Merge branch 'main' into main
commit
9dc9563232
|
@ -1 +1 @@
|
||||||
5.7.3
|
5.7.4
|
|
@ -1 +1 @@
|
||||||
10.1.23
|
10.1.24
|
|
@ -1 +1 @@
|
||||||
2.6.2
|
2.6.3
|
|
@ -1 +1 @@
|
||||||
3.5.4
|
3.5.5
|
|
@ -1 +1 @@
|
||||||
2.6.6
|
2.6.7
|
|
@ -12,7 +12,7 @@ info:
|
||||||
classification:
|
classification:
|
||||||
cve-id: CVE-2021-37304
|
cve-id: CVE-2021-37304
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 1
|
max-request: 1
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: title:"Jeecg-Boot"
|
shodan-query: title:"Jeecg-Boot"
|
||||||
fofa-query: title="JeecgBoot 企业级低代码平台"
|
fofa-query: title="JeecgBoot 企业级低代码平台"
|
||||||
|
|
|
@ -12,7 +12,7 @@ info:
|
||||||
classification:
|
classification:
|
||||||
cve-id: CVE-2021-37305
|
cve-id: CVE-2021-37305
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 1
|
max-request: 1
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: title:"Jeecg-Boot"
|
shodan-query: title:"Jeecg-Boot"
|
||||||
fofa-query: title="JeecgBoot 企业级低代码平台"
|
fofa-query: title="JeecgBoot 企业级低代码平台"
|
||||||
|
|
|
@ -12,7 +12,7 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://eclipse.github.io/birt-website/
|
- https://eclipse.github.io/birt-website/
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 2
|
max-request: 2
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: title:"Eclipse BIRT Home"
|
shodan-query: title:"Eclipse BIRT Home"
|
||||||
google-query: intitle:"Eclipse BIRT Home"
|
google-query: intitle:"Eclipse BIRT Home"
|
||||||
|
|
|
@ -9,7 +9,7 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://www.jedox.com
|
- https://www.jedox.com
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 2
|
max-request: 2
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: title:"Jedox Web - Login"
|
shodan-query: title:"Jedox Web - Login"
|
||||||
google-query: intitle:"Jedox Web Login"
|
google-query: intitle:"Jedox Web Login"
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
description: |
|
description: |
|
||||||
Repetier Server login panel detected.
|
Repetier Server login panel detected.
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 1
|
max-request: 1
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: title:"Repetier-Server"
|
shodan-query: title:"Repetier-Server"
|
||||||
tags: panel,repetier,detect
|
tags: panel,repetier,detect
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: ritikchaddha
|
author: ritikchaddha
|
||||||
severity: info
|
severity: info
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 1
|
max-request: 1
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: title:"Jeecg-Boot"
|
shodan-query: title:"Jeecg-Boot"
|
||||||
fofa-query: title="JeecgBoot 企业级低代码平台"
|
fofa-query: title="JeecgBoot 企业级低代码平台"
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
description: |
|
description: |
|
||||||
A misconfig in Teslamate allows unauthorized access to /settings endpoint.
|
A misconfig in Teslamate allows unauthorized access to /settings endpoint.
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 1
|
max-request: 1
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: http.favicon.hash:-1478287554
|
shodan-query: http.favicon.hash:-1478287554
|
||||||
fofa-query: title="teslamate"
|
fofa-query: title="teslamate"
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
description: |
|
description: |
|
||||||
AVTECH Video Surveillance Products password disclosure through /cgi-bin/user/Config.cgi.
|
AVTECH Video Surveillance Products password disclosure through /cgi-bin/user/Config.cgi.
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 2
|
max-request: 2
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: title:"login" product:"Avtech"
|
shodan-query: title:"login" product:"Avtech"
|
||||||
fofa-query: app="AVTECH-视频监控"
|
fofa-query: app="AVTECH-视频监控"
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
description: |
|
description: |
|
||||||
AVTECH DVR device, Search.cgi can be accessed directly. Search.cgi is responsible for searching and accessing cameras in the local network. Search.cgi provides the cgi_query function.
|
AVTECH DVR device, Search.cgi can be accessed directly. Search.cgi is responsible for searching and accessing cameras in the local network. Search.cgi provides the cgi_query function.
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 1
|
max-request: 1
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: title:"login" product:"Avtech"
|
shodan-query: title:"login" product:"Avtech"
|
||||||
fofa-query: app="AVTECH-视频监控"
|
fofa-query: app="AVTECH-视频监控"
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
description: |
|
description: |
|
||||||
AVTECH video surveillance products unauthenticated file download from web root through /cgi-bin/cgibox, Since the .cab string is verified by the strstr method, the file download can be realized by adding ?.cab at the end of the file name.
|
AVTECH video surveillance products unauthenticated file download from web root through /cgi-bin/cgibox, Since the .cab string is verified by the strstr method, the file download can be realized by adding ?.cab at the end of the file name.
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 2
|
max-request: 2
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: title:"login" product:"Avtech"
|
shodan-query: title:"login" product:"Avtech"
|
||||||
fofa-query: app="AVTECH-视频监控"
|
fofa-query: app="AVTECH-视频监控"
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
description: |
|
description: |
|
||||||
AVTECH DVR products are vulnerable to verification code bypass just by entering the "login=quick" parameter to bypass verification code.
|
AVTECH DVR products are vulnerable to verification code bypass just by entering the "login=quick" parameter to bypass verification code.
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 1
|
max-request: 1
|
||||||
verified: "true"
|
verified: "true"
|
||||||
shodan-query: title:"login" product:"Avtech"
|
shodan-query: title:"login" product:"Avtech"
|
||||||
fofa-query: app="AVTECH-视频监控"
|
fofa-query: app="AVTECH-视频监控"
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
description: |
|
description: |
|
||||||
Fanwei E-Office mysql_config.ini file can be directly accessed, leaking database account password and other information.
|
Fanwei E-Office mysql_config.ini file can be directly accessed, leaking database account password and other information.
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 1
|
max-request: 1
|
||||||
verified: "true"
|
verified: "true"
|
||||||
fofa-query: app="泛微-EOffice"
|
fofa-query: app="泛微-EOffice"
|
||||||
tags: fanwei,ecology,exposure,config
|
tags: fanwei,ecology,exposure,config
|
||||||
|
|
|
@ -9,7 +9,7 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py
|
- https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py
|
||||||
metadata:
|
metadata:
|
||||||
max-req: 1
|
max-request: 1
|
||||||
verified: "true"
|
verified: "true"
|
||||||
tags: cve,cve2016,weblogic,t3,rce,oast,deserialization
|
tags: cve,cve2016,weblogic,t3,rce,oast,deserialization
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue