Updated author names

patch-1
Prince Chaddha 2021-06-09 17:50:56 +05:30
parent 9d7ab618b8
commit 83ce809e8d
163 changed files with 163 additions and 163 deletions

View File

@ -2,7 +2,7 @@ id: CVE-2013-2251
info:
name: Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution
author: exploitation & @dwisiswant0
author: exploitation,dwisiswant0
severity: critical
description: In Struts 2 before 2.3.15.1 the information following "action:", "redirect:" or "redirectAction:" is not properly sanitized. Since said information will be evaluated as OGNL expression against the value stack, this introduces the possibility to inject server side code.
reference: http://struts.apache.org/release/2.3.x/docs/s2-016.html

View File

@ -2,7 +2,7 @@ id: CVE-2017-14849
info:
name: Node.js 8.5.0 >=< 8.6.0 Directory Traversal
author: Random-Robbie
author: Random_Robbie
severity: high
description: Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to ".." handling was incompatible with the pathname validation used by unspecified community modules.
tags: cve,cve2017,nodejs,lfi

View File

@ -1,6 +1,6 @@
id: CVE-2017-5638
info:
author: Random Robbie
author: Random_Robbie
name: Apache Struts2 RCE
severity: critical
description: Struts is vulnerable to remote command injection attacks through incorrectly parsing an attackers invalid Content-Type HTTP header. The Struts vulnerability allows these commands to be executed under the privileges of the Web server.

View File

@ -2,7 +2,7 @@ id: CVE-2017-7269
info:
name: Windows Server 2003 & IIS 6.0 RCE
author: thomas_from_offensity & @geeknik
author: thomas_from_offensity,geeknik
severity: critical
description: Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If <http://" in a PROPFIND request.
reference:

View File

@ -2,7 +2,7 @@ id: CVE-2017-7615
info:
name: CVE-2017-7615
author: bp0lr & dwisiswant0
author: bp0lr,dwisiswant0
severity: high
description: MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php.
tags: cve,cve2017,mantisbt

View File

@ -2,7 +2,7 @@ id: CVE-2017-9841
info:
name: CVE-2017-9841
author: Random-Robbie
author: Random_Robbie
severity: high
description: Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI
tags: cve,cve2017,php,phpunit,rce

View File

@ -2,7 +2,7 @@ id: CVE-2018-1000129
info:
name: Jolokia XSS
author: mavericknerd @0h1in9e
author: mavericknerd,0h1in9e
severity: high
description: An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.
tags: cve,cve2018,jolokia,xss

View File

@ -2,7 +2,7 @@ id: CVE-2018-1000861
info:
name: Jenkins 2.138 Remote Command Execution
author: dhiyaneshDK & @pikpikcu
author: dhiyaneshDK,pikpikcu
severity: critical
reference: https://github.com/vulhub/vulhub/tree/master/jenkins/CVE-2018-1000861
tags: cve,cve2018,jenkin,rce

View File

@ -2,7 +2,7 @@ id: CVE-2018-11409
info:
name: Splunk Sensitive Information Disclosure
author: Harsh Bothra
author: harshbothra_
severity: medium
reference: https://nvd.nist.gov/vuln/detail/CVE-2018-11409
tags: cve,cve2018,splunk

View File

@ -2,7 +2,7 @@ id: CVE-2018-11759
info:
name: Apache Tomcat JK Status Manager Access
author: Harsh Bothra
author: harshbothra_
severity: medium
reference: https://github.com/immunIT/CVE-2018-11759
tags: cve,cve2018,apache

View File

@ -2,7 +2,7 @@ id: CVE-2018-19439
info:
name: Cross Site Scripting in Oracle Secure Global Desktop Administration Console
author: madrobot & dwisiswant0
author: madrobot,dwisiswant0
severity: high
description: XSS exists in the Administration Console in Oracle Secure Global Desktop 4.4 20080807152602 (but was fixed in later versions including 5.4)
tags: cve,cve2018,oracle,xss

View File

@ -2,7 +2,7 @@ id: CVE-2018-20824
info:
name: Atlassian Jira WallboardServlet XSS
author: madrobot & dwisiswant0
author: madrobot,dwisiswant0
severity: medium
description: The WallboardServlet resource in Jira before version 7.13.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the cyclePeriod parameter.
tags: cve,cve2018,atlassian,jira,xss

View File

@ -2,7 +2,7 @@ id: CVE-2019-15858
info:
name: Unauthenticated Woody Ad Snippets WordPress Plugin RCE
author: dwisiswant0 & fmunozs & patralos
author: dwisiswant0,fmunozs,patralos
severity: high
description: |
This template supports the detection part only. See references.

View File

@ -2,7 +2,7 @@ id: CVE-2019-17382
info:
name: Zabbix Authentication Bypass
author: Harsh Bothra
author: harshbothra_
severity: critical
description: An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.
reference: https://www.exploit-db.com/exploits/47467

View File

@ -1,7 +1,7 @@
id: CVE-2019-17558
info:
name: Apache Solr 8.3.0 - Remote Code Execution via Velocity Template
author: pikpikcu & madrobot
author: pikpikcu,madrobot
severity: critical
refrense: https://nvd.nist.gov/vuln/detail/CVE-2019-17558
tags: cve,cve2019,apache,rce,solr

View File

@ -2,7 +2,7 @@ id: CVE-2019-19985
info:
name: WordPress Plugin Email Subscribers & Newsletters 4.2.2 - Unauthenticated File Download
author: KBA@SOGETI_ESEC, madrobot & dwisiswant0
author: KBA@SOGETI_ESEC,madrobot,dwisiswant0
severity: medium
description: The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure.
refrense: https://www.exploit-db.com/exploits/48698

View File

@ -1,6 +1,6 @@
id: CVE-2019-3396
info:
author: Harsh Bothra
author: harshbothra_
name: Atlassian Confluence Path Traversal
severity: high
description: The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.

View File

@ -2,7 +2,7 @@ id: CVE-2019-8449
info:
name: JIRA Unauthenticated Sensitive Information Disclosure
author: Harsh Bothra
author: harshbothra_
severity: medium
description: The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability.
reference: |

View File

@ -2,7 +2,7 @@ id: CVE-2019-9978
info:
name: WordPress social-warfare RFI
author: madrobot & dwisiswant0
author: madrobot,dwisiswant0
severity: critical
description: The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.
reference: https://github.com/mpgn/CVE-2019-9978

View File

@ -2,7 +2,7 @@ id: CVE-2020-12720
info:
name: CVE-2020-12720 vBulletin SQLI
author: pdnuclei - projectdiscovery.io
author: pdteam
severity: critical
description: vBulletin before 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1 has incorrect access control.
reference: https://github.com/rekter0/exploits/tree/master/CVE-2020-12720

View File

@ -2,7 +2,7 @@ id: CVE-2020-5284
info:
name: Next.js .next/ limited path traversal
author: Harsh & Rahul & dwisiswant0
author: rootxharsh,iamnoooob,dwisiswant0
severity: medium
description: Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
tags: cve,cve2020,nextjs,lfi

View File

@ -2,7 +2,7 @@ id: CVE-2020-5405
info:
name: Spring Cloud Directory Traversal
author: Harsh Bothra
author: harshbothra_
severity: high
description: Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
reference: https://pivotal.io/security/cve-2020-5405

View File

@ -2,7 +2,7 @@ id: CVE-2020-5902
info:
name: F5 BIG-IP TMUI RCE
author: madrobot & dwisiswant0 & ringo
author: madrobot,dwisiswant0,ringo
severity: high
description: In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
reference: |

View File

@ -2,7 +2,7 @@ id: CVE-2020-8115
info:
name: Revive Adserver XSS
author: madrobot & dwisiswant0
author: madrobot,dwisiswant0
severity: medium
description: |
A reflected XSS vulnerability has been discovered in the publicly accessible afr.php delivery script of Revive Adserver <= 5.0.3 by Jacopo Tediosi. There are currently no known exploits: the session identifier cannot be accessed as it is stored in an http-only cookie as of v3.2.2. On older versions, however, under specific circumstances, it could be possible to steal the session identifier and gain access to the admin interface. The query string sent to the www/delivery/afr.php script was printed back without proper escaping in a JavaScript context, allowing an attacker to execute arbitrary JS code on the browser of the victim.

View File

@ -2,7 +2,7 @@ id: CVE-2020-8512
info:
name: IceWarp WebMail XSS
author: pdnuclei & dwisiswant0
author: pdteam,dwisiswant0
severity: medium
description: In IceWarp Webmail Server through 11.4.4.1, there is XSS in the /webmail/ color parameter.
reference: |

View File

@ -1,7 +1,7 @@
id: CVE-2021-22986
info:
name: F5 BIG-IP iControl REST unauthenticated RCE
author: Harsh Jaiswal (@rootxharsh) & Rahul Maini (@iamnoooob)
author: rootxharsh,iamnoooob
severity: critical
tags: bigip,cve,cve2021,rce
description: The iControl REST interface has an unauthenticated remote command execution vulnerability.

View File

@ -2,7 +2,7 @@ id: rabbitmq-default-admin
info:
name: RabbitMQ Default Credentials
author: fyoorer & dwisiswant0
author: fyoorer,dwisiswant0
severity: high
tags: rabbitmq,default-login

View File

@ -2,7 +2,7 @@ id: dead-host-with-cname
info:
name: dead-host-with-cname
author: pdnuclei - projectdiscovery.io
author: pdteam
severity: info
tags: dns

View File

@ -1,7 +1,7 @@
id: adminer-panel
info:
name: Adminer Login panel
author: random-robbie & meme-lord
author: random_robbie,meme-lord
severity: info
reference: https://blog.sorcery.ie/posts/adminer/
tags: panel

View File

@ -1,7 +1,7 @@
id: jmx-console
info:
name: JMX Console
author: Yash Anand @yashanand155
author: yashanand155
severity: low
tags: panel

View File

@ -2,7 +2,7 @@ id: joomla-panel
info:
name: Joomla Panel
author: github.com/its0x08
author: its0x08
severity: info
tags: panel

View File

@ -2,7 +2,7 @@ id: mobileiron-login
info:
name: MobileIron Login
author: dhiyaneshDK & @dwisiswant0
author: dhiyaneshDK,dwisiswant0
Severity: info
tags: panel

View File

@ -2,7 +2,7 @@ id: open-stack-dashboard-login
info:
name: OpenStack Dashboard
author: dhiyaneshDK & hackergautam
author: dhiyaneshDK,hackergautam
severity: info
reference: https://www.exploit-db.com/ghdb/6464
tags: panel,openstack

View File

@ -2,7 +2,7 @@ id: public-tomcat-manager
info:
name: tomcat manager disclosure
author: Ahmed Sherif & geeknik
author: Ahmed Sherif,geeknik
severity: info
tags: panel

View File

@ -2,7 +2,7 @@ id: traefik-dashboard-detect
info:
name: Traefik Dashboard
author: schniggie & StreetOfHackerR007
author: schniggie,StreetOfHackerR007
severity: info
tags: panel

View File

@ -2,7 +2,7 @@ id: webeditors
info:
name: Web Editors
author: pwnmachine
author: princechaddha
severity: info
tags: panel

View File

@ -2,7 +2,7 @@ id: wadl-api
info:
name: wadl file disclosure
author: 0xrudra & manuelbua
author: 0xrudra,manuelbua
severity: info
tags: exposure,api
reference: |

View File

@ -2,7 +2,7 @@ id: default-sql-dump
info:
name: MySQL Dump Files
author: geeknik & @dwisiswant0
author: geeknik,dwisiswant0
severity: medium
tags: exposure,backup

View File

@ -2,7 +2,7 @@ id: zip-backup-files
info:
name: Compressed Web File
author: Toufik Airane & @dwisiswant0
author: Toufik Airane,dwisiswant0
severity: medium
tags: exposure,backup

View File

@ -2,7 +2,7 @@ id: docker-compose-config
info:
name: docker-compose.yml exposure
author: meme-lord & blckraven & geeknik
author: meme-lord,blckraven,geeknik
severity: medium
tags: config,exposure,devops

View File

@ -2,7 +2,7 @@ id: exposed-svn
info:
name: Exposed SVN Directory
author: udit_thakkur & dwisiswant0
author: udit_thakkur,dwisiswant0
severity: medium
tags: config,exposure,svn

View File

@ -2,7 +2,7 @@ id: git-config
info:
name: Git Config Disclosure
author: pdteam & pikpikcu
author: pdteam,pikpikcu
severity: medium
description: Searches for the pattern /.git/config on passed URLs.
tags: config,git,exposure

View File

@ -2,7 +2,7 @@ id: laravel-env
info:
name: Laravel .env file accessible
author: pxmme1337 & dwisiswant0 & geeknik & emenalf
author: pxmme1337,dwisiswant0,geeknik,emenalf
severity: critical
description: Laravel uses the .env file to store sensitive information like database credentials and tokens. It should not be publicly accessible.
reference: https://laravel.com/docs/master/configuration#environment-configuration

View File

@ -2,7 +2,7 @@ id: package-json
info:
name: npm package.json disclosure
author: geeknik & afaq
author: geeknik,afaq
severity: info
description: All npm packages contain a file, usually in the project root, called package.json - this file holds various metadata relevant to the project.
tags: config,exposure

View File

@ -2,7 +2,7 @@ id: phpinfo-files
info:
name: phpinfo Disclosure
author: pdteam & daffainfo & meme-lord
author: pdteam,daffainfo,meme-lord
severity: low
tags: config,exposure

View File

@ -2,7 +2,7 @@ id: rails-database-config
info:
name: Ruby-on-Rails Database Configuration Exposure
author: pdteam & geeknik
author: pdteam,geeknik
severity: low
tags: config,exposure,rails

View File

@ -1,7 +1,7 @@
id: error-logs
info:
name: common error log files
author: geeknik & daffainfo
author: geeknik,daffainfo
severity: low
tags: logs,exposure

View File

@ -2,7 +2,7 @@ id: laravel-log-file
info:
name: Laravel log file publicly accessible
author: sheikhrishad & geeknik
author: sheikhrishad,geeknik
severity: high
description: The log file of this Laravel web app might reveal details on the inner workings of the app, possibly even tokens, credentials or personal information.
reference: https://laravel.com/docs/master/logging

View File

@ -2,7 +2,7 @@ id: generic-tokens
info:
name: Generic Tokens
author: nadino & geeknik
author: nadino,geeknik
severity: info
tags: exposure,token

View File

@ -2,7 +2,7 @@ id: fcm-server-key
info:
name: FCM Server Key
author: Abss (@absshax)
author: absshax
severity: high
tags: exposure,token,google
reference: https://abss.me/posts/fcm-takeover

View File

@ -1,7 +1,7 @@
id: adminer-panel-fuzz
info:
name: Adminer Login Panel Fuzz
author: random-robbie & meme-lord
author: random_robbie,meme-lord
severity: info
reference: https://blog.sorcery.ie/posts/adminer/
tags: fuzz,adminer

View File

@ -1,7 +1,7 @@
id: generic-lfi-fuzzing
info:
name: Generic LFI Test
author: geeknik & unstabl3
author: geeknik,unstabl3
severity: high
description: A generic test for Local File Inclusion
tags: fuzz,lfi

View File

@ -2,7 +2,7 @@ id: dir-listing
info:
name: Directory listing enabled
author: _harleo & pentest_swissky
author: _harleo,pentest_swissky
severity: info
tags: misc

View File

@ -2,7 +2,7 @@ id: aem-groovyconsole
info:
name: AEM Groovy console enabled
author: twitter.com/Dheerajmadhukar
author: Dheerajmadhukar
severity: critical
description: Groovy console is exposed, RCE is possible.
reference: https://hackerone.com/reports/672243

View File

@ -2,7 +2,7 @@ id: django-debug
info:
name: Django Debug Method Enabled
author: dhiyaneshDK & hackergautam
author: dhiyaneshDK,hackergautam
severity: medium
tags: django,debug

View File

@ -1,7 +1,7 @@
id: druid-monitor
info:
name: Druid Monitor Unauthorized Access
author: 0h1in9e @ohlinge
author: ohlinge
severity: high
tags: druid,unauth

View File

@ -2,7 +2,7 @@ id: exposed-docker-api
info:
name: Exposed Docker API
author: furkansenan & dwisiswant0
author: furkansenan,dwisiswant0
severity: info
tags: docker,unauth,devops

View File

@ -2,7 +2,7 @@ id: front-page-misconfig
info:
name: FrontPage configuration information discloure
author: JTeles & pikpikcu
author: JTeles,pikpikcu
severity: info
reference: https://docs.microsoft.com/en-us/archive/blogs/fabdulwahab/security-protecting-sharepoint-server-applications

View File

@ -2,7 +2,7 @@ id: java-melody-exposed
info:
name: JavaMelody Monitoring Exposed
author: dhiyaneshDK & thomas_from_offensity
author: dhiyaneshDK,thomas_from_offensity
severity: medium
description: JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to “View http sessions”. This can be used by an attacker to steal a users session.
reference: |

View File

@ -2,7 +2,7 @@ id: kubernetes-pods-api
info:
name: Kubernetes Pods API
author: ilovebinbash & geeknik & 0xtavian
author: ilovebinbash,geeknik,0xtavian
severity: critical
description: When the service port is available, anyone can execute commands inside the container. See https://github.com/officialhocc/Kubernetes-Kubelet-RCE for inspiration.
reference: https://blog.binaryedge.io/2018/12/06/kubernetes-being-hijacked-worldwide/

View File

@ -2,7 +2,7 @@ id: server-status-localhost
info:
name: Server Status Disclosure
author: pdteam & geeknik
author: pdteam,geeknik
severity: low
tags: apache,debug

View File

@ -2,7 +2,7 @@ id: shell-history
info:
name: Shell History
author: pentest_swissky & geeknik
author: pentest_swissky,geeknik
severity: low
description: Discover history for bash, ksh, sh, and zsh
tags: config

View File

@ -2,7 +2,7 @@ id: springboot-configprops
info:
name: Detect Springboot Configprops Actuator
author: that_juan_ & dwisiswant0 & wdahlenb
author: that_juan_,dwisiswant0,wdahlenb
severity: low
description: Sensitive environment variables may not be masked
tags: springboot,disclosure

View File

@ -2,7 +2,7 @@ id: springboot-env
info:
name: Detect Springboot Env Actuator
author: that_juan_ & dwisiswant0 & wdahlenb
author: that_juan_,dwisiswant0,wdahlenb
severity: low
description: Sensitive environment variables may not be masked
tags: springboot,disclosure

View File

@ -2,7 +2,7 @@ id: springboot-heapdump
info:
name: Detect Springboot Heapdump Actuator
author: that_juan_ & dwisiswant0 & wdahlenb
author: that_juan_,dwisiswant0,wdahlenb
severity: critical
description: Environment variables and HTTP requests can be found in the HPROF
tags: springboot,disclosure

View File

@ -2,7 +2,7 @@ id: springboot-httptrace
info:
name: Detect Springboot httptrace
author: that_juan_ & dwisiswant0 & wdahlenb
author: that_juan_,dwisiswant0,wdahlenb
severity: low
description: View recent HTTP requests and responses
tags: springboot,disclosure

View File

@ -2,7 +2,7 @@ id: springboot-loggers
info:
name: Detect Springboot Loggers
author: that_juan_ & dwisiswant0 & wdahlenb
author: that_juan_,dwisiswant0,wdahlenb
severity: low
tags: springboot,disclosure

View File

@ -2,7 +2,7 @@ id: springboot-mappings
info:
name: Detect Springboot Mappings Actuator
author: that_juan_ & dwisiswant0 & wdahlenb
author: that_juan_,dwisiswant0,wdahlenb
severity: low
description: Additional routes may be displayed
tags: springboot,disclosure

View File

@ -2,7 +2,7 @@ id: springboot-trace
info:
name: Detect Springboot Trace Actuator
author: that_juan_ & dwisiswant0 & wdahlenb
author: that_juan_,dwisiswant0,wdahlenb
severity: low
description: View recent HTTP requests and responses
tags: springboot,disclosure

View File

@ -2,7 +2,7 @@ id: unauthenticated-nacos-access
info:
name: Unauthenticated Nacos access v1.x
author: taielab & @pikpikcu
author: taielab,pikpikcu
severity: critical
issues: https://github.com/alibaba/nacos/issues/4593
tags: nacos,unauth

View File

@ -2,7 +2,7 @@ id: unauth-ftp
info:
name: FTP Anonymous Login
author: Celesian ( @C3l3si4n )
author: C3l3si4n
severity: medium
reference: https://tools.ietf.org/html/rfc2577
tags: network,ftp

View File

@ -2,7 +2,7 @@ id: acquia-takeover
info:
name: Acquia Takeover Detection
author: pdcommunity
author: pdteam
severity: info
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: aftership-takeover
info:
name: Aftership Takeover Detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: agilecrm-takeover
info:
name: agilecrm takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: aha-takeover
info:
name: Aha Takeover Detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: airee-takeover
info:
name: Airee Takeover Detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: anima-takeover
info:
name: Anima Takeover Detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: aws-bucket-takeover
info:
name: AWS Bucket Takeover Detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover,aws
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: bigcartel-takeover
info:
name: Bigcartel Takeover Detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: bitbucket-takeover
info:
name: Bitbucket Takeover Detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: brightcove-takeover
info:
name: brightcove takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: campaignmonitor-takeover
info:
name: campaignmonitor takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: canny-takeover
info:
name: canny takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: cargo-takeover
info:
name: cargo takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: cargocollective-takeover
info:
name: cargocollective takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: fastly-takeover
info:
name: fastly takeover detection
author: pdcommunity
author: pdteam
severity: info
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/22

View File

@ -2,7 +2,7 @@ id: feedpress-takeover
info:
name: Agilecrm Takeover Detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: freshdesk-takeover
info:
name: freshdesk takeover detection
author: Gal Nagli @naglinagli
author: naglinagli
severity: high
tags: takeover
reference: https://twitter.com/ja1sharma/status/1377239265348743175

View File

@ -2,7 +2,7 @@ id: frontify-takeover
info:
name: frontify takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: gemfury-takeover
info:
name: gemfury takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: getresponse-takeover
info:
name: getresponse takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: ghost-takeover
info:
name: ghost takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: github-takeover
info:
name: github takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: hatenablog-takeover
info:
name: hatenablog takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: helpjuice-takeover
info:
name: helpjuice takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: helprace-takeover
info:
name: helprace takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: helpscout-takeover
info:
name: helpscout takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: heroku-takeover
info:
name: heroku takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: hubspot-takeover
info:
name: hubspot takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

View File

@ -2,7 +2,7 @@ id: intercom-takeover
info:
name: intercom takeover detection
author: pdcommunity
author: pdteam
severity: high
tags: takeover
reference: https://github.com/EdOverflow/can-i-take-over-xyz

Some files were not shown because too many files have changed in this diff Show More