misc tag updates

patch-1
sandeep 2021-04-06 12:16:11 +05:30
parent 7ae14fc96a
commit 8fdfc64e54
122 changed files with 134 additions and 134 deletions

View File

@ -2,7 +2,7 @@ id: CVE-2015-3306
info: info:
name: ProFTPd RCE name: ProFTPd RCE
author: pd-team author: pdteam
severity: high severity: high
reference: https://github.com/t0kx/exploit-CVE-2015-3306 reference: https://github.com/t0kx/exploit-CVE-2015-3306
description: The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands. description: The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.

View File

@ -2,7 +2,7 @@ id: CVE-2017-9506
info: info:
name: Jira IconURIServlet SSRF name: Jira IconURIServlet SSRF
author: pd-team author: pdteam
severity: high severity: high
description: The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF). description: The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF).
tags: cve,cve2017,atlassian,jira,ssrf tags: cve,cve2017,atlassian,jira,ssrf

View File

@ -2,7 +2,7 @@ id: CVE-2018-7251
info: info:
name: AnchorCMS Error Log Exposure name: AnchorCMS Error Log Exposure
author: pd-team author: pdteam
severity: medium severity: medium
tags: cve,cve2018,anchorcms,logs tags: cve,cve2018,anchorcms,logs

View File

@ -2,7 +2,7 @@ id: CVE-2018-8006
info: info:
name: Apache ActiveMQ XSS name: Apache ActiveMQ XSS
author: pd-team author: pdteam
severity: medium severity: medium
tags: cve,cve2018,apache,activemq,xss tags: cve,cve2018,apache,activemq,xss

View File

@ -2,7 +2,7 @@ id: CVE-2019-10092
info: info:
name: Apache mod_proxy HTML Injection / Partial XSS name: Apache mod_proxy HTML Injection / Partial XSS
author: pd-team author: pdteam
severity: medium severity: medium
description: In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. description: In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
reference: | reference: |

View File

@ -2,7 +2,7 @@ id: CVE-2019-14223
info: info:
name: Alfresco Share Open Redirect name: Alfresco Share Open Redirect
author: pd-team author: pdteam
severity: low severity: low
description: An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.). description: An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.).
reference: | reference: |

View File

@ -2,7 +2,7 @@ id: CVE-2019-7219
info: info:
name: Zarafa WebApp Reflected XSS name: Zarafa WebApp Reflected XSS
author: pd-team author: pdteam
severity: low severity: low
description: | description: |
Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0.1.47791 and earlier. NOTE: this is a discontinued product. The issue was fixed in later Zarafa Webapp versions; however, some former Zarafa Webapp customers use the related Kopano product instead. Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0.1.47791 and earlier. NOTE: this is a discontinued product. The issue was fixed in later Zarafa Webapp versions; however, some former Zarafa Webapp customers use the related Kopano product instead.

View File

@ -2,7 +2,7 @@ id: CVE-2019-9955
info: info:
name: CVE-2019-9955 Zyxel XSS name: CVE-2019-9955 Zyxel XSS
author: pd-team author: pdteam
severity: low severity: low
tags: cve,cve2019,xss tags: cve,cve2019,xss
description: On Zyxel ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200-VPN, ZyWALL 110, ZyWALL 310, ZyWALL 1100 devices, the security firewall login page is vulnerable to Reflected XSS via the unsanitized 'mp_idx' parameter. description: On Zyxel ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200-VPN, ZyWALL 110, ZyWALL 310, ZyWALL 1100 devices, the security firewall login page is vulnerable to Reflected XSS via the unsanitized 'mp_idx' parameter.

View File

@ -2,7 +2,7 @@ id: CVE-2020-17518
info: info:
name: Apache Flink Upload Path Traversal name: Apache Flink Upload Path Traversal
author: pd-team author: pdteam
severity: critical severity: critical
reference: https://github.com/vulhub/vulhub/tree/master/flink/CVE-2020-17518 reference: https://github.com/vulhub/vulhub/tree/master/flink/CVE-2020-17518
description: | description: |

View File

@ -2,7 +2,7 @@ id: CVE-2020-17519
info: info:
name: Apache Flink directory traversal name: Apache Flink directory traversal
author: pd-team author: pdteam
severity: high severity: high
description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
reference: https://github.com/B1anda0/CVE-2020-17519 reference: https://github.com/B1anda0/CVE-2020-17519

View File

@ -2,7 +2,7 @@ id: CVE-2020-1943
info: info:
name: Apache OFBiz Reflected XSS name: Apache OFBiz Reflected XSS
author: pd-team author: pdteam
description: Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07. description: Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07.
severity: medium severity: medium
tags: cve,cve2020,apache,xss tags: cve,cve2020,apache,xss

View File

@ -2,7 +2,7 @@ id: activemq-default-login
info: info:
name: Apache ActiveMQ Default Credentials name: Apache ActiveMQ Default Credentials
author: pd-team author: pdteam
severity: medium severity: medium
tags: apache,activemq,dlogin tags: apache,activemq,dlogin

View File

@ -2,7 +2,7 @@ id: ambari-default-credentials
info: info:
name: Apache Ambari Default Credentials name: Apache Ambari Default Credentials
author: pd-team author: pdteam
severity: medium severity: medium
tags: ambari,dlogin tags: ambari,dlogin

View File

@ -2,7 +2,7 @@ id: ofbiz-default-credentials
info: info:
name: Apache OfBiz Default Credentials name: Apache OfBiz Default Credentials
author: pd-team author: pdteam
severity: medium severity: medium
tags: ofbiz,dlogin tags: ofbiz,dlogin

View File

@ -2,7 +2,7 @@ id: zabbix-default-credentials
info: info:
name: Zabbix Default Credentials name: Zabbix Default Credentials
author: pd-team author: pdteam
severity: critical severity: critical
tags: zabbix,dlogin tags: zabbix,dlogin

View File

@ -2,7 +2,7 @@ id: cname-service-detector
info: info:
name: 3rd party service checker name: 3rd party service checker
author: pd-team author: pdteam
severity: info severity: info
tags: dns tags: dns

View File

@ -2,7 +2,7 @@ id: servfail-refused-hosts
info: info:
name: Servfail Host Finder name: Servfail Host Finder
author: pd-team author: pdteam
severity: info severity: info
tags: dns tags: dns

View File

@ -2,7 +2,7 @@ id: active-admin-exposure
info: info:
name: ActiveAdmin Admin Dasboard Exposure name: ActiveAdmin Admin Dasboard Exposure
author: pd-team author: pdteam
severity: info severity: info
requests: requests:

View File

@ -2,7 +2,7 @@ id: activemq-panel
info: info:
name: Apache ActiveMQ Exposure name: Apache ActiveMQ Exposure
author: pd-team author: pdteam
severity: info severity: info
requests: requests:

View File

@ -2,7 +2,7 @@ id: airflow-exposure
info: info:
name: Apache Airflow Exposure / Unauthenticated Access name: Apache Airflow Exposure / Unauthenticated Access
author: pd-team author: pdteam
severity: medium severity: medium
requests: requests:

View File

@ -2,7 +2,7 @@ id: ambari-exposure
info: info:
name: Apache Ambari Exposure / Unauthenticated Access name: Apache Ambari Exposure / Unauthenticated Access
author: pd-team author: pdteam
severity: medium severity: medium
requests: requests:

View File

@ -2,7 +2,7 @@ id: ansible-tower-exposure
info: info:
name: Ansible Tower Exposure name: Ansible Tower Exposure
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: citrix-vpn-detect
info: info:
name: Citrix VPN Detection name: Citrix VPN Detection
author: pd-team author: pdteam
severity: info severity: info
requests: requests:

View File

@ -2,7 +2,7 @@ id: couchdb-fauxton
info: info:
name: Apache CouchDB Fauxton Exposure name: Apache CouchDB Fauxton Exposure
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: django-admin-panel
info: info:
name: Python Django Admin Panel name: Python Django Admin Panel
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: druid-console-exposure
info: info:
name: Alibaba Druid Console Exposure name: Alibaba Druid Console Exposure
author: pd-team author: pdteam
severity: medium severity: medium
requests: requests:

View File

@ -2,7 +2,7 @@ id: exposed-pagespeed-global-admin
info: info:
name: Apache PageSpeed Global Admin Dashboard Exposure name: Apache PageSpeed Global Admin Dashboard Exposure
author: pd-team author: pdteam
severity: medium severity: medium
requests: requests:

View File

@ -2,7 +2,7 @@ id: exposed-webalizer
info: info:
name: Publicly exposed Webalizer Interface name: Publicly exposed Webalizer Interface
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: flink-exposure
info: info:
name: Apache Flink Exposure name: Apache Flink Exposure
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: hadoop-exposure
info: info:
name: Apache Hadoop Exposure name: Apache Hadoop Exposure
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: kafka-connect-ui
info: info:
name: Apache Kafka Connect UI Exposure name: Apache Kafka Connect UI Exposure
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: kafka-monitoring
info: info:
name: Apache Kafka Monitor Exposure name: Apache Kafka Monitor Exposure
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: kafka-topics-ui
info: info:
name: Apache Kafka Topics UI Exposure name: Apache Kafka Topics UI Exposure
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: kubernetes-dashboard
info: info:
name: Kubernetes Console Exposure name: Kubernetes Console Exposure
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: parallels-html-client
info: info:
name: Parallels HTML5 Client name: Parallels HTML5 Client
author: pd-team author: pdteam
severity: info severity: info
requests: requests:

View File

@ -2,7 +2,7 @@ id: phpmyadmin-panel
info: info:
name: phpMyAdmin Panel name: phpMyAdmin Panel
author: pd-team author: pdteam
severity: info severity: info
requests: requests:

View File

@ -2,7 +2,7 @@ id: rocketmq-console-exposure
info: info:
name: Apache RocketMQ Console Exposure name: Apache RocketMQ Console Exposure
author: pd-team author: pdteam
severity: medium severity: medium
requests: requests:

View File

@ -2,7 +2,7 @@ id: selenoid-ui-exposure
info: info:
name: Selenoid UI Dashboard Exposure name: Selenoid UI Dashboard Exposure
author: pd-team author: pdteam
severity: medium severity: medium
requests: requests:

View File

@ -2,7 +2,7 @@ id: setup-page-exposure
info: info:
name: Zenphoto Setup Page Exposure name: Zenphoto Setup Page Exposure
author: pd-team author: pdteam
severity: medium severity: medium
description: Misconfiguration on Zenphoto version < 1.5.X which lead to sensitive information disclosure description: Misconfiguration on Zenphoto version < 1.5.X which lead to sensitive information disclosure

View File

@ -2,7 +2,7 @@ id: solr-exposure
info: info:
name: Apache Solr Exposure name: Apache Solr Exposure
author: pd-team author: pdteam
severity: medium severity: medium
requests: requests:

View File

@ -2,7 +2,7 @@ id: yarn-manager-exposure
info: info:
name: Apache Yarn ResourceManager Exposure / Unauthenticated Access name: Apache Yarn ResourceManager Exposure / Unauthenticated Access
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -2,7 +2,7 @@ id: zipkin-exposure
info: info:
name: Zipkin Exposure name: Zipkin Exposure
author: pd-team author: pdteam
severity: low severity: low
requests: requests:

View File

@ -4,7 +4,7 @@ info:
name: OpenAPI name: OpenAPI
author: pdteam author: pdteam
severity: info severity: info
tags: exposures,api tags: exposure,api
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Public Swagger API name: Public Swagger API
author: pdteam author: pdteam
severity: info severity: info
tags: exposures,api,swagger tags: exposure,api,swagger
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: wadl file disclosure name: wadl file disclosure
author: 0xrudra & manuelbua author: 0xrudra & manuelbua
severity: info severity: info
tags: exposures,api tags: exposure,api
reference: | reference: |
- https://github.com/dwisiswant0/wadl-dumper - https://github.com/dwisiswant0/wadl-dumper
- https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/ - https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/

View File

@ -4,7 +4,7 @@ info:
name: wsdl-detect name: wsdl-detect
author: jarijaas author: jarijaas
severity: info severity: info
tags: exposures,api tags: exposure,api
description: Detects web services that have WSDL (https://www.w3.org/TR/wsdl/) description: Detects web services that have WSDL (https://www.w3.org/TR/wsdl/)
requests: requests:

View File

@ -4,7 +4,7 @@ info:
name: settings.php information disclosure name: settings.php information disclosure
author: sheikhrishad author: sheikhrishad
severity: medium severity: medium
tags: exposures,backup tags: exposure,backup
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: MySQL Dump Files name: MySQL Dump Files
author: geeknik & @dwisiswant0 author: geeknik & @dwisiswant0
severity: medium severity: medium
tags: exposures,backup tags: exposure,backup
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Compressed Web File name: Compressed Web File
author: Toufik Airane & @dwisiswant0 author: Toufik Airane & @dwisiswant0
severity: medium severity: medium
tags: exposures,backup tags: exposure,backup
requests: requests:
- method: GET - method: GET

View File

@ -2,9 +2,9 @@ id: airflow-configuration-exposure
info: info:
name: Apache Airflow Configuration Exposure name: Apache Airflow Configuration Exposure
author: pd-team author: pdteam
severity: medium severity: medium
tags: exposures,config tags: exposure,config
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Alibaba Canal Info Leak name: Alibaba Canal Info Leak
author: pikpikcu author: pikpikcu
severity: info severity: info
tags: config,exposures tags: config,exposure
# https://github.com/alibaba/canal/issues/632 # https://github.com/alibaba/canal/issues/632
# https://netty.io/wiki/reference-counted-objects.html # https://netty.io/wiki/reference-counted-objects.html

View File

@ -2,9 +2,9 @@ id: amazon-docker-config-disclosure
info: info:
name: Dockerrun AWS Configuration Exposure name: Dockerrun AWS Configuration Exposure
author: pd-team author: pdteam
severity: medium severity: medium
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -2,9 +2,9 @@ id: ansible-config-disclosure
info: info:
name: Ansible Configuration Exposure name: Ansible Configuration Exposure
author: pd-team author: pdteam
severity: medium severity: medium
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: AWStats config name: AWStats config
author: sheikhrishad author: sheikhrishad
severity: info severity: info
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: AWStats script name: AWStats script
author: sheikhrishad author: sheikhrishad
severity: info severity: info
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -5,7 +5,7 @@ info:
author: geeknik author: geeknik
severity: low severity: low
reference: https://circleci.com/docs/2.0/sample-config/ reference: https://circleci.com/docs/2.0/sample-config/
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: circleci ssh-config exposure name: circleci ssh-config exposure
author: geeknik author: geeknik
severity: low severity: low
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: composer-config-file name: composer-config-file
author: Mahendra Purbia (Mah3Sec_) author: Mahendra Purbia (Mah3Sec_)
severity: info severity: info
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: docker-compose.yml exposure name: docker-compose.yml exposure
author: meme-lord & blckraven & geeknik author: meme-lord & blckraven & geeknik
severity: medium severity: medium
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -5,7 +5,7 @@ info:
author: pikpikcu author: pikpikcu
severity: high severity: high
reference: https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543 reference: https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -5,7 +5,7 @@ info:
author: daffainfo author: daffainfo
severity: low severity: low
reference: https://www.bitkeeper.org/man/config-etc.html reference: https://www.bitkeeper.org/man/config-etc.html
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -5,7 +5,7 @@ info:
author: daffainfo author: daffainfo
severity: low severity: low
reference: http://doc.bazaar.canonical.com/beta/en/user-reference/configuration-help.html reference: http://doc.bazaar.canonical.com/beta/en/user-reference/configuration-help.html
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -5,7 +5,7 @@ info:
author: daffainfo author: daffainfo
severity: low severity: low
reference: http://darcs.net/Using/Configuration#sources reference: http://darcs.net/Using/Configuration#sources
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Exposed HG Directory name: Exposed HG Directory
author: daffainfo author: daffainfo
severity: low severity: low
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Exposed SVN Directory name: Exposed SVN Directory
author: udit_thakkur & dwisiswant0 author: udit_thakkur & dwisiswant0
severity: medium severity: medium
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: FTP credentials exposure name: FTP credentials exposure
author: pikpikcu author: pikpikcu
severity: medium severity: medium
tags: config,ftp,exposures tags: config,ftp,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
author: organiccrap author: organiccrap
severity: medium severity: medium
description: Nginx off-by-slash vulnerability exposes Git configuration. description: Nginx off-by-slash vulnerability exposes Git configuration.
tags: config,exposures tags: config,exposure
reference: https://twitter.com/Random_Robbie/status/1262676628167110656 reference: https://twitter.com/Random_Robbie/status/1262676628167110656
requests: requests:

View File

@ -2,10 +2,10 @@ id: git-config
info: info:
name: Git Config Disclosure name: Git Config Disclosure
author: pd-team & pikpikcu author: pdteam & pikpikcu
severity: medium severity: medium
description: Searches for the pattern /.git/config on passed URLs. description: Searches for the pattern /.git/config on passed URLs.
tags: config,git,exposures tags: config,git,exposure
requests: requests:
- raw: - raw:

View File

@ -5,7 +5,7 @@ info:
author: geeknik author: geeknik
severity: info severity: info
description: https://developers.google.com/gmail/api/auth/web-server description: https://developers.google.com/gmail/api/auth/web-server
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -5,7 +5,7 @@ info:
author: dhiyaneshDK author: dhiyaneshDK
severity: low severity: low
reference: https://hackerone.com/reports/1026196 reference: https://hackerone.com/reports/1026196
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -5,7 +5,7 @@ info:
author: alperenkesk author: alperenkesk
severity: low severity: low
reference: https://www.exploit-db.com/exploits/44734 reference: https://www.exploit-db.com/exploits/44734
tags: scada,config,exposures tags: scada,config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Detect exposed .htpasswd files name: Detect exposed .htpasswd files
author: geeknik author: geeknik
severity: info severity: info
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -5,7 +5,7 @@ info:
author: oppsec author: oppsec
severity: low severity: low
description: configuration.php-dist is a file created by Joomla to save Joomla settings. description: configuration.php-dist is a file created by Joomla to save Joomla settings.
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Laravel .env file name: Laravel .env file
author: pxmme1337 & dwisiswant0 & geeknik & emenalf author: pxmme1337 & dwisiswant0 & geeknik & emenalf
severity: medium severity: medium
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Lvmeng UTS Disclosure name: Lvmeng UTS Disclosure
author: pikpikcu author: pikpikcu
severity: high severity: high
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -3,7 +3,7 @@ info:
name: Magento Config Disclosure name: Magento Config Disclosure
author: geeknik author: geeknik
severity: medium severity: medium
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -6,7 +6,7 @@ info:
description: The .netrc file contains login and initialization information used by the auto-login process. description: The .netrc file contains login and initialization information used by the auto-login process.
reference: https://www.gnu.org/software/inetutils/manual/html_node/The-_002enetrc-file.html reference: https://www.gnu.org/software/inetutils/manual/html_node/The-_002enetrc-file.html
severity: high severity: high
tags: netrc,config,exposures tags: netrc,config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -2,9 +2,9 @@ id: opcache-status-exposure
info: info:
name: OPcache Status Exposure name: OPcache Status Exposure
author: pd-team author: pdteam
severity: low severity: low
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: owncloud config Disclosure name: owncloud config Disclosure
author: Mahendra Purbia (Mah3Sec_) author: Mahendra Purbia (Mah3Sec_)
severity: info severity: info
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -5,7 +5,7 @@ info:
author: geeknik & afaq author: geeknik & afaq
severity: info severity: info
description: All npm packages contain a file, usually in the project root, called package.json - this file holds various metadata relevant to the project. description: All npm packages contain a file, usually in the project root, called package.json - this file holds various metadata relevant to the project.
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -2,9 +2,9 @@ id: perl-status
info: info:
name: Apache mod_perl Status Page Exposure name: Apache mod_perl Status Page Exposure
author: pd-team author: pdteam
severity: medium severity: medium
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -2,9 +2,9 @@ id: phpinfo-files
info: info:
name: phpinfo Disclosure name: phpinfo Disclosure
author: pd-team & daffainfo & meme-lord author: pdteam & daffainfo & meme-lord
severity: low severity: low
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -2,9 +2,9 @@ id: rails-database-config
info: info:
name: Ruby-on-Rails Database Configuration Exposure name: Ruby-on-Rails Database Configuration Exposure
author: pd-team author: pdteam
severity: low severity: low
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
author: geeknik author: geeknik
description: Redmine is a flexible project management web application written using Ruby on Rails framework - https://redmine.org/projects/redmine description: Redmine is a flexible project management web application written using Ruby on Rails framework - https://redmine.org/projects/redmine
severity: medium severity: medium
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -5,7 +5,7 @@ info:
author: pikpikcu author: pikpikcu
severity: high severity: high
reference: https://www.cnblogs.com/cHr1s/p/14499858.html reference: https://www.cnblogs.com/cHr1s/p/14499858.html
tags: ruijie,config,exposures tags: ruijie,config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Detect Private SSH and TLS Keys name: Detect Private SSH and TLS Keys
author: geeknik author: geeknik
severity: high severity: high
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: SFTP credentials exposure name: SFTP credentials exposure
author: sheikhrishad author: sheikhrishad
severity: medium severity: medium
tags: config,ftp,exposures tags: config,ftp,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: SymfonyProfiler information leakage name: SymfonyProfiler information leakage
author: wabafet author: wabafet
severity: medium severity: medium
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -2,9 +2,9 @@ id: symfony-database-config
info: info:
name: Symfony Database Configuration Exposure name: Symfony Database Configuration Exposure
author: pd-team author: pdteam
severity: high severity: high
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -2,9 +2,9 @@ id: symfony-profiler
info: info:
name: Symfony Profiler name: Symfony Profiler
author: pd-team author: pdteam
severity: high severity: high
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -3,7 +3,7 @@ info:
name: Web Config file name: Web Config file
author: Yash Anand @yashanand155 author: Yash Anand @yashanand155
severity: info severity: info
tags: config,exposures tags: config,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: X Prober server information leakage name: X Prober server information leakage
author: pdteam author: pdteam
severity: low severity: low
tags: config,exposures tags: config,exposure
reference: https://twitter.com/bugbounty_tips/status/1339984643517423616 reference: https://twitter.com/bugbounty_tips/status/1339984643517423616
requests: requests:

View File

@ -5,7 +5,7 @@ info:
author: oppsec author: oppsec
severity: info severity: info
description: Bower is a package manager which stores packages informations in bower.json file description: Bower is a package manager which stores packages informations in bower.json file
tags: file,exposures tags: file,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
author: gevakun author: gevakun
severity: low severity: low
reference: https://twitter.com/Wh11teW0lf/status/1295594085445709824 reference: https://twitter.com/Wh11teW0lf/status/1295594085445709824
tags: file,exposures tags: file,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Drupal Install name: Drupal Install
author: NkxxkN author: NkxxkN
severity: low severity: low
tags: file,exposures tags: file,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Directory Listing via DS_Store name: Directory Listing via DS_Store
author: 0w4ys author: 0w4ys
severity: info severity: info
tags: file,exposures tags: file,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Exposed Spring Data REST Application-Level Profile Semantics (ALPS) name: Exposed Spring Data REST Application-Level Profile Semantics (ALPS)
author: dwisiswant0 author: dwisiswant0
severity: medium severity: medium
tags: file,exposures tags: file,exposure
reference: https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/ reference: https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/
requests: requests:

View File

@ -4,7 +4,7 @@ info:
name: Filezilla name: Filezilla
author: amsda author: amsda
severity: medium severity: medium
tags: file,exposures tags: file,exposure
requests: requests:
- method: GET - method: GET

View File

@ -3,7 +3,7 @@ info:
name: Keycloak Json File name: Keycloak Json File
author: oppsec author: oppsec
severity: info severity: info
tags: file,exposures tags: file,exposure
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Lazy File Manager name: Lazy File Manager
author: amsda author: amsda
severity: medium severity: medium
tags: file,exposures tags: file,exposure
requests: requests:
- method: GET - method: GET

Some files were not shown because too many files have changed in this diff Show More