patch-1
Prince Chaddha 2021-09-21 17:16:53 +05:30
parent 39041648fb
commit 807920c0ac
91 changed files with 108 additions and 140 deletions

View File

@ -5,7 +5,7 @@ info:
author: daffainfo
severity: medium
reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094
tags: cve,2014,wordpress,xss,wp-plugin
tags: cve,cve2014,wordpress,xss,wp-plugin
description: "Multiple cross-site scripting (XSS) vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter."
requests:

View File

@ -5,7 +5,7 @@ info:
author: pikpikcu
severity: high
description: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
tags: cve,cves2016,netgear,rce,iot
tags: cve,cve2016,netgear,rce,iot
reference:
- https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/
- https://nvd.nist.gov/vuln/detail/CVE-2016-6277

View File

@ -8,7 +8,7 @@ info:
reference:
- https://github.com/0xUhaw/CVE-Bins/tree/master/KindEditor
- https://nvd.nist.gov/vuln/detail/CVE-2019-7543
tags: cves,cve2019,kindeditor,xss
tags: cve,cve2019,kindeditor,xss
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10

View File

@ -8,7 +8,7 @@ info:
reference:
- https://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html
- https://nvd.nist.gov/vuln/detail/CVE-2020-28351
tags: cves,cve2020,shoretel,xss
tags: cve,cve2020,shoretel,xss
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10

View File

@ -8,7 +8,7 @@ info:
reference:
- https://github.com/maxsite/cms/issues/414#issue-726249183
- https://nvd.nist.gov/vuln/detail/CVE-2021-35265
tags: cves,cve2021,maxsite,xss
tags: cve,cve2021,maxsite,xss
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10

View File

@ -1,4 +1,4 @@
id: micro-focus-ucmdb-default-credentials
id: ucmdb-default-login
info:
name: Micro Focus UCMDB Default Credentials

View File

@ -1,4 +1,4 @@
id: adobe-aem-default-credentials
id: aem-default-login
info:
name: Adobe AEM Default Credentials

View File

@ -1,7 +1,7 @@
id: alibaba-canal-default-password
id: canal-default-login
info:
name: Alibaba Canal Default Password
name: Alibaba Canal Default Credentials
author: pdteam
severity: high
tags: alibaba,default-login

View File

@ -1,6 +1,6 @@
id: tomcat-manager-default
id: tomcat-default-login
info:
name: tomcat-manager-default-password
name: Tomcat Manager Default Credentials
author: pdteam
severity: high
tags: tomcat,apache,default-login

View File

@ -1,7 +1,7 @@
id: arl-default-password
id: arl-default-login
info:
name: ARL Default Password
name: ARL Default Credentials
author: pikpikcu
severity: high
tags: arl,default-login

View File

@ -1,4 +1,4 @@
id: azkaban-web-client-default-creds
id: azkaban-default-login
info:
name: Azkaban Web Client Default Credential

View File

@ -1,4 +1,4 @@
id: chinaunicom-modem-default-credentials
id: chinaunicom-default-login
info:
name: Chinaunicom Modem Default Credentials

View File

@ -1,7 +1,7 @@
id: druid-default-password
id: druid-default-login
info:
name: Druid Default Password
name: Druid Default Credentials
author: pikpikcu
severity: high
tags: druid,default-login

View File

@ -1,6 +1,6 @@
id: dvwa-default-login
info:
name: DVWA Default Login
name: DVWA Default Credentials
author: pdteam
severity: critical
tags: dvwa,default-login

View File

@ -1,7 +1,7 @@
id: exacqvision-default-credentials
id: exacqvision-default-login
info:
name: ExacqVision Default Password
name: ExacqVision Default Credentials
author: ELSFA7110
severity: high
tags: exacqvision,default-login

View File

@ -1,4 +1,4 @@
id: flir-default-credentials
id: flir-default-login
info:
name: Flir Default Credentials

View File

@ -1,6 +1,6 @@
id: glpi-default-credentials
id: glpi-default-login
info:
name: GLPI Default Credentials Check
name: GLPI Default Credentials
author: andysvints
severity: high
tags: glpi,default-login

View File

@ -1,6 +1,6 @@
id: grafana-default-credential
id: grafana-default-login
info:
name: Grafana Default Credentials Check
name: Grafana Default Credentials
author: pdteam
severity: high
tags: grafana,default-login

View File

@ -1,4 +1,4 @@
id: hortonworks-smartsense-default-credentials
id: smartsense-default-login
info:
name: HortonWorks SmartSense Default Credentials

View File

@ -1,7 +1,7 @@
id: ibm-storage-default-credential
id: ibm-storage-default-login
info:
name: IBM Storage Management default creds
name: IBM Storage Management Default Credentials
author: madrobot
severity: medium
tags: default-login,ibm

View File

@ -1,4 +1,4 @@
id: idemia-biometrics-default-credentials
id: idemia-biometrics-default-login
info:
name: IDEMIA BIOMetrics Default Credentials

View File

@ -1,7 +1,7 @@
id: iptime-default-login
info:
name: ipTIME Default Login
name: ipTIME Default Credentials
author: gy741
severity: high
tags: iptime,default-login

View File

@ -1,7 +1,7 @@
id: minio-default-password
id: minio-default-login
info:
name: Minio Default Password
name: Minio Default Credentials
author: pikpikcu
severity: medium
tags: default-login,minio

View File

@ -1,6 +1,6 @@
id: nagios-default-credentials
id: nagios-default-login
info:
name: Nagios Default Credentials Check
name: Nagios Default Credentials
author: iamthefrogy
severity: high
tags: nagios,default-login

View File

@ -1,7 +1,7 @@
id: nexus-default-password
id: nexus-default-login
info:
name: Nexus Default Password
name: Nexus Default Credentials
author: pikpikcu
severity: high
tags: nexus,default-login

View File

@ -1,7 +1,7 @@
id: nps-default-password
id: nps-default-login
info:
name: NPS Default Password
name: NPS Default Credentials
author: pikpikcu
severity: high
tags: nps,default-login

View File

@ -1,4 +1,4 @@
id: oracle-business-intelligence-default-credentials
id: oracle-business-intelligence-login
info:
name: Oracle Business Intelligence Default Credentials

View File

@ -1,4 +1,4 @@
id: panos-default-credentials
id: panos-default-login
info:
name: Palo Alto Networks PAN-OS Default Credentials

View File

@ -1,7 +1,7 @@
id: panabit-gateway-defalut-password
id: panabit-default-login
info:
name: Panabit Default Password
name: Panabit Gateway Default Credentials
author: pikpikcu
severity: high
reference: https://max.book118.com/html/2017/0623/117514590.shtm

View File

@ -1,7 +1,7 @@
id: rabbitmq-default-admin
id: rabbitmq-default-login
info:
name: RabbitMQ Default Credentials
name: RabbitMQ admin Default Credentials
author: fyoorer,dwisiswant0
severity: high
tags: rabbitmq,default-login

View File

@ -1,4 +1,4 @@
id: rockmongo-default-credentials
id: rockmongo-default-login
info:
name: Rockmongo Default Credentials

View File

@ -1,4 +1,4 @@
id: samsung-wlan-ap-default-credentials
id: samsung-wlan-default-login
info:
name: Samsung Wlan AP (WEA453e) Default Credentials

View File

@ -1,7 +1,7 @@
id: showdoc-default-password
id: showdoc-default-login
info:
name: Showdoc Default Password
name: Showdoc Default Credentials
author: pikpikcu
severity: medium
reference:

View File

@ -1,7 +1,7 @@
id: spectracom-default-credential
id: spectracom-default-login
info:
name: Spectracom Default creds
name: Spectracom Default Credentials
author: madrobot
severity: medium
tags: spectracom,default-login

View File

@ -1,7 +1,7 @@
id: szhe-default-password
id: szhe-default-login
info:
name: Szhe Default Password
name: Szhe Default Credentials
author: pikpikcu
severity: low
tags: szhe,default-login

View File

@ -1,7 +1,7 @@
id: wifisky-default-password
id: wifisky-default-login
info:
name: Wifisky Default Password
name: Wifisky Default Credentials
author: pikpikcu
severity: high
tags: default-login,wifisky

View File

@ -1,7 +1,7 @@
id: wso2-management-console-default-password
id: wso2-default-login
info:
name: WSO2 Management Console Default Password
name: WSO2 Management Console Default Credentials
author: cocxanh
severity: high
reference: https://docs.wso2.com/display/UES100/Accessing+the+Management+Console

View File

@ -1,7 +1,7 @@
id: xxljob-default-login
info:
name: XXL-JOB default login
name: XXL-JOB Default Credentials
author: pdteam
severity: high
tags: default-login,xxljob

View File

@ -1,4 +1,4 @@
id: zmanda-default-credential
id: zmanda-default-login
info:
name: Zmanda Default Credentials

View File

@ -1,4 +1,4 @@
id: dell-wyse-management-suite-login
id: dell-wyse-login
info:
name: Dell Wyse Management Suite Login Panel

View File

@ -1,7 +1,7 @@
id: epson-unauthorized-access-detect
id: epson-access-detect
info:
name: Epson Printer
name: Epson Printer Unauthorized Access Detect
author: pussycat0x
severity: medium
reference: https://www.exploit-db.com/ghdb/6922

View File

@ -1,16 +0,0 @@
id: exposed-pagespeed-global-admin
info:
name: Apache PageSpeed Global Admin Dashboard Exposure
author: pdteam
severity: medium
tags: panel
requests:
- method: GET
path:
- '{{BaseURL}}/pagespeed_admin/'
matchers:
- type: word
words:
- "<b>Pagespeed Admin</b>"

View File

@ -1,4 +1,4 @@
id: iomega-lenovo-emc-shared-nas
id: iomega-emc-shared-nas
info:
name: Iomega Lenovo EMC with shared NAS

View File

@ -1,16 +0,0 @@
id: manage-engine-admanager-panel
info:
name: Manage Engine ADManager Panel
author: PR3R00T
severity: info
tags: panel
requests:
- method: GET
path:
- "{{BaseURL}}/authorization.do"
matchers:
- type: word
words:
- "<title>ManageEngine - ADManager Plus</title>"

View File

@ -1,4 +1,4 @@
id: microsoft-exchange-control-panel
id: microsoft-exchange-panel
info:
name: Microsoft Exchange Control Panel

View File

@ -1,4 +1,4 @@
id: landfill-remote-monitoring-control
id: scs-landfill-control
info:
name: SCS Landfill Remote Monitoring Control

View File

@ -1,4 +1,4 @@
id: weave-scope-dashboard-detect
id: weave-scope-dashboard
info:
name: Weave Scope Dashboard

View File

@ -1,4 +1,4 @@
id: workspaceone-uem-airwatch-dashboard-detect
id: workspaceone-uem-dashboard
info:
name: Workspace ONE Unified Endpoint Management (UEM) AirWatch

View File

@ -1,16 +1,17 @@
id: zoho-manageengine-adaudit
id: manageengine-adaudit
info:
name: ZOHO-ManageEngine-ADAudit
author: dhiyaneshDK
name: ZOHO ManageEngine ADAudit/ADManager Panel
author: dhiyaneshDK,PR3R00T
severity: info
reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+-+ADManager+Plus%22
tags: panel,zoho
tags: panel,zoho,manageengine
requests:
- method: GET
path:
- '{{BaseURL}}'
- "{{BaseURL}}/authorization.do"
matchers-condition: and
matchers:

View File

@ -1,11 +1,11 @@
id: zoho-manageengine-adselfservice-plus
id: manageengine-adselfservice
info:
name: ZOHO-ManageEngine-ADSelfService Plus
name: ZOHO ManageEngine ADSelfService Plus
author: dhiyaneshDK
severity: info
reference: https://www.shodan.io/search?query=http.title%3A%22ADSelfService+Plus%22
tags: panel,zoho
tags: panel,zoho,manageengine
requests:
- method: GET

View File

@ -1,11 +1,11 @@
id: zoho-manageengine-analyticsplus
id: manageengine-analytics
info:
name: ZOHO-ManageEngine-Analytics Plus
name: ZOHO ManageEngine Analytics Plus
author: dhiyaneshDK
severity: info
reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLea1gemHj%2BeuoeeQhiI%3D
tags: panel,zoho
tags: panel,zoho,manageengine
requests:
- method: GET

View File

@ -1,11 +1,11 @@
id: zoho-manageengine-apex-helpdesk
id: manageengine-apex-helpdesk
info:
name: ZOHO-ManageEngine-APEX-IT-Help-Desk
name: ZOHO ManageEngine APEX IT Help-Desk
author: dhiyaneshDK
severity: info
reference: https://www.shodan.io/search?query=http.title%3A%22APEX+IT+Help+Desk%22
tags: panel,zoho
tags: panel,zoho,manageengine
requests:
- method: GET

View File

@ -1,11 +1,11 @@
id: zoho-manageengine-applications-manager
id: manageengine-applications-manager
info:
name: ZOHO-ManageEngine-Applications-Manager
name: ZOHO ManageEngine Applications Manager
author: dhiyaneshDK
severity: info
reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLU1hbmFnZUVuZ2luZS1BcHBsaWNhdGlvbnMtTWFuYWdlciI%3D
tags: panel,zoho
tags: panel,zoho,manageengine
requests:
- method: GET

View File

@ -1,11 +1,11 @@
id: zoho-manageengine-assetexplorer
id: manageengine-assetexplorer
info:
name: ZOHO-ManageEngine-AssetExplorer
name: ZOHO ManageEngine AssetExplorer
author: dhiyaneshDK
severity: info
reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+AssetExplorer%22
tags: panel,zoho
tags: panel,zoho,manageengine
requests:
- method: GET

View File

@ -1,11 +1,11 @@
id: zoho-manageengine-desktop
id: manageengine-desktop
info:
name: ZOHO-ManageEngine-Desktop
name: ZOHO ManageEngine Desktop
author: dhiyaneshDK
severity: info
reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+Desktop+Central+10%22
tags: panel,zoho
tags: panel,zoho,manageengine
requests:
- method: GET

View File

@ -1,11 +1,11 @@
id: zoho-manageengine-opmanager
id: manageengine-opmanager
info:
name: ZOHO-ManageEngine-OpManager
name: ZOHO ManageEngine OpManager
author: dhiyaneshDK
severity: info
reference: https://www.shodan.io/search?query=http.title%3A%22OpManager+Plus%22
tags: panel,zoho
tags: panel,zoho,manageengine
requests:
- method: GET

View File

@ -1,11 +1,11 @@
id: zoho-manageengine-servicedesk
id: manageengine-servicedesk
info:
name: ZOHO-ManageEngine-ServiceDesk
name: ZOHO ManageEngine ServiceDesk
author: dhiyaneshDK
severity: info
reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+ServiceDesk+Plus%22
tags: panel,zoho
tags: panel,zoho,manageengine
requests:
- method: GET

View File

@ -1,11 +1,11 @@
id: zoho-manageengine-supportcenter
id: manageengine-supportcenter
info:
name: ZOHO-ManageEngine-SupportCenter
name: ZOHO ManageEngine SupportCenter
author: dhiyaneshDK
severity: info
reference: https://www.shodan.io/search?query=http.title%3A%22ManageEngine+SupportCenter+Plus%22
tags: panel,zoho
tags: panel,zoho,manageengine
requests:
- method: GET

View File

@ -1,4 +1,4 @@
id: amazon-docker-config-disclosure
id: amazon-docker-config
info:
name: Dockerrun AWS Configuration Exposure

View File

@ -1,4 +1,4 @@
id: kyan-network-credential-exposure
id: kyan-credential-exposure
info:
name: Kyan network monitoring device account and password exposure

View File

@ -1,4 +1,4 @@
id: oracle-ebs-credentials-disclosure
id: oracle-ebs-credentials
info:
name: Oracle EBS Credentials Disclosure

View File

@ -1,4 +1,4 @@
id: ruijie-nbr1300g-cli-password-leak
id: ruijie-nbr1300g-exposure
info:
name: Ruijie NBR1300G Cli Password Leak

View File

@ -1,4 +1,4 @@
id: ruby-on-rails-secret-token-disclosure
id: rails-secret-token-disclosure
info:
name: Ruby on Rails Secret Token Disclosure

View File

@ -5,7 +5,7 @@ info:
author: vavkamil
severity: info
description: Template to detect 403 forbidden endpoint bypass behind Nginx/Apache proxy & load balancers, based on X-Forwarded-For header.
tags: xff,bypass,fuzz
tags: fuzz
requests:
- raw:

View File

@ -1,11 +1,11 @@
id: brother-unauthorized-access-detect
id: brother-unauthorized-access
info:
name: Brother Printer
author: pussycat0x
severity: medium
reference: https://www.exploit-db.com/ghdb/6889
tags: iot,printer
tags: iot,printer,unauth
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: dhiyaneshDk
severity: medium
reference: https://www.exploit-db.com/ghdb/6487
tags: iot
tags: iot,camera,panasonic
requests:
- method: GET

View File

@ -4,8 +4,7 @@ info:
name: Gitlab User enumeration
author: pikpikcu
severity: info
tags: gitlab,enum
tags: gitlab,enumeration
requests:
- method: POST