +1,4 @@
|
|||
id: azkaban-web-client-default-creds
|
||||
id: azkaban-default-login
|
||||
|
||||
info:
|
||||
name: Azkaban Web Client Default Credential
|
|
@ -1,4 +1,4 @@
|
|||
id: chinaunicom-modem-default-credentials
|
||||
id: chinaunicom-default-login
|
||||
|
||||
info:
|
||||
name: Chinaunicom Modem Default Credentials
|
|
@ -1,7 +1,7 @@
|
|||
id: druid-default-password
|
||||
id: druid-default-login
|
||||
|
||||
info:
|
||||
name: Druid Default Password
|
||||
name: Druid Default Credentials
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
tags: druid,default-login
|
|
@ -1,6 +1,6 @@
|
|||
id: dvwa-default-login
|
||||
info:
|
||||
name: DVWA Default Login
|
||||
name: DVWA Default Credentials
|
||||
author: pdteam
|
||||
severity: critical
|
||||
tags: dvwa,default-login
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: exacqvision-default-credentials
|
||||
id: exacqvision-default-login
|
||||
|
||||
info:
|
||||
name: ExacqVision Default Password
|
||||
name: ExacqVision Default Credentials
|
||||
author: ELSFA7110
|
||||
severity: high
|
||||
tags: exacqvision,default-login
|
|
@ -1,4 +1,4 @@
|
|||
id: flir-default-credentials
|
||||
id: flir-default-login
|
||||
|
||||
info:
|
||||
name: Flir Default Credentials
|
|
@ -1,6 +1,6 @@
|
|||
id: glpi-default-credentials
|
||||
id: glpi-default-login
|
||||
info:
|
||||
name: GLPI Default Credentials Check
|
||||
name: GLPI Default Credentials
|
||||
author: andysvints
|
||||
severity: high
|
||||
tags: glpi,default-login
|
|
@ -1,6 +1,6 @@
|
|||
id: grafana-default-credential
|
||||
id: grafana-default-login
|
||||
info:
|
||||
name: Grafana Default Credentials Check
|
||||
name: Grafana Default Credentials
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: grafana,default-login
|
|
@ -1,4 +1,4 @@
|
|||
id: hortonworks-smartsense-default-credentials
|
||||
id: smartsense-default-login
|
||||
|
||||
info:
|
||||
name: HortonWorks SmartSense Default Credentials
|
|
@ -1,7 +1,7 @@
|
|||
id: ibm-storage-default-credential
|
||||
id: ibm-storage-default-login
|
||||
|
||||
info:
|
||||
name: IBM Storage Management default creds
|
||||
name: IBM Storage Management Default Credentials
|
||||
author: madrobot
|
||||
severity: medium
|
||||
tags: default-login,ibm
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
id: idemia-biometrics-default-credentials
|
||||
id: idemia-biometrics-default-login
|
||||
|
||||
info:
|
||||
name: IDEMIA BIOMetrics Default Credentials
|
|
@ -1,7 +1,7 @@
|
|||
id: iptime-default-login
|
||||
|
||||
info:
|
||||
name: ipTIME Default Login
|
||||
name: ipTIME Default Credentials
|
||||
author: gy741
|
||||
severity: high
|
||||
tags: iptime,default-login
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: minio-default-password
|
||||
id: minio-default-login
|
||||
|
||||
info:
|
||||
name: Minio Default Password
|
||||
name: Minio Default Credentials
|
||||
author: pikpikcu
|
||||
severity: medium
|
||||
tags: default-login,minio
|
|
@ -1,6 +1,6 @@
|
|||
id: nagios-default-credentials
|
||||
id: nagios-default-login
|
||||
info:
|
||||
name: Nagios Default Credentials Check
|
||||
name: Nagios Default Credentials
|
||||
author: iamthefrogy
|
||||
severity: high
|
||||
tags: nagios,default-login
|
|
@ -1,7 +1,7 @@
|
|||
id: nexus-default-password
|
||||
id: nexus-default-login
|
||||
|
||||
info:
|
||||
name: Nexus Default Password
|
||||
name: Nexus Default Credentials
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
tags: nexus,default-login
|
|
@ -1,7 +1,7 @@
|
|||
id: nps-default-password
|
||||
id: nps-default-login
|
||||
|
||||
info:
|
||||
name: NPS Default Password
|
||||
name: NPS Default Credentials
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
tags: nps,default-login
|
|
@ -1,4 +1,4 @@
|
|||
id: oracle-business-intelligence-default-credentials
|
||||
id: oracle-business-intelligence-login
|
||||
|
||||
info:
|
||||
name: Oracle Business Intelligence Default Credentials
|
|
@ -1,4 +1,4 @@
|
|||
id: panos-default-credentials
|
||||
id: panos-default-login
|
||||
|
||||
info:
|
||||
name: Palo Alto Networks PAN-OS Default Credentials
|
|
@ -1,7 +1,7 @@
|
|||
id: panabit-gateway-defalut-password
|
||||
id: panabit-default-login
|
||||
|
||||
info:
|
||||
name: Panabit Default Password
|
||||
name: Panabit Gateway Default Credentials
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
reference: https://max.book118.com/html/2017/0623/117514590.shtm
|
|
@ -1,7 +1,7 @@
|
|||
id: rabbitmq-default-admin
|
||||
id: rabbitmq-default-login
|
||||
|
||||
info:
|
||||
name: RabbitMQ Default Credentials
|
||||
name: RabbitMQ admin Default Credentials
|
||||
author: fyoorer,dwisiswant0
|
||||
severity: high
|
||||
tags: rabbitmq,default-login
|
|
@ -1,4 +1,4 @@
|
|||
id: rockmongo-default-credentials
|
||||
id: rockmongo-default-login
|
||||
|
||||
info:
|
||||
name: Rockmongo Default Credentials
|
|
@ -1,4 +1,4 @@
|
|||
id: samsung-wlan-ap-default-credentials
|
||||
id: samsung-wlan-default-login
|
||||
|
||||
info:
|
||||
name: Samsung Wlan AP (WEA453e) Default Credentials
|
|
@ -1,7 +1,7 @@
|
|||
id: showdoc-default-password
|
||||
id: showdoc-default-login
|
||||
|
||||
info:
|
||||
name: Showdoc Default Password
|
||||
name: Showdoc Default Credentials
|
||||
author: pikpikcu
|
||||
severity: medium
|
||||
reference:
|
|
@ -1,7 +1,7 @@
|
|||
id: spectracom-default-credential
|
||||
id: spectracom-default-login
|
||||
|
||||
info:
|
||||
name: Spectracom Default creds
|
||||
name: Spectracom Default Credentials
|
||||
author: madrobot
|
||||
severity: medium
|
||||
tags: spectracom,default-login
|
|
@ -1,7 +1,7 @@
|
|||
id: szhe-default-password
|
||||
id: szhe-default-login
|
||||
|
||||
info:
|
||||
name: Szhe Default Password
|
||||
name: Szhe Default Credentials
|
||||
author: pikpikcu
|
||||
severity: low
|
||||
tags: szhe,default-login
|
|
@ -1,7 +1,7 @@
|
|||
id: wifisky-default-password
|
||||
id: wifisky-default-login
|
||||
|
||||
info:
|
||||
name: Wifisky Default Password
|
||||
name: Wifisky Default Credentials
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
tags: default-login,wifisky
|
|
@ -1,7 +1,7 @@
|
|||
id: wso2-management-console-default-password
|
||||
id: wso2-default-login
|
||||
|
||||
info:
|
||||
name: WSO2 Management Console Default Password
|
||||
name: WSO2 Management Console Default Credentials
|
||||
author: cocxanh
|
||||
severity: high
|
||||
reference: https://docs.wso2.com/display/UES100/Accessing+the+Management+Console
|
|
@ -1,7 +1,7 @@
|
|||
id: xxljob-default-login
|
||||
|
||||
info:
|
||||
name: XXL-JOB default login
|
||||
name: XXL-JOB Default Credentials
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: default-login,xxljob
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
id: zmanda-default-credential
|
||||
id: zmanda-default-login
|
||||
|
||||
info:
|
||||
name: Zmanda Default Credentials
|
|
@ -1,4 +1,4 @@
|
|||
id: dell-wyse-management-suite-login
|
||||
id: dell-wyse-login
|
||||
|
||||
info:
|
||||
name: Dell Wyse Management Suite Login Panel
|
|
@ -1,7 +1,7 @@
|
|||
id: epson-unauthorized-access-detect
|
||||
id: epson-access-detect
|
||||
|
||||
info:
|
||||
name: Epson Printer
|
||||
name: Epson Printer Unauthorized Access Detect
|
||||
author: pussycat0x
|
||||
severity: medium
|
||||
reference: https://www.exploit-db.com/ghdb/6922
|
|
@ -1,16 +0,0 @@
|
|||
id: exposed-pagespeed-global-admin
|
||||
|
||||
info:
|
||||
name: Apache PageSpeed Global Admin Dashboard Exposure
|
||||
author: pdteam
|
||||
severity: medium
|
||||
tags: panel
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}/pagespeed_admin/'
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "<b>Pagespeed Admin</b>"
|
|
@ -1,4 +1,4 @@
|
|||
id: iomega-lenovo-emc-shared-nas
|
||||
id: iomega-emc-shared-nas
|
||||
|
||||
info:
|
||||
name: Iomega Lenovo EMC with shared NAS
|
|
@ -1,16 +0,0 @@
|
|||
id: manage-engine-admanager-panel
|
||||
|
||||
info:
|
||||
name: Manage Engine ADManager Panel
|
||||
author: PR3R00T
|
||||
severity: info
|
||||
tags: panel
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/authorization.do"
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "<title>ManageEngine - ADManager Plus</title>"
|
|
@ -1,4 +1,4 @@
|
|||
id: microsoft-exchange-control-panel
|
||||
id: microsoft-exchange-panel
|
||||
|
||||
info:
|
||||
name: Microsoft Exchange Control Panel
|
|
@ -1,4 +1,4 @@
|
|||
id: landfill-remote-monitoring-control
|
||||
id: scs-landfill-control
|
||||
|
||||
info:
|
||||
name: SCS Landfill Remote Monitoring Control
|
|
@ -1,4 +1,4 @@
|
|||
id: weave-scope-dashboard-detect
|
||||
id: weave-scope-dashboard
|
||||
|
||||
info:
|
||||
name: Weave Scope Dashboard
|
|
@ -1,4 +1,4 @@
|
|||
id: workspaceone-uem-airwatch-dashboard-detect
|
||||
id: workspaceone-uem-dashboard
|
||||
|
||||
info:
|
||||
name: Workspace ONE Unified Endpoint Management (UEM) AirWatch
|
|
@ -1,16 +1,17 @@
|
|||
id: zoho-manageengine-adaudit
|
||||
id: manageengine-adaudit
|
||||
|
||||
info:
|
||||
name: ZOHO-ManageEngine-ADAudit
|
||||
author: dhiyaneshDK
|
||||
name: ZOHO ManageEngine ADAudit/ADManager Panel
|
||||
author: dhiyaneshDK,PR3R00T
|
||||
severity: info
|
||||
reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+-+ADManager+Plus%22
|
||||
tags: panel,zoho
|
||||
tags: panel,zoho,manageengine
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}'
|
||||
- "{{BaseURL}}/authorization.do"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
|
@ -1,11 +1,11 @@
|
|||
id: zoho-manageengine-adselfservice-plus
|
||||
id: manageengine-adselfservice
|
||||
|
||||
info:
|
||||
name: ZOHO-ManageEngine-ADSelfService Plus
|
||||
name: ZOHO ManageEngine ADSelfService Plus
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
reference: https://www.shodan.io/search?query=http.title%3A%22ADSelfService+Plus%22
|
||||
tags: panel,zoho
|
||||
tags: panel,zoho,manageengine
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,11 +1,11 @@
|
|||
id: zoho-manageengine-analyticsplus
|
||||
id: manageengine-analytics
|
||||
|
||||
info:
|
||||
name: ZOHO-ManageEngine-Analytics Plus
|
||||
name: ZOHO ManageEngine Analytics Plus
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLea1gemHj%2BeuoeeQhiI%3D
|
||||
tags: panel,zoho
|
||||
tags: panel,zoho,manageengine
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,11 +1,11 @@
|
|||
id: zoho-manageengine-apex-helpdesk
|
||||
id: manageengine-apex-helpdesk
|
||||
|
||||
info:
|
||||
name: ZOHO-ManageEngine-APEX-IT-Help-Desk
|
||||
name: ZOHO ManageEngine APEX IT Help-Desk
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
reference: https://www.shodan.io/search?query=http.title%3A%22APEX+IT+Help+Desk%22
|
||||
tags: panel,zoho
|
||||
tags: panel,zoho,manageengine
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,11 +1,11 @@
|
|||
id: zoho-manageengine-applications-manager
|
||||
id: manageengine-applications-manager
|
||||
|
||||
info:
|
||||
name: ZOHO-ManageEngine-Applications-Manager
|
||||
name: ZOHO ManageEngine Applications Manager
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLU1hbmFnZUVuZ2luZS1BcHBsaWNhdGlvbnMtTWFuYWdlciI%3D
|
||||
tags: panel,zoho
|
||||
tags: panel,zoho,manageengine
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,11 +1,11 @@
|
|||
id: zoho-manageengine-assetexplorer
|
||||
id: manageengine-assetexplorer
|
||||
|
||||
info:
|
||||
name: ZOHO-ManageEngine-AssetExplorer
|
||||
name: ZOHO ManageEngine AssetExplorer
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+AssetExplorer%22
|
||||
tags: panel,zoho
|
||||
tags: panel,zoho,manageengine
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,11 +1,11 @@
|
|||
id: zoho-manageengine-desktop
|
||||
id: manageengine-desktop
|
||||
|
||||
info:
|
||||
name: ZOHO-ManageEngine-Desktop
|
||||
name: ZOHO ManageEngine Desktop
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+Desktop+Central+10%22
|
||||
tags: panel,zoho
|
||||
tags: panel,zoho,manageengine
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,11 +1,11 @@
|
|||
id: zoho-manageengine-opmanager
|
||||
id: manageengine-opmanager
|
||||
|
||||
info:
|
||||
name: ZOHO-ManageEngine-OpManager
|
||||
name: ZOHO ManageEngine OpManager
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
reference: https://www.shodan.io/search?query=http.title%3A%22OpManager+Plus%22
|
||||
tags: panel,zoho
|
||||
tags: panel,zoho,manageengine
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,11 +1,11 @@
|
|||
id: zoho-manageengine-servicedesk
|
||||
id: manageengine-servicedesk
|
||||
|
||||
info:
|
||||
name: ZOHO-ManageEngine-ServiceDesk
|
||||
name: ZOHO ManageEngine ServiceDesk
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+ServiceDesk+Plus%22
|
||||
tags: panel,zoho
|
||||
tags: panel,zoho,manageengine
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,11 +1,11 @@
|
|||
id: zoho-manageengine-supportcenter
|
||||
id: manageengine-supportcenter
|
||||
|
||||
info:
|
||||
name: ZOHO-ManageEngine-SupportCenter
|
||||
name: ZOHO ManageEngine SupportCenter
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+SupportCenter+Plus%22
|
||||
tags: panel,zoho
|
||||
tags: panel,zoho,manageengine
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,4 +1,4 @@
|
|||
id: amazon-docker-config-disclosure
|
||||
id: amazon-docker-config
|
||||
|
||||
info:
|
||||
name: Dockerrun AWS Configuration Exposure
|
|
@ -1,4 +1,4 @@
|
|||
id: kyan-network-credential-exposure
|
||||
id: kyan-credential-exposure
|
||||
|
||||
info:
|
||||
name: Kyan network monitoring device account and password exposure
|
|
@ -1,4 +1,4 @@
|
|||
id: oracle-ebs-credentials-disclosure
|
||||
id: oracle-ebs-credentials
|
||||
|
||||
info:
|
||||
name: Oracle EBS Credentials Disclosure
|
|
@ -1,4 +1,4 @@
|
|||
id: ruijie-nbr1300g-cli-password-leak
|
||||
id: ruijie-nbr1300g-exposure
|
||||
|
||||
info:
|
||||
name: Ruijie NBR1300G Cli Password Leak
|
|
@ -1,4 +1,4 @@
|
|||
id: ruby-on-rails-secret-token-disclosure
|
||||
id: rails-secret-token-disclosure
|
||||
|
||||
info:
|
||||
name: Ruby on Rails Secret Token Disclosure
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: vavkamil
|
||||
severity: info
|
||||
description: Template to detect 403 forbidden endpoint bypass behind Nginx/Apache proxy & load balancers, based on X-Forwarded-For header.
|
||||
tags: xff,bypass,fuzz
|
||||
tags: fuzz
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
id: brother-unauthorized-access-detect
|
||||
id: brother-unauthorized-access
|
||||
|
||||
info:
|
||||
name: Brother Printer
|
||||
author: pussycat0x
|
||||
severity: medium
|
||||
reference: https://www.exploit-db.com/ghdb/6889
|
||||
tags: iot,printer
|
||||
tags: iot,printer,unauth
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: dhiyaneshDk
|
||||
severity: medium
|
||||
reference: https://www.exploit-db.com/ghdb/6487
|
||||
tags: iot
|
||||
tags: iot,camera,panasonic
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,8 +4,7 @@ info:
|
|||
name: Gitlab User enumeration
|
||||
author: pikpikcu
|
||||
severity: info
|
||||
tags: gitlab,enum
|
||||
|
||||
tags: gitlab,enumeration
|
||||
|
||||
requests:
|
||||
- method: POST
|
||||
|
|
Loading…
Reference in New Issue