Updated author names
parent
9d7ab618b8
commit
83ce809e8d
|
@ -2,7 +2,7 @@ id: CVE-2013-2251
|
|||
|
||||
info:
|
||||
name: Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution
|
||||
author: exploitation & @dwisiswant0
|
||||
author: exploitation,dwisiswant0
|
||||
severity: critical
|
||||
description: In Struts 2 before 2.3.15.1 the information following "action:", "redirect:" or "redirectAction:" is not properly sanitized. Since said information will be evaluated as OGNL expression against the value stack, this introduces the possibility to inject server side code.
|
||||
reference: http://struts.apache.org/release/2.3.x/docs/s2-016.html
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2017-14849
|
|||
|
||||
info:
|
||||
name: Node.js 8.5.0 >=< 8.6.0 Directory Traversal
|
||||
author: Random-Robbie
|
||||
author: Random_Robbie
|
||||
severity: high
|
||||
description: Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to ".." handling was incompatible with the pathname validation used by unspecified community modules.
|
||||
tags: cve,cve2017,nodejs,lfi
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
id: CVE-2017-5638
|
||||
info:
|
||||
author: Random Robbie
|
||||
author: Random_Robbie
|
||||
name: Apache Struts2 RCE
|
||||
severity: critical
|
||||
description: Struts is vulnerable to remote command injection attacks through incorrectly parsing an attacker’s invalid Content-Type HTTP header. The Struts vulnerability allows these commands to be executed under the privileges of the Web server.
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2017-7269
|
|||
|
||||
info:
|
||||
name: Windows Server 2003 & IIS 6.0 RCE
|
||||
author: thomas_from_offensity & @geeknik
|
||||
author: thomas_from_offensity,geeknik
|
||||
severity: critical
|
||||
description: Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If <http://" in a PROPFIND request.
|
||||
reference:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2017-7615
|
|||
|
||||
info:
|
||||
name: CVE-2017-7615
|
||||
author: bp0lr & dwisiswant0
|
||||
author: bp0lr,dwisiswant0
|
||||
severity: high
|
||||
description: MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php.
|
||||
tags: cve,cve2017,mantisbt
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2017-9841
|
|||
|
||||
info:
|
||||
name: CVE-2017-9841
|
||||
author: Random-Robbie
|
||||
author: Random_Robbie
|
||||
severity: high
|
||||
description: Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI
|
||||
tags: cve,cve2017,php,phpunit,rce
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2018-1000129
|
|||
|
||||
info:
|
||||
name: Jolokia XSS
|
||||
author: mavericknerd @0h1in9e
|
||||
author: mavericknerd,0h1in9e
|
||||
severity: high
|
||||
description: An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.
|
||||
tags: cve,cve2018,jolokia,xss
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2018-1000861
|
|||
|
||||
info:
|
||||
name: Jenkins 2.138 Remote Command Execution
|
||||
author: dhiyaneshDK & @pikpikcu
|
||||
author: dhiyaneshDK,pikpikcu
|
||||
severity: critical
|
||||
reference: https://github.com/vulhub/vulhub/tree/master/jenkins/CVE-2018-1000861
|
||||
tags: cve,cve2018,jenkin,rce
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2018-11409
|
|||
|
||||
info:
|
||||
name: Splunk Sensitive Information Disclosure
|
||||
author: Harsh Bothra
|
||||
author: harshbothra_
|
||||
severity: medium
|
||||
reference: https://nvd.nist.gov/vuln/detail/CVE-2018-11409
|
||||
tags: cve,cve2018,splunk
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2018-11759
|
|||
|
||||
info:
|
||||
name: Apache Tomcat JK Status Manager Access
|
||||
author: Harsh Bothra
|
||||
author: harshbothra_
|
||||
severity: medium
|
||||
reference: https://github.com/immunIT/CVE-2018-11759
|
||||
tags: cve,cve2018,apache
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2018-19439
|
|||
|
||||
info:
|
||||
name: Cross Site Scripting in Oracle Secure Global Desktop Administration Console
|
||||
author: madrobot & dwisiswant0
|
||||
author: madrobot,dwisiswant0
|
||||
severity: high
|
||||
description: XSS exists in the Administration Console in Oracle Secure Global Desktop 4.4 20080807152602 (but was fixed in later versions including 5.4)
|
||||
tags: cve,cve2018,oracle,xss
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2018-20824
|
|||
|
||||
info:
|
||||
name: Atlassian Jira WallboardServlet XSS
|
||||
author: madrobot & dwisiswant0
|
||||
author: madrobot,dwisiswant0
|
||||
severity: medium
|
||||
description: The WallboardServlet resource in Jira before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the cyclePeriod parameter.
|
||||
tags: cve,cve2018,atlassian,jira,xss
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-15858
|
|||
|
||||
info:
|
||||
name: Unauthenticated Woody Ad Snippets WordPress Plugin RCE
|
||||
author: dwisiswant0 & fmunozs & patralos
|
||||
author: dwisiswant0,fmunozs,patralos
|
||||
severity: high
|
||||
description: |
|
||||
This template supports the detection part only. See references.
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-17382
|
|||
|
||||
info:
|
||||
name: Zabbix Authentication Bypass
|
||||
author: Harsh Bothra
|
||||
author: harshbothra_
|
||||
severity: critical
|
||||
description: An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.
|
||||
reference: https://www.exploit-db.com/exploits/47467
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2019-17558
|
||||
info:
|
||||
name: Apache Solr 8.3.0 - Remote Code Execution via Velocity Template
|
||||
author: pikpikcu & madrobot
|
||||
author: pikpikcu,madrobot
|
||||
severity: critical
|
||||
refrense: https://nvd.nist.gov/vuln/detail/CVE-2019-17558
|
||||
tags: cve,cve2019,apache,rce,solr
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-19985
|
|||
|
||||
info:
|
||||
name: WordPress Plugin Email Subscribers & Newsletters 4.2.2 - Unauthenticated File Download
|
||||
author: KBA@SOGETI_ESEC, madrobot & dwisiswant0
|
||||
author: KBA@SOGETI_ESEC,madrobot,dwisiswant0
|
||||
severity: medium
|
||||
description: The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure.
|
||||
refrense: https://www.exploit-db.com/exploits/48698
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
id: CVE-2019-3396
|
||||
info:
|
||||
author: Harsh Bothra
|
||||
author: harshbothra_
|
||||
name: Atlassian Confluence Path Traversal
|
||||
severity: high
|
||||
description: The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-8449
|
|||
|
||||
info:
|
||||
name: JIRA Unauthenticated Sensitive Information Disclosure
|
||||
author: Harsh Bothra
|
||||
author: harshbothra_
|
||||
severity: medium
|
||||
description: The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability.
|
||||
reference: |
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-9978
|
|||
|
||||
info:
|
||||
name: WordPress social-warfare RFI
|
||||
author: madrobot & dwisiswant0
|
||||
author: madrobot,dwisiswant0
|
||||
severity: critical
|
||||
description: The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.
|
||||
reference: https://github.com/mpgn/CVE-2019-9978
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-12720
|
|||
|
||||
info:
|
||||
name: CVE-2020-12720 vBulletin SQLI
|
||||
author: pdnuclei - projectdiscovery.io
|
||||
author: pdteam
|
||||
severity: critical
|
||||
description: vBulletin before 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1 has incorrect access control.
|
||||
reference: https://github.com/rekter0/exploits/tree/master/CVE-2020-12720
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-5284
|
|||
|
||||
info:
|
||||
name: Next.js .next/ limited path traversal
|
||||
author: Harsh & Rahul & dwisiswant0
|
||||
author: rootxharsh,iamnoooob,dwisiswant0
|
||||
severity: medium
|
||||
description: Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
|
||||
tags: cve,cve2020,nextjs,lfi
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-5405
|
|||
|
||||
info:
|
||||
name: Spring Cloud Directory Traversal
|
||||
author: Harsh Bothra
|
||||
author: harshbothra_
|
||||
severity: high
|
||||
description: Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
|
||||
reference: https://pivotal.io/security/cve-2020-5405
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-5902
|
|||
|
||||
info:
|
||||
name: F5 BIG-IP TMUI RCE
|
||||
author: madrobot & dwisiswant0 & ringo
|
||||
author: madrobot,dwisiswant0,ringo
|
||||
severity: high
|
||||
description: In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
|
||||
reference: |
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-8115
|
|||
|
||||
info:
|
||||
name: Revive Adserver XSS
|
||||
author: madrobot & dwisiswant0
|
||||
author: madrobot,dwisiswant0
|
||||
severity: medium
|
||||
description: |
|
||||
A reflected XSS vulnerability has been discovered in the publicly accessible afr.php delivery script of Revive Adserver <= 5.0.3 by Jacopo Tediosi. There are currently no known exploits: the session identifier cannot be accessed as it is stored in an http-only cookie as of v3.2.2. On older versions, however, under specific circumstances, it could be possible to steal the session identifier and gain access to the admin interface. The query string sent to the www/delivery/afr.php script was printed back without proper escaping in a JavaScript context, allowing an attacker to execute arbitrary JS code on the browser of the victim.
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-8512
|
|||
|
||||
info:
|
||||
name: IceWarp WebMail XSS
|
||||
author: pdnuclei & dwisiswant0
|
||||
author: pdteam,dwisiswant0
|
||||
severity: medium
|
||||
description: In IceWarp Webmail Server through 11.4.4.1, there is XSS in the /webmail/ color parameter.
|
||||
reference: |
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2021-22986
|
||||
info:
|
||||
name: F5 BIG-IP iControl REST unauthenticated RCE
|
||||
author: Harsh Jaiswal (@rootxharsh) & Rahul Maini (@iamnoooob)
|
||||
author: rootxharsh,iamnoooob
|
||||
severity: critical
|
||||
tags: bigip,cve,cve2021,rce
|
||||
description: The iControl REST interface has an unauthenticated remote command execution vulnerability.
|
||||
|
|
|
@ -2,7 +2,7 @@ id: rabbitmq-default-admin
|
|||
|
||||
info:
|
||||
name: RabbitMQ Default Credentials
|
||||
author: fyoorer & dwisiswant0
|
||||
author: fyoorer,dwisiswant0
|
||||
severity: high
|
||||
tags: rabbitmq,default-login
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: dead-host-with-cname
|
|||
|
||||
info:
|
||||
name: dead-host-with-cname
|
||||
author: pdnuclei - projectdiscovery.io
|
||||
author: pdteam
|
||||
severity: info
|
||||
tags: dns
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: adminer-panel
|
||||
info:
|
||||
name: Adminer Login panel
|
||||
author: random-robbie & meme-lord
|
||||
author: random_robbie,meme-lord
|
||||
severity: info
|
||||
reference: https://blog.sorcery.ie/posts/adminer/
|
||||
tags: panel
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: jmx-console
|
||||
info:
|
||||
name: JMX Console
|
||||
author: Yash Anand @yashanand155
|
||||
author: yashanand155
|
||||
severity: low
|
||||
tags: panel
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: joomla-panel
|
|||
|
||||
info:
|
||||
name: Joomla Panel
|
||||
author: github.com/its0x08
|
||||
author: its0x08
|
||||
severity: info
|
||||
tags: panel
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: mobileiron-login
|
|||
|
||||
info:
|
||||
name: MobileIron Login
|
||||
author: dhiyaneshDK & @dwisiswant0
|
||||
author: dhiyaneshDK,dwisiswant0
|
||||
Severity: info
|
||||
tags: panel
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: open-stack-dashboard-login
|
|||
|
||||
info:
|
||||
name: OpenStack Dashboard
|
||||
author: dhiyaneshDK & hackergautam
|
||||
author: dhiyaneshDK,hackergautam
|
||||
severity: info
|
||||
reference: https://www.exploit-db.com/ghdb/6464
|
||||
tags: panel,openstack
|
||||
|
|
|
@ -2,7 +2,7 @@ id: public-tomcat-manager
|
|||
|
||||
info:
|
||||
name: tomcat manager disclosure
|
||||
author: Ahmed Sherif & geeknik
|
||||
author: Ahmed Sherif,geeknik
|
||||
severity: info
|
||||
tags: panel
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: traefik-dashboard-detect
|
|||
|
||||
info:
|
||||
name: Traefik Dashboard
|
||||
author: schniggie & StreetOfHackerR007
|
||||
author: schniggie,StreetOfHackerR007
|
||||
severity: info
|
||||
tags: panel
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: webeditors
|
|||
|
||||
info:
|
||||
name: Web Editors
|
||||
author: pwnmachine
|
||||
author: princechaddha
|
||||
severity: info
|
||||
tags: panel
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: wadl-api
|
|||
|
||||
info:
|
||||
name: wadl file disclosure
|
||||
author: 0xrudra & manuelbua
|
||||
author: 0xrudra,manuelbua
|
||||
severity: info
|
||||
tags: exposure,api
|
||||
reference: |
|
||||
|
|
|
@ -2,7 +2,7 @@ id: default-sql-dump
|
|||
|
||||
info:
|
||||
name: MySQL Dump Files
|
||||
author: geeknik & @dwisiswant0
|
||||
author: geeknik,dwisiswant0
|
||||
severity: medium
|
||||
tags: exposure,backup
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: zip-backup-files
|
|||
|
||||
info:
|
||||
name: Compressed Web File
|
||||
author: Toufik Airane & @dwisiswant0
|
||||
author: Toufik Airane,dwisiswant0
|
||||
severity: medium
|
||||
tags: exposure,backup
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: docker-compose-config
|
|||
|
||||
info:
|
||||
name: docker-compose.yml exposure
|
||||
author: meme-lord & blckraven & geeknik
|
||||
author: meme-lord,blckraven,geeknik
|
||||
severity: medium
|
||||
tags: config,exposure,devops
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: exposed-svn
|
|||
|
||||
info:
|
||||
name: Exposed SVN Directory
|
||||
author: udit_thakkur & dwisiswant0
|
||||
author: udit_thakkur,dwisiswant0
|
||||
severity: medium
|
||||
tags: config,exposure,svn
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: git-config
|
|||
|
||||
info:
|
||||
name: Git Config Disclosure
|
||||
author: pdteam & pikpikcu
|
||||
author: pdteam,pikpikcu
|
||||
severity: medium
|
||||
description: Searches for the pattern /.git/config on passed URLs.
|
||||
tags: config,git,exposure
|
||||
|
|
|
@ -2,7 +2,7 @@ id: laravel-env
|
|||
|
||||
info:
|
||||
name: Laravel .env file accessible
|
||||
author: pxmme1337 & dwisiswant0 & geeknik & emenalf
|
||||
author: pxmme1337,dwisiswant0,geeknik,emenalf
|
||||
severity: critical
|
||||
description: Laravel uses the .env file to store sensitive information like database credentials and tokens. It should not be publicly accessible.
|
||||
reference: https://laravel.com/docs/master/configuration#environment-configuration
|
||||
|
|
|
@ -2,7 +2,7 @@ id: package-json
|
|||
|
||||
info:
|
||||
name: npm package.json disclosure
|
||||
author: geeknik & afaq
|
||||
author: geeknik,afaq
|
||||
severity: info
|
||||
description: All npm packages contain a file, usually in the project root, called package.json - this file holds various metadata relevant to the project.
|
||||
tags: config,exposure
|
||||
|
|
|
@ -2,7 +2,7 @@ id: phpinfo-files
|
|||
|
||||
info:
|
||||
name: phpinfo Disclosure
|
||||
author: pdteam & daffainfo & meme-lord
|
||||
author: pdteam,daffainfo,meme-lord
|
||||
severity: low
|
||||
tags: config,exposure
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: rails-database-config
|
|||
|
||||
info:
|
||||
name: Ruby-on-Rails Database Configuration Exposure
|
||||
author: pdteam & geeknik
|
||||
author: pdteam,geeknik
|
||||
severity: low
|
||||
tags: config,exposure,rails
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: error-logs
|
||||
info:
|
||||
name: common error log files
|
||||
author: geeknik & daffainfo
|
||||
author: geeknik,daffainfo
|
||||
severity: low
|
||||
tags: logs,exposure
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: laravel-log-file
|
|||
|
||||
info:
|
||||
name: Laravel log file publicly accessible
|
||||
author: sheikhrishad & geeknik
|
||||
author: sheikhrishad,geeknik
|
||||
severity: high
|
||||
description: The log file of this Laravel web app might reveal details on the inner workings of the app, possibly even tokens, credentials or personal information.
|
||||
reference: https://laravel.com/docs/master/logging
|
||||
|
|
|
@ -2,7 +2,7 @@ id: generic-tokens
|
|||
|
||||
info:
|
||||
name: Generic Tokens
|
||||
author: nadino & geeknik
|
||||
author: nadino,geeknik
|
||||
severity: info
|
||||
tags: exposure,token
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: fcm-server-key
|
|||
|
||||
info:
|
||||
name: FCM Server Key
|
||||
author: Abss (@absshax)
|
||||
author: absshax
|
||||
severity: high
|
||||
tags: exposure,token,google
|
||||
reference: https://abss.me/posts/fcm-takeover
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: adminer-panel-fuzz
|
||||
info:
|
||||
name: Adminer Login Panel Fuzz
|
||||
author: random-robbie & meme-lord
|
||||
author: random_robbie,meme-lord
|
||||
severity: info
|
||||
reference: https://blog.sorcery.ie/posts/adminer/
|
||||
tags: fuzz,adminer
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: generic-lfi-fuzzing
|
||||
info:
|
||||
name: Generic LFI Test
|
||||
author: geeknik & unstabl3
|
||||
author: geeknik,unstabl3
|
||||
severity: high
|
||||
description: A generic test for Local File Inclusion
|
||||
tags: fuzz,lfi
|
||||
|
|
|
@ -2,7 +2,7 @@ id: dir-listing
|
|||
|
||||
info:
|
||||
name: Directory listing enabled
|
||||
author: _harleo & pentest_swissky
|
||||
author: _harleo,pentest_swissky
|
||||
severity: info
|
||||
tags: misc
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: aem-groovyconsole
|
|||
|
||||
info:
|
||||
name: AEM Groovy console enabled
|
||||
author: twitter.com/Dheerajmadhukar
|
||||
author: Dheerajmadhukar
|
||||
severity: critical
|
||||
description: Groovy console is exposed, RCE is possible.
|
||||
reference: https://hackerone.com/reports/672243
|
||||
|
|
|
@ -2,7 +2,7 @@ id: django-debug
|
|||
|
||||
info:
|
||||
name: Django Debug Method Enabled
|
||||
author: dhiyaneshDK & hackergautam
|
||||
author: dhiyaneshDK,hackergautam
|
||||
severity: medium
|
||||
tags: django,debug
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: druid-monitor
|
||||
info:
|
||||
name: Druid Monitor Unauthorized Access
|
||||
author: 0h1in9e @ohlinge
|
||||
author: ohlinge
|
||||
severity: high
|
||||
tags: druid,unauth
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: exposed-docker-api
|
|||
|
||||
info:
|
||||
name: Exposed Docker API
|
||||
author: furkansenan & dwisiswant0
|
||||
author: furkansenan,dwisiswant0
|
||||
severity: info
|
||||
tags: docker,unauth,devops
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: front-page-misconfig
|
|||
|
||||
info:
|
||||
name: FrontPage configuration information discloure
|
||||
author: JTeles & pikpikcu
|
||||
author: JTeles,pikpikcu
|
||||
severity: info
|
||||
reference: https://docs.microsoft.com/en-us/archive/blogs/fabdulwahab/security-protecting-sharepoint-server-applications
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: java-melody-exposed
|
|||
|
||||
info:
|
||||
name: JavaMelody Monitoring Exposed
|
||||
author: dhiyaneshDK & thomas_from_offensity
|
||||
author: dhiyaneshDK,thomas_from_offensity
|
||||
severity: medium
|
||||
description: JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to “View http sessions”. This can be used by an attacker to steal a user’s session.
|
||||
reference: |
|
||||
|
|
|
@ -2,7 +2,7 @@ id: kubernetes-pods-api
|
|||
|
||||
info:
|
||||
name: Kubernetes Pods API
|
||||
author: ilovebinbash & geeknik & 0xtavian
|
||||
author: ilovebinbash,geeknik,0xtavian
|
||||
severity: critical
|
||||
description: When the service port is available, anyone can execute commands inside the container. See https://github.com/officialhocc/Kubernetes-Kubelet-RCE for inspiration.
|
||||
reference: https://blog.binaryedge.io/2018/12/06/kubernetes-being-hijacked-worldwide/
|
||||
|
|
|
@ -2,7 +2,7 @@ id: server-status-localhost
|
|||
|
||||
info:
|
||||
name: Server Status Disclosure
|
||||
author: pdteam & geeknik
|
||||
author: pdteam,geeknik
|
||||
severity: low
|
||||
tags: apache,debug
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: shell-history
|
|||
|
||||
info:
|
||||
name: Shell History
|
||||
author: pentest_swissky & geeknik
|
||||
author: pentest_swissky,geeknik
|
||||
severity: low
|
||||
description: Discover history for bash, ksh, sh, and zsh
|
||||
tags: config
|
||||
|
|
|
@ -2,7 +2,7 @@ id: springboot-configprops
|
|||
|
||||
info:
|
||||
name: Detect Springboot Configprops Actuator
|
||||
author: that_juan_ & dwisiswant0 & wdahlenb
|
||||
author: that_juan_,dwisiswant0,wdahlenb
|
||||
severity: low
|
||||
description: Sensitive environment variables may not be masked
|
||||
tags: springboot,disclosure
|
||||
|
|
|
@ -2,7 +2,7 @@ id: springboot-env
|
|||
|
||||
info:
|
||||
name: Detect Springboot Env Actuator
|
||||
author: that_juan_ & dwisiswant0 & wdahlenb
|
||||
author: that_juan_,dwisiswant0,wdahlenb
|
||||
severity: low
|
||||
description: Sensitive environment variables may not be masked
|
||||
tags: springboot,disclosure
|
||||
|
|
|
@ -2,7 +2,7 @@ id: springboot-heapdump
|
|||
|
||||
info:
|
||||
name: Detect Springboot Heapdump Actuator
|
||||
author: that_juan_ & dwisiswant0 & wdahlenb
|
||||
author: that_juan_,dwisiswant0,wdahlenb
|
||||
severity: critical
|
||||
description: Environment variables and HTTP requests can be found in the HPROF
|
||||
tags: springboot,disclosure
|
||||
|
|
|
@ -2,7 +2,7 @@ id: springboot-httptrace
|
|||
|
||||
info:
|
||||
name: Detect Springboot httptrace
|
||||
author: that_juan_ & dwisiswant0 & wdahlenb
|
||||
author: that_juan_,dwisiswant0,wdahlenb
|
||||
severity: low
|
||||
description: View recent HTTP requests and responses
|
||||
tags: springboot,disclosure
|
||||
|
|
|
@ -2,7 +2,7 @@ id: springboot-loggers
|
|||
|
||||
info:
|
||||
name: Detect Springboot Loggers
|
||||
author: that_juan_ & dwisiswant0 & wdahlenb
|
||||
author: that_juan_,dwisiswant0,wdahlenb
|
||||
severity: low
|
||||
tags: springboot,disclosure
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: springboot-mappings
|
|||
|
||||
info:
|
||||
name: Detect Springboot Mappings Actuator
|
||||
author: that_juan_ & dwisiswant0 & wdahlenb
|
||||
author: that_juan_,dwisiswant0,wdahlenb
|
||||
severity: low
|
||||
description: Additional routes may be displayed
|
||||
tags: springboot,disclosure
|
||||
|
|
|
@ -2,7 +2,7 @@ id: springboot-trace
|
|||
|
||||
info:
|
||||
name: Detect Springboot Trace Actuator
|
||||
author: that_juan_ & dwisiswant0 & wdahlenb
|
||||
author: that_juan_,dwisiswant0,wdahlenb
|
||||
severity: low
|
||||
description: View recent HTTP requests and responses
|
||||
tags: springboot,disclosure
|
||||
|
|
|
@ -2,7 +2,7 @@ id: unauthenticated-nacos-access
|
|||
|
||||
info:
|
||||
name: Unauthenticated Nacos access v1.x
|
||||
author: taielab & @pikpikcu
|
||||
author: taielab,pikpikcu
|
||||
severity: critical
|
||||
issues: https://github.com/alibaba/nacos/issues/4593
|
||||
tags: nacos,unauth
|
||||
|
|
|
@ -2,7 +2,7 @@ id: unauth-ftp
|
|||
|
||||
info:
|
||||
name: FTP Anonymous Login
|
||||
author: Celesian ( @C3l3si4n )
|
||||
author: C3l3si4n
|
||||
severity: medium
|
||||
reference: https://tools.ietf.org/html/rfc2577
|
||||
tags: network,ftp
|
||||
|
|
|
@ -2,7 +2,7 @@ id: acquia-takeover
|
|||
|
||||
info:
|
||||
name: Acquia Takeover Detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: info
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: aftership-takeover
|
|||
|
||||
info:
|
||||
name: Aftership Takeover Detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: agilecrm-takeover
|
|||
|
||||
info:
|
||||
name: agilecrm takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: aha-takeover
|
|||
|
||||
info:
|
||||
name: Aha Takeover Detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: airee-takeover
|
|||
|
||||
info:
|
||||
name: Airee Takeover Detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: anima-takeover
|
|||
|
||||
info:
|
||||
name: Anima Takeover Detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: aws-bucket-takeover
|
|||
|
||||
info:
|
||||
name: AWS Bucket Takeover Detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover,aws
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: bigcartel-takeover
|
|||
|
||||
info:
|
||||
name: Bigcartel Takeover Detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: bitbucket-takeover
|
|||
|
||||
info:
|
||||
name: Bitbucket Takeover Detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: brightcove-takeover
|
|||
|
||||
info:
|
||||
name: brightcove takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: campaignmonitor-takeover
|
|||
|
||||
info:
|
||||
name: campaignmonitor takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: canny-takeover
|
|||
|
||||
info:
|
||||
name: canny takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: cargo-takeover
|
|||
|
||||
info:
|
||||
name: cargo takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: cargocollective-takeover
|
|||
|
||||
info:
|
||||
name: cargocollective takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: fastly-takeover
|
|||
|
||||
info:
|
||||
name: fastly takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: info
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/22
|
||||
|
|
|
@ -2,7 +2,7 @@ id: feedpress-takeover
|
|||
|
||||
info:
|
||||
name: Agilecrm Takeover Detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: freshdesk-takeover
|
|||
|
||||
info:
|
||||
name: freshdesk takeover detection
|
||||
author: Gal Nagli @naglinagli
|
||||
author: naglinagli
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://twitter.com/ja1sharma/status/1377239265348743175
|
||||
|
|
|
@ -2,7 +2,7 @@ id: frontify-takeover
|
|||
|
||||
info:
|
||||
name: frontify takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: gemfury-takeover
|
|||
|
||||
info:
|
||||
name: gemfury takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: getresponse-takeover
|
|||
|
||||
info:
|
||||
name: getresponse takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: ghost-takeover
|
|||
|
||||
info:
|
||||
name: ghost takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: github-takeover
|
|||
|
||||
info:
|
||||
name: github takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: hatenablog-takeover
|
|||
|
||||
info:
|
||||
name: hatenablog takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: helpjuice-takeover
|
|||
|
||||
info:
|
||||
name: helpjuice takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: helprace-takeover
|
|||
|
||||
info:
|
||||
name: helprace takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: helpscout-takeover
|
|||
|
||||
info:
|
||||
name: helpscout takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: heroku-takeover
|
|||
|
||||
info:
|
||||
name: heroku takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: hubspot-takeover
|
|||
|
||||
info:
|
||||
name: hubspot takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
|
@ -2,7 +2,7 @@ id: intercom-takeover
|
|||
|
||||
info:
|
||||
name: intercom takeover detection
|
||||
author: pdcommunity
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: takeover
|
||||
reference: https://github.com/EdOverflow/can-i-take-over-xyz
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue