Merge branch 'main' into main

patch-10
Pugalarasan 2023-06-03 07:37:12 +05:30 committed by GitHub
commit 9dc9563232
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
18 changed files with 18 additions and 18 deletions

View File

@ -1 +1 @@
10.1.23 10.1.24

View File

@ -1 +1 @@
2.6.6 2.6.7

View File

@ -12,7 +12,7 @@ info:
classification: classification:
cve-id: CVE-2021-37304 cve-id: CVE-2021-37304
metadata: metadata:
max-req: 1 max-request: 1
verified: "true" verified: "true"
shodan-query: title:"Jeecg-Boot" shodan-query: title:"Jeecg-Boot"
fofa-query: title="JeecgBoot 企业级低代码平台" fofa-query: title="JeecgBoot 企业级低代码平台"

View File

@ -12,7 +12,7 @@ info:
classification: classification:
cve-id: CVE-2021-37305 cve-id: CVE-2021-37305
metadata: metadata:
max-req: 1 max-request: 1
verified: "true" verified: "true"
shodan-query: title:"Jeecg-Boot" shodan-query: title:"Jeecg-Boot"
fofa-query: title="JeecgBoot 企业级低代码平台" fofa-query: title="JeecgBoot 企业级低代码平台"

View File

@ -12,7 +12,7 @@ info:
reference: reference:
- https://eclipse.github.io/birt-website/ - https://eclipse.github.io/birt-website/
metadata: metadata:
max-req: 2 max-request: 2
verified: "true" verified: "true"
shodan-query: title:"Eclipse BIRT Home" shodan-query: title:"Eclipse BIRT Home"
google-query: intitle:"Eclipse BIRT Home" google-query: intitle:"Eclipse BIRT Home"

View File

@ -9,7 +9,7 @@ info:
reference: reference:
- https://www.jedox.com - https://www.jedox.com
metadata: metadata:
max-req: 2 max-request: 2
verified: "true" verified: "true"
shodan-query: title:"Jedox Web - Login" shodan-query: title:"Jedox Web - Login"
google-query: intitle:"Jedox Web Login" google-query: intitle:"Jedox Web Login"

View File

@ -7,7 +7,7 @@ info:
description: | description: |
Repetier Server login panel detected. Repetier Server login panel detected.
metadata: metadata:
max-req: 1 max-request: 1
verified: "true" verified: "true"
shodan-query: title:"Repetier-Server" shodan-query: title:"Repetier-Server"
tags: panel,repetier,detect tags: panel,repetier,detect

View File

@ -5,7 +5,7 @@ info:
author: ritikchaddha author: ritikchaddha
severity: info severity: info
metadata: metadata:
max-req: 1 max-request: 1
verified: "true" verified: "true"
shodan-query: title:"Jeecg-Boot" shodan-query: title:"Jeecg-Boot"
fofa-query: title="JeecgBoot 企业级低代码平台" fofa-query: title="JeecgBoot 企业级低代码平台"

View File

@ -7,7 +7,7 @@ info:
description: | description: |
A misconfig in Teslamate allows unauthorized access to /settings endpoint. A misconfig in Teslamate allows unauthorized access to /settings endpoint.
metadata: metadata:
max-req: 1 max-request: 1
verified: "true" verified: "true"
shodan-query: http.favicon.hash:-1478287554 shodan-query: http.favicon.hash:-1478287554
fofa-query: title="teslamate" fofa-query: title="teslamate"

View File

@ -7,7 +7,7 @@ info:
description: | description: |
AVTECH Video Surveillance Products password disclosure through /cgi-bin/user/Config.cgi. AVTECH Video Surveillance Products password disclosure through /cgi-bin/user/Config.cgi.
metadata: metadata:
max-req: 2 max-request: 2
verified: "true" verified: "true"
shodan-query: title:"login" product:"Avtech" shodan-query: title:"login" product:"Avtech"
fofa-query: app="AVTECH-视频监控" fofa-query: app="AVTECH-视频监控"

View File

@ -7,7 +7,7 @@ info:
description: | description: |
AVTECH DVR device, Search.cgi can be accessed directly. Search.cgi is responsible for searching and accessing cameras in the local network. Search.cgi provides the cgi_query function. AVTECH DVR device, Search.cgi can be accessed directly. Search.cgi is responsible for searching and accessing cameras in the local network. Search.cgi provides the cgi_query function.
metadata: metadata:
max-req: 1 max-request: 1
verified: "true" verified: "true"
shodan-query: title:"login" product:"Avtech" shodan-query: title:"login" product:"Avtech"
fofa-query: app="AVTECH-视频监控" fofa-query: app="AVTECH-视频监控"

View File

@ -7,7 +7,7 @@ info:
description: | description: |
AVTECH video surveillance products unauthenticated file download from web root through /cgi-bin/cgibox, Since the .cab string is verified by the strstr method, the file download can be realized by adding ?.cab at the end of the file name. AVTECH video surveillance products unauthenticated file download from web root through /cgi-bin/cgibox, Since the .cab string is verified by the strstr method, the file download can be realized by adding ?.cab at the end of the file name.
metadata: metadata:
max-req: 2 max-request: 2
verified: "true" verified: "true"
shodan-query: title:"login" product:"Avtech" shodan-query: title:"login" product:"Avtech"
fofa-query: app="AVTECH-视频监控" fofa-query: app="AVTECH-视频监控"

View File

@ -7,7 +7,7 @@ info:
description: | description: |
AVTECH DVR products are vulnerable to verification code bypass just by entering the "login=quick" parameter to bypass verification code. AVTECH DVR products are vulnerable to verification code bypass just by entering the "login=quick" parameter to bypass verification code.
metadata: metadata:
max-req: 1 max-request: 1
verified: "true" verified: "true"
shodan-query: title:"login" product:"Avtech" shodan-query: title:"login" product:"Avtech"
fofa-query: app="AVTECH-视频监控" fofa-query: app="AVTECH-视频监控"

View File

@ -7,7 +7,7 @@ info:
description: | description: |
Fanwei E-Office mysql_config.ini file can be directly accessed, leaking database account password and other information. Fanwei E-Office mysql_config.ini file can be directly accessed, leaking database account password and other information.
metadata: metadata:
max-req: 1 max-request: 1
verified: "true" verified: "true"
fofa-query: app="泛微-EOffice" fofa-query: app="泛微-EOffice"
tags: fanwei,ecology,exposure,config tags: fanwei,ecology,exposure,config

View File

@ -9,7 +9,7 @@ info:
reference: reference:
- https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py - https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py
metadata: metadata:
max-req: 1 max-request: 1
verified: "true" verified: "true"
tags: cve,cve2016,weblogic,t3,rce,oast,deserialization tags: cve,cve2016,weblogic,t3,rce,oast,deserialization