misc tag updates
parent
7ae14fc96a
commit
8fdfc64e54
|
@ -2,7 +2,7 @@ id: CVE-2015-3306
|
|||
|
||||
info:
|
||||
name: ProFTPd RCE
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: high
|
||||
reference: https://github.com/t0kx/exploit-CVE-2015-3306
|
||||
description: The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2017-9506
|
|||
|
||||
info:
|
||||
name: Jira IconURIServlet SSRF
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: high
|
||||
description: The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF).
|
||||
tags: cve,cve2017,atlassian,jira,ssrf
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2018-7251
|
|||
|
||||
info:
|
||||
name: AnchorCMS Error Log Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
tags: cve,cve2018,anchorcms,logs
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2018-8006
|
|||
|
||||
info:
|
||||
name: Apache ActiveMQ XSS
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
tags: cve,cve2018,apache,activemq,xss
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-10092
|
|||
|
||||
info:
|
||||
name: Apache mod_proxy HTML Injection / Partial XSS
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
description: In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
|
||||
reference: |
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-14223
|
|||
|
||||
info:
|
||||
name: Alfresco Share Open Redirect
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
description: An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.).
|
||||
reference: |
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-7219
|
|||
|
||||
info:
|
||||
name: Zarafa WebApp Reflected XSS
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
description: |
|
||||
Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0.1.47791 and earlier. NOTE: this is a discontinued product. The issue was fixed in later Zarafa Webapp versions; however, some former Zarafa Webapp customers use the related Kopano product instead.
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-9955
|
|||
|
||||
info:
|
||||
name: CVE-2019-9955 Zyxel XSS
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
tags: cve,cve2019,xss
|
||||
description: On Zyxel ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200-VPN, ZyWALL 110, ZyWALL 310, ZyWALL 1100 devices, the security firewall login page is vulnerable to Reflected XSS via the unsanitized 'mp_idx' parameter.
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-17518
|
|||
|
||||
info:
|
||||
name: Apache Flink Upload Path Traversal
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: critical
|
||||
reference: https://github.com/vulhub/vulhub/tree/master/flink/CVE-2020-17518
|
||||
description: |
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-17519
|
|||
|
||||
info:
|
||||
name: Apache Flink directory traversal
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: high
|
||||
description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
|
||||
reference: https://github.com/B1anda0/CVE-2020-17519
|
||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-1943
|
|||
|
||||
info:
|
||||
name: Apache OFBiz Reflected XSS
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
description: Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07.
|
||||
severity: medium
|
||||
tags: cve,cve2020,apache,xss
|
||||
|
|
|
@ -2,7 +2,7 @@ id: activemq-default-login
|
|||
|
||||
info:
|
||||
name: Apache ActiveMQ Default Credentials
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
tags: apache,activemq,dlogin
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: ambari-default-credentials
|
|||
|
||||
info:
|
||||
name: Apache Ambari Default Credentials
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
tags: ambari,dlogin
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: ofbiz-default-credentials
|
|||
|
||||
info:
|
||||
name: Apache OfBiz Default Credentials
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
tags: ofbiz,dlogin
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: zabbix-default-credentials
|
|||
|
||||
info:
|
||||
name: Zabbix Default Credentials
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: critical
|
||||
tags: zabbix,dlogin
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: cname-service-detector
|
|||
|
||||
info:
|
||||
name: 3rd party service checker
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: info
|
||||
tags: dns
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: servfail-refused-hosts
|
|||
|
||||
info:
|
||||
name: Servfail Host Finder
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: info
|
||||
tags: dns
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: active-admin-exposure
|
|||
|
||||
info:
|
||||
name: ActiveAdmin Admin Dasboard Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: info
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: activemq-panel
|
|||
|
||||
info:
|
||||
name: Apache ActiveMQ Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: info
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: airflow-exposure
|
|||
|
||||
info:
|
||||
name: Apache Airflow Exposure / Unauthenticated Access
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: ambari-exposure
|
|||
|
||||
info:
|
||||
name: Apache Ambari Exposure / Unauthenticated Access
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: ansible-tower-exposure
|
|||
|
||||
info:
|
||||
name: Ansible Tower Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: citrix-vpn-detect
|
|||
|
||||
info:
|
||||
name: Citrix VPN Detection
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: info
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: couchdb-fauxton
|
|||
|
||||
info:
|
||||
name: Apache CouchDB Fauxton Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: django-admin-panel
|
|||
|
||||
info:
|
||||
name: Python Django Admin Panel
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: druid-console-exposure
|
|||
|
||||
info:
|
||||
name: Alibaba Druid Console Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: exposed-pagespeed-global-admin
|
|||
|
||||
info:
|
||||
name: Apache PageSpeed Global Admin Dashboard Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: exposed-webalizer
|
|||
|
||||
info:
|
||||
name: Publicly exposed Webalizer Interface
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: flink-exposure
|
|||
|
||||
info:
|
||||
name: Apache Flink Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: hadoop-exposure
|
|||
|
||||
info:
|
||||
name: Apache Hadoop Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: kafka-connect-ui
|
|||
|
||||
info:
|
||||
name: Apache Kafka Connect UI Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: kafka-monitoring
|
|||
|
||||
info:
|
||||
name: Apache Kafka Monitor Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: kafka-topics-ui
|
|||
|
||||
info:
|
||||
name: Apache Kafka Topics UI Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: kubernetes-dashboard
|
|||
|
||||
info:
|
||||
name: Kubernetes Console Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: parallels-html-client
|
|||
|
||||
info:
|
||||
name: Parallels HTML5 Client
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: info
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: phpmyadmin-panel
|
|||
|
||||
info:
|
||||
name: phpMyAdmin Panel
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: info
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: rocketmq-console-exposure
|
|||
|
||||
info:
|
||||
name: Apache RocketMQ Console Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: selenoid-ui-exposure
|
|||
|
||||
info:
|
||||
name: Selenoid UI Dashboard Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: setup-page-exposure
|
|||
|
||||
info:
|
||||
name: Zenphoto Setup Page Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
description: Misconfiguration on Zenphoto version < 1.5.X which lead to sensitive information disclosure
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@ id: solr-exposure
|
|||
|
||||
info:
|
||||
name: Apache Solr Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: yarn-manager-exposure
|
|||
|
||||
info:
|
||||
name: Apache Yarn ResourceManager Exposure / Unauthenticated Access
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,7 +2,7 @@ id: zipkin-exposure
|
|||
|
||||
info:
|
||||
name: Zipkin Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
|
||||
requests:
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: OpenAPI
|
||||
author: pdteam
|
||||
severity: info
|
||||
tags: exposures,api
|
||||
tags: exposure,api
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Public Swagger API
|
||||
author: pdteam
|
||||
severity: info
|
||||
tags: exposures,api,swagger
|
||||
tags: exposure,api,swagger
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: wadl file disclosure
|
||||
author: 0xrudra & manuelbua
|
||||
severity: info
|
||||
tags: exposures,api
|
||||
tags: exposure,api
|
||||
reference: |
|
||||
- https://github.com/dwisiswant0/wadl-dumper
|
||||
- https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: wsdl-detect
|
||||
author: jarijaas
|
||||
severity: info
|
||||
tags: exposures,api
|
||||
tags: exposure,api
|
||||
description: Detects web services that have WSDL (https://www.w3.org/TR/wsdl/)
|
||||
|
||||
requests:
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: settings.php information disclosure
|
||||
author: sheikhrishad
|
||||
severity: medium
|
||||
tags: exposures,backup
|
||||
tags: exposure,backup
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: MySQL Dump Files
|
||||
author: geeknik & @dwisiswant0
|
||||
severity: medium
|
||||
tags: exposures,backup
|
||||
tags: exposure,backup
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Compressed Web File
|
||||
author: Toufik Airane & @dwisiswant0
|
||||
severity: medium
|
||||
tags: exposures,backup
|
||||
tags: exposure,backup
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -2,9 +2,9 @@ id: airflow-configuration-exposure
|
|||
|
||||
info:
|
||||
name: Apache Airflow Configuration Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
tags: exposures,config
|
||||
tags: exposure,config
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Alibaba Canal Info Leak
|
||||
author: pikpikcu
|
||||
severity: info
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
# https://github.com/alibaba/canal/issues/632
|
||||
# https://netty.io/wiki/reference-counted-objects.html
|
||||
|
|
|
@ -2,9 +2,9 @@ id: amazon-docker-config-disclosure
|
|||
|
||||
info:
|
||||
name: Dockerrun AWS Configuration Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -2,9 +2,9 @@ id: ansible-config-disclosure
|
|||
|
||||
info:
|
||||
name: Ansible Configuration Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: AWStats config
|
||||
author: sheikhrishad
|
||||
severity: info
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: AWStats script
|
||||
author: sheikhrishad
|
||||
severity: info
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: geeknik
|
||||
severity: low
|
||||
reference: https://circleci.com/docs/2.0/sample-config/
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: circleci ssh-config exposure
|
||||
author: geeknik
|
||||
severity: low
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: composer-config-file
|
||||
author: Mahendra Purbia (Mah3Sec_)
|
||||
severity: info
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: docker-compose.yml exposure
|
||||
author: meme-lord & blckraven & geeknik
|
||||
severity: medium
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: pikpikcu
|
||||
severity: high
|
||||
reference: https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: daffainfo
|
||||
severity: low
|
||||
reference: https://www.bitkeeper.org/man/config-etc.html
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: daffainfo
|
||||
severity: low
|
||||
reference: http://doc.bazaar.canonical.com/beta/en/user-reference/configuration-help.html
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: daffainfo
|
||||
severity: low
|
||||
reference: http://darcs.net/Using/Configuration#sources
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Exposed HG Directory
|
||||
author: daffainfo
|
||||
severity: low
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Exposed SVN Directory
|
||||
author: udit_thakkur & dwisiswant0
|
||||
severity: medium
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: FTP credentials exposure
|
||||
author: pikpikcu
|
||||
severity: medium
|
||||
tags: config,ftp,exposures
|
||||
tags: config,ftp,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
author: organiccrap
|
||||
severity: medium
|
||||
description: Nginx off-by-slash vulnerability exposes Git configuration.
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
reference: https://twitter.com/Random_Robbie/status/1262676628167110656
|
||||
|
||||
requests:
|
||||
|
|
|
@ -2,10 +2,10 @@ id: git-config
|
|||
|
||||
info:
|
||||
name: Git Config Disclosure
|
||||
author: pd-team & pikpikcu
|
||||
author: pdteam & pikpikcu
|
||||
severity: medium
|
||||
description: Searches for the pattern /.git/config on passed URLs.
|
||||
tags: config,git,exposures
|
||||
tags: config,git,exposure
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: geeknik
|
||||
severity: info
|
||||
description: https://developers.google.com/gmail/api/auth/web-server
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: dhiyaneshDK
|
||||
severity: low
|
||||
reference: https://hackerone.com/reports/1026196
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: alperenkesk
|
||||
severity: low
|
||||
reference: https://www.exploit-db.com/exploits/44734
|
||||
tags: scada,config,exposures
|
||||
tags: scada,config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Detect exposed .htpasswd files
|
||||
author: geeknik
|
||||
severity: info
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: oppsec
|
||||
severity: low
|
||||
description: configuration.php-dist is a file created by Joomla to save Joomla settings.
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Laravel .env file
|
||||
author: pxmme1337 & dwisiswant0 & geeknik & emenalf
|
||||
severity: medium
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Lvmeng UTS Disclosure
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -3,7 +3,7 @@ info:
|
|||
name: Magento Config Disclosure
|
||||
author: geeknik
|
||||
severity: medium
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -6,7 +6,7 @@ info:
|
|||
description: The .netrc file contains login and initialization information used by the auto-login process.
|
||||
reference: https://www.gnu.org/software/inetutils/manual/html_node/The-_002enetrc-file.html
|
||||
severity: high
|
||||
tags: netrc,config,exposures
|
||||
tags: netrc,config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -2,9 +2,9 @@ id: opcache-status-exposure
|
|||
|
||||
info:
|
||||
name: OPcache Status Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: owncloud config Disclosure
|
||||
author: Mahendra Purbia (Mah3Sec_)
|
||||
severity: info
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: geeknik & afaq
|
||||
severity: info
|
||||
description: All npm packages contain a file, usually in the project root, called package.json - this file holds various metadata relevant to the project.
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -2,9 +2,9 @@ id: perl-status
|
|||
|
||||
info:
|
||||
name: Apache mod_perl Status Page Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: medium
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -2,9 +2,9 @@ id: phpinfo-files
|
|||
|
||||
info:
|
||||
name: phpinfo Disclosure
|
||||
author: pd-team & daffainfo & meme-lord
|
||||
author: pdteam & daffainfo & meme-lord
|
||||
severity: low
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -2,9 +2,9 @@ id: rails-database-config
|
|||
|
||||
info:
|
||||
name: Ruby-on-Rails Database Configuration Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: low
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
author: geeknik
|
||||
description: Redmine is a flexible project management web application written using Ruby on Rails framework - https://redmine.org/projects/redmine
|
||||
severity: medium
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: pikpikcu
|
||||
severity: high
|
||||
reference: https://www.cnblogs.com/cHr1s/p/14499858.html
|
||||
tags: ruijie,config,exposures
|
||||
tags: ruijie,config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Detect Private SSH and TLS Keys
|
||||
author: geeknik
|
||||
severity: high
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: SFTP credentials exposure
|
||||
author: sheikhrishad
|
||||
severity: medium
|
||||
tags: config,ftp,exposures
|
||||
tags: config,ftp,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: SymfonyProfiler information leakage
|
||||
author: wabafet
|
||||
severity: medium
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -2,9 +2,9 @@ id: symfony-database-config
|
|||
|
||||
info:
|
||||
name: Symfony Database Configuration Exposure
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -2,9 +2,9 @@ id: symfony-profiler
|
|||
|
||||
info:
|
||||
name: Symfony Profiler
|
||||
author: pd-team
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -3,7 +3,7 @@ info:
|
|||
name: Web Config file
|
||||
author: Yash Anand @yashanand155
|
||||
severity: info
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: X Prober server information leakage
|
||||
author: pdteam
|
||||
severity: low
|
||||
tags: config,exposures
|
||||
tags: config,exposure
|
||||
reference: https://twitter.com/bugbounty_tips/status/1339984643517423616
|
||||
|
||||
requests:
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: oppsec
|
||||
severity: info
|
||||
description: Bower is a package manager which stores packages informations in bower.json file
|
||||
tags: file,exposures
|
||||
tags: file,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
author: gevakun
|
||||
severity: low
|
||||
reference: https://twitter.com/Wh11teW0lf/status/1295594085445709824
|
||||
tags: file,exposures
|
||||
tags: file,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Drupal Install
|
||||
author: NkxxkN
|
||||
severity: low
|
||||
tags: file,exposures
|
||||
tags: file,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Directory Listing via DS_Store
|
||||
author: 0w4ys
|
||||
severity: info
|
||||
tags: file,exposures
|
||||
tags: file,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Exposed Spring Data REST Application-Level Profile Semantics (ALPS)
|
||||
author: dwisiswant0
|
||||
severity: medium
|
||||
tags: file,exposures
|
||||
tags: file,exposure
|
||||
reference: https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/
|
||||
|
||||
requests:
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Filezilla
|
||||
author: amsda
|
||||
severity: medium
|
||||
tags: file,exposures
|
||||
tags: file,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -3,7 +3,7 @@ info:
|
|||
name: Keycloak Json File
|
||||
author: oppsec
|
||||
severity: info
|
||||
tags: file,exposures
|
||||
tags: file,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Lazy File Manager
|
||||
author: amsda
|
||||
severity: medium
|
||||
tags: file,exposures
|
||||
tags: file,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue