diff --git a/helpers/wordpress/plugins/essential-addons-for-elementor-lite.txt b/helpers/wordpress/plugins/essential-addons-for-elementor-lite.txt index 23900d674d..4b1e48ed97 100644 --- a/helpers/wordpress/plugins/essential-addons-for-elementor-lite.txt +++ b/helpers/wordpress/plugins/essential-addons-for-elementor-lite.txt @@ -1 +1 @@ -5.7.3 \ No newline at end of file +5.7.4 \ No newline at end of file diff --git a/helpers/wordpress/plugins/leadin.txt b/helpers/wordpress/plugins/leadin.txt index 99e3604a76..3607f90e0b 100644 --- a/helpers/wordpress/plugins/leadin.txt +++ b/helpers/wordpress/plugins/leadin.txt @@ -1 +1 @@ -10.1.23 \ No newline at end of file +10.1.24 \ No newline at end of file diff --git a/helpers/wordpress/plugins/ultimate-addons-for-gutenberg.txt b/helpers/wordpress/plugins/ultimate-addons-for-gutenberg.txt index d5724cd41b..bd4053bfb1 100644 --- a/helpers/wordpress/plugins/ultimate-addons-for-gutenberg.txt +++ b/helpers/wordpress/plugins/ultimate-addons-for-gutenberg.txt @@ -1 +1 @@ -2.6.2 \ No newline at end of file +2.6.3 \ No newline at end of file diff --git a/helpers/wordpress/plugins/woocommerce-pdf-invoices-packing-slips.txt b/helpers/wordpress/plugins/woocommerce-pdf-invoices-packing-slips.txt index e5b8a844d5..1947319e4b 100644 --- a/helpers/wordpress/plugins/woocommerce-pdf-invoices-packing-slips.txt +++ b/helpers/wordpress/plugins/woocommerce-pdf-invoices-packing-slips.txt @@ -1 +1 @@ -3.5.4 \ No newline at end of file +3.5.5 \ No newline at end of file diff --git a/helpers/wordpress/plugins/wp-migrate-db.txt b/helpers/wordpress/plugins/wp-migrate-db.txt index 952f449f1f..ba5c9fca65 100644 --- a/helpers/wordpress/plugins/wp-migrate-db.txt +++ b/helpers/wordpress/plugins/wp-migrate-db.txt @@ -1 +1 @@ -2.6.6 \ No newline at end of file +2.6.7 \ No newline at end of file diff --git a/http/cves/2021/CVE-2021-37304.yaml b/http/cves/2021/CVE-2021-37304.yaml index 3a7a89bba3..dfa0195142 100644 --- a/http/cves/2021/CVE-2021-37304.yaml +++ b/http/cves/2021/CVE-2021-37304.yaml @@ -12,7 +12,7 @@ info: classification: cve-id: CVE-2021-37304 metadata: - max-req: 1 + max-request: 1 verified: "true" shodan-query: title:"Jeecg-Boot" fofa-query: title="JeecgBoot 企业级低代码平台" diff --git a/http/cves/2021/CVE-2021-37305.yaml b/http/cves/2021/CVE-2021-37305.yaml index 686ce9d353..b528a1bd8d 100644 --- a/http/cves/2021/CVE-2021-37305.yaml +++ b/http/cves/2021/CVE-2021-37305.yaml @@ -12,7 +12,7 @@ info: classification: cve-id: CVE-2021-37305 metadata: - max-req: 1 + max-request: 1 verified: "true" shodan-query: title:"Jeecg-Boot" fofa-query: title="JeecgBoot 企业级低代码平台" diff --git a/http/exposed-panels/eclipse-birt-panel.yaml b/http/exposed-panels/eclipse-birt-panel.yaml index bb5457891b..b485214e91 100644 --- a/http/exposed-panels/eclipse-birt-panel.yaml +++ b/http/exposed-panels/eclipse-birt-panel.yaml @@ -12,7 +12,7 @@ info: reference: - https://eclipse.github.io/birt-website/ metadata: - max-req: 2 + max-request: 2 verified: "true" shodan-query: title:"Eclipse BIRT Home" google-query: intitle:"Eclipse BIRT Home" diff --git a/http/exposed-panels/jedox-web-panel.yaml b/http/exposed-panels/jedox-web-panel.yaml index 9fe81f8554..93d33c71aa 100644 --- a/http/exposed-panels/jedox-web-panel.yaml +++ b/http/exposed-panels/jedox-web-panel.yaml @@ -9,7 +9,7 @@ info: reference: - https://www.jedox.com metadata: - max-req: 2 + max-request: 2 verified: "true" shodan-query: title:"Jedox Web - Login" google-query: intitle:"Jedox Web Login" diff --git a/http/exposed-panels/repetier-server-panel.yaml b/http/exposed-panels/repetier-server-panel.yaml index 26c26eeefb..623087833f 100644 --- a/http/exposed-panels/repetier-server-panel.yaml +++ b/http/exposed-panels/repetier-server-panel.yaml @@ -7,7 +7,7 @@ info: description: | Repetier Server login panel detected. metadata: - max-req: 1 + max-request: 1 verified: "true" shodan-query: title:"Repetier-Server" tags: panel,repetier,detect diff --git a/http/exposures/apis/jeecg-boot-swagger.yaml b/http/exposures/apis/jeecg-boot-swagger.yaml index aea96aa356..70317fc256 100644 --- a/http/exposures/apis/jeecg-boot-swagger.yaml +++ b/http/exposures/apis/jeecg-boot-swagger.yaml @@ -5,7 +5,7 @@ info: author: ritikchaddha severity: info metadata: - max-req: 1 + max-request: 1 verified: "true" shodan-query: title:"Jeecg-Boot" fofa-query: title="JeecgBoot 企业级低代码平台" diff --git a/http/misconfiguration/teslamate-unauth-access.yaml b/http/misconfiguration/teslamate-unauth-access.yaml index 413060ea6a..26babbadb7 100644 --- a/http/misconfiguration/teslamate-unauth-access.yaml +++ b/http/misconfiguration/teslamate-unauth-access.yaml @@ -7,7 +7,7 @@ info: description: | A misconfig in Teslamate allows unauthorized access to /settings endpoint. metadata: - max-req: 1 + max-request: 1 verified: "true" shodan-query: http.favicon.hash:-1478287554 fofa-query: title="teslamate" diff --git a/http/vulnerabilities/avtech/avtech-auth-bypass.yaml b/http/vulnerabilities/avtech/avtech-auth-bypass.yaml index 86e8a0ead7..9b8f1188c1 100644 --- a/http/vulnerabilities/avtech/avtech-auth-bypass.yaml +++ b/http/vulnerabilities/avtech/avtech-auth-bypass.yaml @@ -7,7 +7,7 @@ info: description: | AVTECH Video Surveillance Products password disclosure through /cgi-bin/user/Config.cgi. metadata: - max-req: 2 + max-request: 2 verified: "true" shodan-query: title:"login" product:"Avtech" fofa-query: app="AVTECH-视频监控" diff --git a/http/vulnerabilities/avtech/avtech-dvr-ssrf.yaml b/http/vulnerabilities/avtech/avtech-dvr-ssrf.yaml index 8254e59f27..288ba680ac 100644 --- a/http/vulnerabilities/avtech/avtech-dvr-ssrf.yaml +++ b/http/vulnerabilities/avtech/avtech-dvr-ssrf.yaml @@ -7,7 +7,7 @@ info: description: | AVTECH DVR device, Search.cgi can be accessed directly. Search.cgi is responsible for searching and accessing cameras in the local network. Search.cgi provides the cgi_query function. metadata: - max-req: 1 + max-request: 1 verified: "true" shodan-query: title:"login" product:"Avtech" fofa-query: app="AVTECH-视频监控" diff --git a/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml b/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml index ae4fb6dfcf..6d53fdfbf7 100644 --- a/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml +++ b/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml @@ -7,7 +7,7 @@ info: description: | AVTECH video surveillance products unauthenticated file download from web root through /cgi-bin/cgibox, Since the .cab string is verified by the strstr method, the file download can be realized by adding ?.cab at the end of the file name. metadata: - max-req: 2 + max-request: 2 verified: "true" shodan-query: title:"login" product:"Avtech" fofa-query: app="AVTECH-视频监控" diff --git a/http/vulnerabilities/avtech/avtech-verification-bypass.yaml b/http/vulnerabilities/avtech/avtech-verification-bypass.yaml index bdc22eddd7..85414e83c6 100644 --- a/http/vulnerabilities/avtech/avtech-verification-bypass.yaml +++ b/http/vulnerabilities/avtech/avtech-verification-bypass.yaml @@ -7,7 +7,7 @@ info: description: | AVTECH DVR products are vulnerable to verification code bypass just by entering the "login=quick" parameter to bypass verification code. metadata: - max-req: 1 + max-request: 1 verified: "true" shodan-query: title:"login" product:"Avtech" fofa-query: app="AVTECH-视频监控" diff --git a/http/vulnerabilities/weaver/ecology/ecology-mysql-config.yaml b/http/vulnerabilities/weaver/ecology/ecology-mysql-config.yaml index 22f82740c9..c3332b6824 100644 --- a/http/vulnerabilities/weaver/ecology/ecology-mysql-config.yaml +++ b/http/vulnerabilities/weaver/ecology/ecology-mysql-config.yaml @@ -7,7 +7,7 @@ info: description: | Fanwei E-Office mysql_config.ini file can be directly accessed, leaking database account password and other information. metadata: - max-req: 1 + max-request: 1 verified: "true" fofa-query: app="泛微-EOffice" tags: fanwei,ecology,exposure,config diff --git a/network/cves/2016/CVE-2016-3510.yaml b/network/cves/2016/CVE-2016-3510.yaml index 1b99eeed12..567cd48b65 100644 --- a/network/cves/2016/CVE-2016-3510.yaml +++ b/network/cves/2016/CVE-2016-3510.yaml @@ -9,7 +9,7 @@ info: reference: - https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py metadata: - max-req: 1 + max-request: 1 verified: "true" tags: cve,cve2016,weblogic,t3,rce,oast,deserialization