misc tag updates
parent
7ae14fc96a
commit
8fdfc64e54
|
@ -2,7 +2,7 @@ id: CVE-2015-3306
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: ProFTPd RCE
|
name: ProFTPd RCE
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: high
|
severity: high
|
||||||
reference: https://github.com/t0kx/exploit-CVE-2015-3306
|
reference: https://github.com/t0kx/exploit-CVE-2015-3306
|
||||||
description: The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
|
description: The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2017-9506
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Jira IconURIServlet SSRF
|
name: Jira IconURIServlet SSRF
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: high
|
severity: high
|
||||||
description: The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF).
|
description: The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF).
|
||||||
tags: cve,cve2017,atlassian,jira,ssrf
|
tags: cve,cve2017,atlassian,jira,ssrf
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2018-7251
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: AnchorCMS Error Log Exposure
|
name: AnchorCMS Error Log Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: cve,cve2018,anchorcms,logs
|
tags: cve,cve2018,anchorcms,logs
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2018-8006
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache ActiveMQ XSS
|
name: Apache ActiveMQ XSS
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: cve,cve2018,apache,activemq,xss
|
tags: cve,cve2018,apache,activemq,xss
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-10092
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache mod_proxy HTML Injection / Partial XSS
|
name: Apache mod_proxy HTML Injection / Partial XSS
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
description: In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
|
description: In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
|
||||||
reference: |
|
reference: |
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-14223
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Alfresco Share Open Redirect
|
name: Alfresco Share Open Redirect
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
description: An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.).
|
description: An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.).
|
||||||
reference: |
|
reference: |
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-7219
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Zarafa WebApp Reflected XSS
|
name: Zarafa WebApp Reflected XSS
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
description: |
|
description: |
|
||||||
Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0.1.47791 and earlier. NOTE: this is a discontinued product. The issue was fixed in later Zarafa Webapp versions; however, some former Zarafa Webapp customers use the related Kopano product instead.
|
Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0.1.47791 and earlier. NOTE: this is a discontinued product. The issue was fixed in later Zarafa Webapp versions; however, some former Zarafa Webapp customers use the related Kopano product instead.
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2019-9955
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: CVE-2019-9955 Zyxel XSS
|
name: CVE-2019-9955 Zyxel XSS
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
tags: cve,cve2019,xss
|
tags: cve,cve2019,xss
|
||||||
description: On Zyxel ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200-VPN, ZyWALL 110, ZyWALL 310, ZyWALL 1100 devices, the security firewall login page is vulnerable to Reflected XSS via the unsanitized 'mp_idx' parameter.
|
description: On Zyxel ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200-VPN, ZyWALL 110, ZyWALL 310, ZyWALL 1100 devices, the security firewall login page is vulnerable to Reflected XSS via the unsanitized 'mp_idx' parameter.
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-17518
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Flink Upload Path Traversal
|
name: Apache Flink Upload Path Traversal
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: critical
|
severity: critical
|
||||||
reference: https://github.com/vulhub/vulhub/tree/master/flink/CVE-2020-17518
|
reference: https://github.com/vulhub/vulhub/tree/master/flink/CVE-2020-17518
|
||||||
description: |
|
description: |
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-17519
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Flink directory traversal
|
name: Apache Flink directory traversal
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: high
|
severity: high
|
||||||
description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
|
description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
|
||||||
reference: https://github.com/B1anda0/CVE-2020-17519
|
reference: https://github.com/B1anda0/CVE-2020-17519
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: CVE-2020-1943
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache OFBiz Reflected XSS
|
name: Apache OFBiz Reflected XSS
|
||||||
author: pd-team
|
author: pdteam
|
||||||
description: Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07.
|
description: Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07.
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: cve,cve2020,apache,xss
|
tags: cve,cve2020,apache,xss
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: activemq-default-login
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache ActiveMQ Default Credentials
|
name: Apache ActiveMQ Default Credentials
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: apache,activemq,dlogin
|
tags: apache,activemq,dlogin
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: ambari-default-credentials
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Ambari Default Credentials
|
name: Apache Ambari Default Credentials
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: ambari,dlogin
|
tags: ambari,dlogin
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: ofbiz-default-credentials
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache OfBiz Default Credentials
|
name: Apache OfBiz Default Credentials
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: ofbiz,dlogin
|
tags: ofbiz,dlogin
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: zabbix-default-credentials
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Zabbix Default Credentials
|
name: Zabbix Default Credentials
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: critical
|
severity: critical
|
||||||
tags: zabbix,dlogin
|
tags: zabbix,dlogin
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: cname-service-detector
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: 3rd party service checker
|
name: 3rd party service checker
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
tags: dns
|
tags: dns
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: servfail-refused-hosts
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Servfail Host Finder
|
name: Servfail Host Finder
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
tags: dns
|
tags: dns
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: active-admin-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: ActiveAdmin Admin Dasboard Exposure
|
name: ActiveAdmin Admin Dasboard Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: activemq-panel
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache ActiveMQ Exposure
|
name: Apache ActiveMQ Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: airflow-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Airflow Exposure / Unauthenticated Access
|
name: Apache Airflow Exposure / Unauthenticated Access
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: ambari-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Ambari Exposure / Unauthenticated Access
|
name: Apache Ambari Exposure / Unauthenticated Access
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: ansible-tower-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Ansible Tower Exposure
|
name: Ansible Tower Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: citrix-vpn-detect
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Citrix VPN Detection
|
name: Citrix VPN Detection
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: couchdb-fauxton
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache CouchDB Fauxton Exposure
|
name: Apache CouchDB Fauxton Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: django-admin-panel
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Python Django Admin Panel
|
name: Python Django Admin Panel
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: druid-console-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Alibaba Druid Console Exposure
|
name: Alibaba Druid Console Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: exposed-pagespeed-global-admin
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache PageSpeed Global Admin Dashboard Exposure
|
name: Apache PageSpeed Global Admin Dashboard Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: exposed-webalizer
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Publicly exposed Webalizer Interface
|
name: Publicly exposed Webalizer Interface
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: flink-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Flink Exposure
|
name: Apache Flink Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: hadoop-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Hadoop Exposure
|
name: Apache Hadoop Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: kafka-connect-ui
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Kafka Connect UI Exposure
|
name: Apache Kafka Connect UI Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: kafka-monitoring
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Kafka Monitor Exposure
|
name: Apache Kafka Monitor Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: kafka-topics-ui
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Kafka Topics UI Exposure
|
name: Apache Kafka Topics UI Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: kubernetes-dashboard
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Kubernetes Console Exposure
|
name: Kubernetes Console Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: parallels-html-client
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Parallels HTML5 Client
|
name: Parallels HTML5 Client
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: phpmyadmin-panel
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: phpMyAdmin Panel
|
name: phpMyAdmin Panel
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: rocketmq-console-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache RocketMQ Console Exposure
|
name: Apache RocketMQ Console Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: selenoid-ui-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Selenoid UI Dashboard Exposure
|
name: Selenoid UI Dashboard Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: setup-page-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Zenphoto Setup Page Exposure
|
name: Zenphoto Setup Page Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
description: Misconfiguration on Zenphoto version < 1.5.X which lead to sensitive information disclosure
|
description: Misconfiguration on Zenphoto version < 1.5.X which lead to sensitive information disclosure
|
||||||
|
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: solr-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Solr Exposure
|
name: Apache Solr Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: yarn-manager-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Yarn ResourceManager Exposure / Unauthenticated Access
|
name: Apache Yarn ResourceManager Exposure / Unauthenticated Access
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,7 +2,7 @@ id: zipkin-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Zipkin Exposure
|
name: Zipkin Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: OpenAPI
|
name: OpenAPI
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
tags: exposures,api
|
tags: exposure,api
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Public Swagger API
|
name: Public Swagger API
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
tags: exposures,api,swagger
|
tags: exposure,api,swagger
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: wadl file disclosure
|
name: wadl file disclosure
|
||||||
author: 0xrudra & manuelbua
|
author: 0xrudra & manuelbua
|
||||||
severity: info
|
severity: info
|
||||||
tags: exposures,api
|
tags: exposure,api
|
||||||
reference: |
|
reference: |
|
||||||
- https://github.com/dwisiswant0/wadl-dumper
|
- https://github.com/dwisiswant0/wadl-dumper
|
||||||
- https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/
|
- https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: wsdl-detect
|
name: wsdl-detect
|
||||||
author: jarijaas
|
author: jarijaas
|
||||||
severity: info
|
severity: info
|
||||||
tags: exposures,api
|
tags: exposure,api
|
||||||
description: Detects web services that have WSDL (https://www.w3.org/TR/wsdl/)
|
description: Detects web services that have WSDL (https://www.w3.org/TR/wsdl/)
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: settings.php information disclosure
|
name: settings.php information disclosure
|
||||||
author: sheikhrishad
|
author: sheikhrishad
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: exposures,backup
|
tags: exposure,backup
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: MySQL Dump Files
|
name: MySQL Dump Files
|
||||||
author: geeknik & @dwisiswant0
|
author: geeknik & @dwisiswant0
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: exposures,backup
|
tags: exposure,backup
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Compressed Web File
|
name: Compressed Web File
|
||||||
author: Toufik Airane & @dwisiswant0
|
author: Toufik Airane & @dwisiswant0
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: exposures,backup
|
tags: exposure,backup
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -2,9 +2,9 @@ id: airflow-configuration-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Airflow Configuration Exposure
|
name: Apache Airflow Configuration Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: exposures,config
|
tags: exposure,config
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Alibaba Canal Info Leak
|
name: Alibaba Canal Info Leak
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: info
|
severity: info
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
# https://github.com/alibaba/canal/issues/632
|
# https://github.com/alibaba/canal/issues/632
|
||||||
# https://netty.io/wiki/reference-counted-objects.html
|
# https://netty.io/wiki/reference-counted-objects.html
|
||||||
|
|
|
@ -2,9 +2,9 @@ id: amazon-docker-config-disclosure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Dockerrun AWS Configuration Exposure
|
name: Dockerrun AWS Configuration Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -2,9 +2,9 @@ id: ansible-config-disclosure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Ansible Configuration Exposure
|
name: Ansible Configuration Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: AWStats config
|
name: AWStats config
|
||||||
author: sheikhrishad
|
author: sheikhrishad
|
||||||
severity: info
|
severity: info
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: AWStats script
|
name: AWStats script
|
||||||
author: sheikhrishad
|
author: sheikhrishad
|
||||||
severity: info
|
severity: info
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: geeknik
|
author: geeknik
|
||||||
severity: low
|
severity: low
|
||||||
reference: https://circleci.com/docs/2.0/sample-config/
|
reference: https://circleci.com/docs/2.0/sample-config/
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: circleci ssh-config exposure
|
name: circleci ssh-config exposure
|
||||||
author: geeknik
|
author: geeknik
|
||||||
severity: low
|
severity: low
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: composer-config-file
|
name: composer-config-file
|
||||||
author: Mahendra Purbia (Mah3Sec_)
|
author: Mahendra Purbia (Mah3Sec_)
|
||||||
severity: info
|
severity: info
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: docker-compose.yml exposure
|
name: docker-compose.yml exposure
|
||||||
author: meme-lord & blckraven & geeknik
|
author: meme-lord & blckraven & geeknik
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
reference: https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543
|
reference: https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: daffainfo
|
author: daffainfo
|
||||||
severity: low
|
severity: low
|
||||||
reference: https://www.bitkeeper.org/man/config-etc.html
|
reference: https://www.bitkeeper.org/man/config-etc.html
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: daffainfo
|
author: daffainfo
|
||||||
severity: low
|
severity: low
|
||||||
reference: http://doc.bazaar.canonical.com/beta/en/user-reference/configuration-help.html
|
reference: http://doc.bazaar.canonical.com/beta/en/user-reference/configuration-help.html
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: daffainfo
|
author: daffainfo
|
||||||
severity: low
|
severity: low
|
||||||
reference: http://darcs.net/Using/Configuration#sources
|
reference: http://darcs.net/Using/Configuration#sources
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Exposed HG Directory
|
name: Exposed HG Directory
|
||||||
author: daffainfo
|
author: daffainfo
|
||||||
severity: low
|
severity: low
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Exposed SVN Directory
|
name: Exposed SVN Directory
|
||||||
author: udit_thakkur & dwisiswant0
|
author: udit_thakkur & dwisiswant0
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: FTP credentials exposure
|
name: FTP credentials exposure
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,ftp,exposures
|
tags: config,ftp,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
author: organiccrap
|
author: organiccrap
|
||||||
severity: medium
|
severity: medium
|
||||||
description: Nginx off-by-slash vulnerability exposes Git configuration.
|
description: Nginx off-by-slash vulnerability exposes Git configuration.
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
reference: https://twitter.com/Random_Robbie/status/1262676628167110656
|
reference: https://twitter.com/Random_Robbie/status/1262676628167110656
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -2,10 +2,10 @@ id: git-config
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Git Config Disclosure
|
name: Git Config Disclosure
|
||||||
author: pd-team & pikpikcu
|
author: pdteam & pikpikcu
|
||||||
severity: medium
|
severity: medium
|
||||||
description: Searches for the pattern /.git/config on passed URLs.
|
description: Searches for the pattern /.git/config on passed URLs.
|
||||||
tags: config,git,exposures
|
tags: config,git,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: geeknik
|
author: geeknik
|
||||||
severity: info
|
severity: info
|
||||||
description: https://developers.google.com/gmail/api/auth/web-server
|
description: https://developers.google.com/gmail/api/auth/web-server
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: dhiyaneshDK
|
author: dhiyaneshDK
|
||||||
severity: low
|
severity: low
|
||||||
reference: https://hackerone.com/reports/1026196
|
reference: https://hackerone.com/reports/1026196
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: alperenkesk
|
author: alperenkesk
|
||||||
severity: low
|
severity: low
|
||||||
reference: https://www.exploit-db.com/exploits/44734
|
reference: https://www.exploit-db.com/exploits/44734
|
||||||
tags: scada,config,exposures
|
tags: scada,config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Detect exposed .htpasswd files
|
name: Detect exposed .htpasswd files
|
||||||
author: geeknik
|
author: geeknik
|
||||||
severity: info
|
severity: info
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: oppsec
|
author: oppsec
|
||||||
severity: low
|
severity: low
|
||||||
description: configuration.php-dist is a file created by Joomla to save Joomla settings.
|
description: configuration.php-dist is a file created by Joomla to save Joomla settings.
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Laravel .env file
|
name: Laravel .env file
|
||||||
author: pxmme1337 & dwisiswant0 & geeknik & emenalf
|
author: pxmme1337 & dwisiswant0 & geeknik & emenalf
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Lvmeng UTS Disclosure
|
name: Lvmeng UTS Disclosure
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -3,7 +3,7 @@ info:
|
||||||
name: Magento Config Disclosure
|
name: Magento Config Disclosure
|
||||||
author: geeknik
|
author: geeknik
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
description: The .netrc file contains login and initialization information used by the auto-login process.
|
description: The .netrc file contains login and initialization information used by the auto-login process.
|
||||||
reference: https://www.gnu.org/software/inetutils/manual/html_node/The-_002enetrc-file.html
|
reference: https://www.gnu.org/software/inetutils/manual/html_node/The-_002enetrc-file.html
|
||||||
severity: high
|
severity: high
|
||||||
tags: netrc,config,exposures
|
tags: netrc,config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -2,9 +2,9 @@ id: opcache-status-exposure
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: OPcache Status Exposure
|
name: OPcache Status Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: owncloud config Disclosure
|
name: owncloud config Disclosure
|
||||||
author: Mahendra Purbia (Mah3Sec_)
|
author: Mahendra Purbia (Mah3Sec_)
|
||||||
severity: info
|
severity: info
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: geeknik & afaq
|
author: geeknik & afaq
|
||||||
severity: info
|
severity: info
|
||||||
description: All npm packages contain a file, usually in the project root, called package.json - this file holds various metadata relevant to the project.
|
description: All npm packages contain a file, usually in the project root, called package.json - this file holds various metadata relevant to the project.
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -2,9 +2,9 @@ id: perl-status
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache mod_perl Status Page Exposure
|
name: Apache mod_perl Status Page Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -2,9 +2,9 @@ id: phpinfo-files
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: phpinfo Disclosure
|
name: phpinfo Disclosure
|
||||||
author: pd-team & daffainfo & meme-lord
|
author: pdteam & daffainfo & meme-lord
|
||||||
severity: low
|
severity: low
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -2,9 +2,9 @@ id: rails-database-config
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Ruby-on-Rails Database Configuration Exposure
|
name: Ruby-on-Rails Database Configuration Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
author: geeknik
|
author: geeknik
|
||||||
description: Redmine is a flexible project management web application written using Ruby on Rails framework - https://redmine.org/projects/redmine
|
description: Redmine is a flexible project management web application written using Ruby on Rails framework - https://redmine.org/projects/redmine
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
reference: https://www.cnblogs.com/cHr1s/p/14499858.html
|
reference: https://www.cnblogs.com/cHr1s/p/14499858.html
|
||||||
tags: ruijie,config,exposures
|
tags: ruijie,config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Detect Private SSH and TLS Keys
|
name: Detect Private SSH and TLS Keys
|
||||||
author: geeknik
|
author: geeknik
|
||||||
severity: high
|
severity: high
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: SFTP credentials exposure
|
name: SFTP credentials exposure
|
||||||
author: sheikhrishad
|
author: sheikhrishad
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,ftp,exposures
|
tags: config,ftp,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: SymfonyProfiler information leakage
|
name: SymfonyProfiler information leakage
|
||||||
author: wabafet
|
author: wabafet
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -2,9 +2,9 @@ id: symfony-database-config
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Symfony Database Configuration Exposure
|
name: Symfony Database Configuration Exposure
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: high
|
severity: high
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -2,9 +2,9 @@ id: symfony-profiler
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Symfony Profiler
|
name: Symfony Profiler
|
||||||
author: pd-team
|
author: pdteam
|
||||||
severity: high
|
severity: high
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -3,7 +3,7 @@ info:
|
||||||
name: Web Config file
|
name: Web Config file
|
||||||
author: Yash Anand @yashanand155
|
author: Yash Anand @yashanand155
|
||||||
severity: info
|
severity: info
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: X Prober server information leakage
|
name: X Prober server information leakage
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
tags: config,exposures
|
tags: config,exposure
|
||||||
reference: https://twitter.com/bugbounty_tips/status/1339984643517423616
|
reference: https://twitter.com/bugbounty_tips/status/1339984643517423616
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: oppsec
|
author: oppsec
|
||||||
severity: info
|
severity: info
|
||||||
description: Bower is a package manager which stores packages informations in bower.json file
|
description: Bower is a package manager which stores packages informations in bower.json file
|
||||||
tags: file,exposures
|
tags: file,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
author: gevakun
|
author: gevakun
|
||||||
severity: low
|
severity: low
|
||||||
reference: https://twitter.com/Wh11teW0lf/status/1295594085445709824
|
reference: https://twitter.com/Wh11teW0lf/status/1295594085445709824
|
||||||
tags: file,exposures
|
tags: file,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Drupal Install
|
name: Drupal Install
|
||||||
author: NkxxkN
|
author: NkxxkN
|
||||||
severity: low
|
severity: low
|
||||||
tags: file,exposures
|
tags: file,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Directory Listing via DS_Store
|
name: Directory Listing via DS_Store
|
||||||
author: 0w4ys
|
author: 0w4ys
|
||||||
severity: info
|
severity: info
|
||||||
tags: file,exposures
|
tags: file,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Exposed Spring Data REST Application-Level Profile Semantics (ALPS)
|
name: Exposed Spring Data REST Application-Level Profile Semantics (ALPS)
|
||||||
author: dwisiswant0
|
author: dwisiswant0
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: file,exposures
|
tags: file,exposure
|
||||||
reference: https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/
|
reference: https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Filezilla
|
name: Filezilla
|
||||||
author: amsda
|
author: amsda
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: file,exposures
|
tags: file,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -3,7 +3,7 @@ info:
|
||||||
name: Keycloak Json File
|
name: Keycloak Json File
|
||||||
author: oppsec
|
author: oppsec
|
||||||
severity: info
|
severity: info
|
||||||
tags: file,exposures
|
tags: file,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Lazy File Manager
|
name: Lazy File Manager
|
||||||
author: amsda
|
author: amsda
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: file,exposures
|
tags: file,exposure
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue